|
5 | 5 | from sslyze import TlsVersionEnum
|
6 | 6 |
|
7 | 7 |
|
8 |
| -# NCSC guideline B3-2 / table 2 and 3 |
| 8 | +# NCSC 3.3.2 / 3.3.5 |
9 | 9 | CERT_SIGALG_GOOD = [
|
10 | 10 | SignatureAlgorithmOID.RSA_WITH_SHA256,
|
11 | 11 | SignatureAlgorithmOID.RSA_WITH_SHA384,
|
|
20 | 20 | CERT_RSA_DSA_MIN_KEY_SIZE = 2048
|
21 | 21 | CERT_CURVE_MIN_KEY_SIZE = 224
|
22 | 22 |
|
23 |
| -# NCSC table 9 |
| 23 | +# NCSC 3.3.2.1 |
24 | 24 | CERT_CURVES_GOOD = [x25519.X25519PublicKey, x448.X448PublicKey]
|
25 |
| -CERT_EC_CURVES_GOOD = [ec.SECP384R1, ec.SECP256R1] |
| 25 | +CERT_EC_CURVES_GOOD = [ |
| 26 | + ec.SECP521R1, |
| 27 | + ec.SECP384R1, |
| 28 | + ec.SECP256R1, |
| 29 | + ec.BrainpoolP512R1, |
| 30 | + ec.BrainpoolP384R1, |
| 31 | + ec.BrainpoolP256R1, |
| 32 | +] |
26 | 33 | CERT_EC_CURVES_PHASE_OUT = [ec.SECP224R1]
|
27 | 34 | FS_ECDH_MIN_KEY_SIZE = 224
|
28 | 35 | FS_DH_MIN_KEY_SIZE = 2048
|
29 | 36 |
|
| 37 | +# NCSC 3.3.2.1 |
30 | 38 | FS_EC_GOOD = [
|
31 | 39 | OpenSslEcNidEnum.SECP521R1,
|
32 | 40 | OpenSslEcNidEnum.SECP384R1,
|
33 | 41 | OpenSslEcNidEnum.SECP256R1,
|
| 42 | + OpenSslEcNidEnum.brainpoolP512r1, |
| 43 | + OpenSslEcNidEnum.brainpoolP384r1, |
| 44 | + OpenSslEcNidEnum.brainpoolP256r1, |
34 | 45 | OpenSslEcNidEnum.X25519,
|
35 | 46 | OpenSslEcNidEnum.X448,
|
36 | 47 | ]
|
|
39 | 50 | ]
|
40 | 51 |
|
41 | 52 |
|
42 |
| -# NCSC appendix C, derived from table 2, 6 and 7 |
43 |
| -# Anything not in these lists, is insufficient. |
| 53 | +# NCSC appendix B, derived from 3.3.3, 3.3.4 |
| 54 | +# PQC not yet supported by us |
| 55 | +# Anything not in these lists is insufficient. |
44 | 56 | CIPHERS_GOOD = [
|
45 | 57 | "TLS_AES_256_GCM_SHA384",
|
46 | 58 | "TLS_CHACHA20_POLY1305_SHA256",
|
| 59 | +] |
| 60 | +CIPHERS_SUFFICIENT = [ |
47 | 61 | "TLS_AES_128_GCM_SHA256",
|
48 |
| - # NCSC appendix C lists these as sufficient, but read |
49 |
| - # footnote 52 carefully. As we test TLS version separate |
50 |
| - # from cipher list, we consider them good. |
51 |
| - "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", |
| 62 | + "TLS_AES_128_CCM_SHA256", |
52 | 63 | "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256",
|
| 64 | + "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", |
| 65 | + "TLS_ECDHE_ECDSA_WITH_AES_256_CCM", |
53 | 66 | "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
|
54 |
| - "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", |
| 67 | + "TLS_ECDHE_ECDSA_WITH_AES_128_CCM", |
55 | 68 | "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256",
|
| 69 | + "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", |
56 | 70 | "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
|
57 |
| - # CCM is not in appendix C, but footnote 31 makes it Good (CCM_8 is insufficient) |
58 |
| - "TLS_AES_128_CCM_SHA256", # TLS 1.3 notation |
59 |
| - "TLS_ECDHE_ECDSA_WITH_AES_128_CCM", |
60 |
| - "TLS_ECDHE_ECDSA_WITH_AES_256_CCM", |
61 | 71 | ]
|
62 |
| -CIPHERS_SUFFICIENT = [ |
| 72 | +CIPHERS_PHASE_OUT = [ |
| 73 | + "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384", |
| 74 | + "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384", |
| 75 | + "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256", |
| 76 | + "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256", |
| 77 | + "TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384", |
| 78 | + "TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384", |
| 79 | + "TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256", |
| 80 | + "TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256", |
63 | 81 | "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384",
|
64 |
| - "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA", |
65 | 82 | "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
|
66 |
| - "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA", |
| 83 | + "TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384", |
| 84 | + "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384", |
| 85 | + "TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256", |
| 86 | + "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256", |
| 87 | + "TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384", |
| 88 | + "TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384", |
| 89 | + "TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256", |
| 90 | + "TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256", |
67 | 91 | "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
|
68 |
| - "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA", |
69 | 92 | "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
|
70 |
| - "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", |
71 |
| - "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384", |
72 | 93 | "TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256",
|
73 |
| - "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256", |
74 |
| - "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256", |
75 |
| - "TLS_DHE_RSA_WITH_AES_256_CBC_SHA", |
76 |
| - "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256", |
77 |
| - "TLS_DHE_RSA_WITH_AES_128_CBC_SHA", |
78 |
| - # CAMELLIA is not in appendix C but is sufficient (footnote 31) |
79 |
| - "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA", |
80 |
| - "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256", |
81 |
| - "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA", |
| 94 | + "TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384", |
82 | 95 | "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256",
|
83 |
| - "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA", |
84 |
| - "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256", |
85 |
| - "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA", |
86 |
| - "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256", |
87 |
| - "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256", |
88 |
| - "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384", |
89 |
| - "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256", |
90 |
| - "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384", |
91 |
| - # CCM is not in appendix C, but footnote 31 makes it Good (on its own) |
92 |
| - "TLS_DHE_RSA_WITH_AES_128_CCM", |
| 96 | + "TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256", |
| 97 | + "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256", |
| 98 | + "TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384", |
| 99 | + "TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384", |
| 100 | + "TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256", |
| 101 | + "TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256", |
| 102 | + "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384", |
93 | 103 | "TLS_DHE_RSA_WITH_AES_256_CCM",
|
94 |
| -] |
95 |
| -CIPHERS_PHASE_OUT = [ |
96 |
| - "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA", |
97 |
| - "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA", |
98 |
| - "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA", |
99 |
| - "TLS_RSA_WITH_AES_256_GCM_SHA384", |
100 |
| - "TLS_RSA_WITH_AES_128_GCM_SHA256", |
101 |
| - "TLS_RSA_WITH_AES_256_CBC_SHA256", |
102 |
| - "TLS_RSA_WITH_AES_256_CBC_SHA", |
103 |
| - "TLS_RSA_WITH_AES_128_CBC_SHA256", |
104 |
| - "TLS_RSA_WITH_AES_128_CBC_SHA", |
105 |
| - "TLS_RSA_WITH_3DES_EDE_CBC_SHA", |
106 |
| - # CCM is not in appendix C, but footnote 31 makes it Good (on its own) |
107 |
| - "TLS_RSA_WITH_AES_128_CCM", |
108 |
| - "TLS_RSA_WITH_AES_256_CCM", |
| 104 | + "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256", |
| 105 | + "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256", |
| 106 | + "TLS_DHE_RSA_WITH_AES_128_CCM", |
| 107 | + "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256", |
109 | 108 | ]
|
110 | 109 |
|
111 |
| -# NCSC table 1 |
| 110 | +# NCSC 3.3.1 |
112 | 111 | PROTOCOLS_GOOD = [
|
113 | 112 | TlsVersionEnum.TLS_1_3,
|
114 | 113 | ]
|
115 | 114 |
|
116 | 115 | PROTOCOLS_SUFFICIENT = [
|
117 | 116 | TlsVersionEnum.TLS_1_2,
|
118 | 117 | ]
|
119 |
| -PROTOCOLS_PHASE_OUT = [ |
120 |
| - TlsVersionEnum.TLS_1_1, |
121 |
| - TlsVersionEnum.TLS_1_0, |
122 |
| -] |
| 118 | +PROTOCOLS_PHASE_OUT = [] |
123 | 119 |
|
124 | 120 | # NCSC table 5
|
125 | 121 | # This is eventually passed to openssl's SSL_set1_sigalgs,
|
|
0 commit comments