|
5 | 5 | from sslyze import TlsVersionEnum |
6 | 6 |
|
7 | 7 |
|
8 | | -# NCSC guideline B3-2 / table 2 and 3 |
| 8 | +# NCSC 3.3.2 / 3.3.5 |
9 | 9 | CERT_SIGALG_GOOD = [ |
10 | 10 | SignatureAlgorithmOID.RSA_WITH_SHA256, |
11 | 11 | SignatureAlgorithmOID.RSA_WITH_SHA384, |
|
20 | 20 | CERT_RSA_DSA_MIN_KEY_SIZE = 2048 |
21 | 21 | CERT_CURVE_MIN_KEY_SIZE = 224 |
22 | 22 |
|
23 | | -# NCSC table 9 |
| 23 | +# NCSC 3.3.2.1 |
24 | 24 | CERT_CURVES_GOOD = [x25519.X25519PublicKey, x448.X448PublicKey] |
25 | | -CERT_EC_CURVES_GOOD = [ec.SECP384R1, ec.SECP256R1] |
| 25 | +CERT_EC_CURVES_GOOD = [ |
| 26 | + ec.SECP521R1, |
| 27 | + ec.SECP384R1, |
| 28 | + ec.SECP256R1, |
| 29 | + ec.BrainpoolP512R1, |
| 30 | + ec.BrainpoolP384R1, |
| 31 | + ec.BrainpoolP256R1, |
| 32 | +] |
26 | 33 | CERT_EC_CURVES_PHASE_OUT = [ec.SECP224R1] |
27 | 34 | FS_ECDH_MIN_KEY_SIZE = 224 |
28 | 35 | FS_DH_MIN_KEY_SIZE = 2048 |
29 | 36 |
|
| 37 | +# NCSC 3.3.2.1 |
30 | 38 | FS_EC_GOOD = [ |
31 | 39 | OpenSslEcNidEnum.SECP521R1, |
32 | 40 | OpenSslEcNidEnum.SECP384R1, |
33 | 41 | OpenSslEcNidEnum.SECP256R1, |
| 42 | + OpenSslEcNidEnum.brainpoolP512r1, |
| 43 | + OpenSslEcNidEnum.brainpoolP384r1, |
| 44 | + OpenSslEcNidEnum.brainpoolP256r1, |
34 | 45 | OpenSslEcNidEnum.X25519, |
35 | 46 | OpenSslEcNidEnum.X448, |
36 | 47 | ] |
|
39 | 50 | ] |
40 | 51 |
|
41 | 52 |
|
42 | | -# NCSC appendix C, derived from table 2, 6 and 7 |
43 | | -# Anything not in these lists, is insufficient. |
| 53 | +# NCSC appendix B, derived from 3.3.3, 3.3.4 |
| 54 | +# PQC not yet supported by us |
| 55 | +# Anything not in these lists is insufficient. |
44 | 56 | CIPHERS_GOOD = [ |
45 | 57 | "TLS_AES_256_GCM_SHA384", |
46 | 58 | "TLS_CHACHA20_POLY1305_SHA256", |
| 59 | +] |
| 60 | +CIPHERS_SUFFICIENT = [ |
47 | 61 | "TLS_AES_128_GCM_SHA256", |
48 | | - # NCSC appendix C lists these as sufficient, but read |
49 | | - # footnote 52 carefully. As we test TLS version separate |
50 | | - # from cipher list, we consider them good. |
51 | | - "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", |
| 62 | + "TLS_AES_128_CCM_SHA256", |
52 | 63 | "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256", |
| 64 | + "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", |
| 65 | + "TLS_ECDHE_ECDSA_WITH_AES_256_CCM", |
53 | 66 | "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", |
54 | | - "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", |
| 67 | + "TLS_ECDHE_ECDSA_WITH_AES_128_CCM", |
55 | 68 | "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256", |
| 69 | + "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", |
56 | 70 | "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", |
57 | | - # CCM is not in appendix C, but footnote 31 makes it Good (CCM_8 is insufficient) |
58 | | - "TLS_AES_128_CCM_SHA256", # TLS 1.3 notation |
59 | | - "TLS_ECDHE_ECDSA_WITH_AES_128_CCM", |
60 | | - "TLS_ECDHE_ECDSA_WITH_AES_256_CCM", |
61 | 71 | ] |
62 | | -CIPHERS_SUFFICIENT = [ |
| 72 | +CIPHERS_PHASE_OUT = [ |
| 73 | + "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384", |
| 74 | + "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384", |
| 75 | + "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256", |
| 76 | + "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256", |
| 77 | + "TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384", |
| 78 | + "TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384", |
| 79 | + "TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256", |
| 80 | + "TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256", |
63 | 81 | "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384", |
64 | | - "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA", |
65 | 82 | "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256", |
66 | | - "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA", |
| 83 | + "TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384", |
| 84 | + "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384", |
| 85 | + "TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256", |
| 86 | + "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256", |
| 87 | + "TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384", |
| 88 | + "TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384", |
| 89 | + "TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256", |
| 90 | + "TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256", |
67 | 91 | "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384", |
68 | | - "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA", |
69 | 92 | "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256", |
70 | | - "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", |
71 | | - "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384", |
72 | 93 | "TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256", |
73 | | - "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256", |
74 | | - "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256", |
75 | | - "TLS_DHE_RSA_WITH_AES_256_CBC_SHA", |
76 | | - "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256", |
77 | | - "TLS_DHE_RSA_WITH_AES_128_CBC_SHA", |
78 | | - # CAMELLIA is not in appendix C but is sufficient (footnote 31) |
79 | | - "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA", |
80 | | - "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256", |
81 | | - "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA", |
| 94 | + "TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384", |
82 | 95 | "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256", |
83 | | - "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA", |
84 | | - "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256", |
85 | | - "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA", |
86 | | - "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256", |
87 | | - "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256", |
88 | | - "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384", |
89 | | - "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256", |
90 | | - "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384", |
91 | | - # CCM is not in appendix C, but footnote 31 makes it Good (on its own) |
92 | | - "TLS_DHE_RSA_WITH_AES_128_CCM", |
| 96 | + "TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256", |
| 97 | + "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256", |
| 98 | + "TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384", |
| 99 | + "TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384", |
| 100 | + "TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256", |
| 101 | + "TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256", |
| 102 | + "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384", |
93 | 103 | "TLS_DHE_RSA_WITH_AES_256_CCM", |
94 | | -] |
95 | | -CIPHERS_PHASE_OUT = [ |
96 | | - "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA", |
97 | | - "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA", |
98 | | - "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA", |
99 | | - "TLS_RSA_WITH_AES_256_GCM_SHA384", |
100 | | - "TLS_RSA_WITH_AES_128_GCM_SHA256", |
101 | | - "TLS_RSA_WITH_AES_256_CBC_SHA256", |
102 | | - "TLS_RSA_WITH_AES_256_CBC_SHA", |
103 | | - "TLS_RSA_WITH_AES_128_CBC_SHA256", |
104 | | - "TLS_RSA_WITH_AES_128_CBC_SHA", |
105 | | - "TLS_RSA_WITH_3DES_EDE_CBC_SHA", |
106 | | - # CCM is not in appendix C, but footnote 31 makes it Good (on its own) |
107 | | - "TLS_RSA_WITH_AES_128_CCM", |
108 | | - "TLS_RSA_WITH_AES_256_CCM", |
| 104 | + "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256", |
| 105 | + "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256", |
| 106 | + "TLS_DHE_RSA_WITH_AES_128_CCM", |
| 107 | + "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256", |
109 | 108 | ] |
110 | 109 |
|
111 | | -# NCSC table 1 |
| 110 | +# NCSC 3.3.1 |
112 | 111 | PROTOCOLS_GOOD = [ |
113 | 112 | TlsVersionEnum.TLS_1_3, |
114 | 113 | ] |
115 | 114 |
|
116 | 115 | PROTOCOLS_SUFFICIENT = [ |
117 | 116 | TlsVersionEnum.TLS_1_2, |
118 | 117 | ] |
119 | | -PROTOCOLS_PHASE_OUT = [ |
120 | | - TlsVersionEnum.TLS_1_1, |
121 | | - TlsVersionEnum.TLS_1_0, |
122 | | -] |
| 118 | +PROTOCOLS_PHASE_OUT = [] |
123 | 119 |
|
124 | 120 | # NCSC table 5 |
125 | 121 | # This is eventually passed to openssl's SSL_set1_sigalgs, |
|
0 commit comments