Skip to content

Commit 42540cb

Browse files
committed
Add CAMELLIA as sufficient
1 parent 80bc4ef commit 42540cb

File tree

3 files changed

+20
-7
lines changed

3 files changed

+20
-7
lines changed

checks/tasks/tls/evaluation.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,6 @@ def from_ciphers_accepted(cls, ciphers_accepted: List[CipherSuiteAcceptedByServe
172172

173173
@staticmethod
174174
def _format_str(suites: List[CipherSuite]) -> List[str]:
175-
# TODO: remove IANA name, just here for debugging now
176175
return [f"{suite.openssl_name} ({suite.name})" for suite in suites]
177176

178177
@property

checks/tasks/tls/scans.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -546,7 +546,6 @@ def check_mail_tls(server, dane_cb_data, task):
546546
if result.scan_result.tls_1_3_early_data.result.supports_early_data
547547
else scoring.WEB_TLS_ZERO_RTT_GOOD
548548
),
549-
# TODO appears to be currently unsupported
550549
kex_hash_func=KexHashFuncStatus.good,
551550
kex_hash_func_score=scoring.WEB_TLS_KEX_HASH_FUNC_OK,
552551
)
@@ -763,11 +762,11 @@ def test_cipher_order(
763762
(cipher_evaluation.ciphers_bad, cipher_evaluation.ciphers_phase_out),
764763
]
765764
for expected_less_preferred, expected_more_preferred_list in order_tuples:
766-
# Sort CHACHA as later in the list, in case SSL_OP_PRIORITIZE_CHACHA is enabled #461
767-
expected_less_preferred.sort(key=lambda c: "CHACHA" in c.name)
768765
if cipher_order_violation:
769-
print("break out, got bad")
770766
break
767+
# Sort CHACHA as later in the list, in case SSL_OP_PRIORITIZE_CHACHA is enabled #461
768+
expected_less_preferred.sort(key=lambda c: "CHACHA" in c.name)
769+
print(f"checking server pref against: {[s.name for s in expected_more_preferred_list]}")
771770
for expected_more_preferred in expected_more_preferred_list:
772771
print(
773772
f"evaluating less {[s.name for s in expected_less_preferred]} vs "
@@ -780,7 +779,7 @@ def test_cipher_order(
780779
)
781780
if preferred_suite != expected_more_preferred:
782781
cipher_order_violation = [preferred_suite.name, expected_more_preferred.name]
783-
print(f"break out, got bad inner: {cipher_order_violation}")
782+
print(f"break out, got bad order: {cipher_order_violation}")
784783
break
785784

786785
return TLSCipherOrderEvaluation(
@@ -807,6 +806,7 @@ def find_most_preferred_cipher_suite(
807806
ssl_connection = server_connectivity_info.get_preconfigured_tls_connection(
808807
override_tls_version=tls_version, should_use_legacy_openssl=requires_legacy_openssl
809808
)
809+
print(f"{suite_names=}")
810810
_set_cipher_suite_string(tls_version, ":".join(suite_names), ssl_connection.ssl_client)
811811

812812
try:
@@ -823,5 +823,5 @@ def find_most_preferred_cipher_suite(
823823
selected_cipher = CipherSuitesRepository.get_cipher_suite_with_openssl_name(
824824
tls_version, ssl_connection.ssl_client.get_current_cipher_name()
825825
)
826-
print(f"from CS {suite_names} selected {selected_cipher}")
826+
print(f"from CS {[s.name for s in cipher_suites]} selected {selected_cipher}")
827827
return selected_cipher

checks/tasks/tls/tls_constants.py

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@
3838
OpenSslEcNidEnum.SECP224R1,
3939
]
4040

41+
4142
# NCSC appendix C, derived from table 2, 6 and 7
4243
CIPHERS_GOOD = [
4344
"TLS_AES_256_GCM_SHA384",
@@ -69,6 +70,19 @@
6970
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
7071
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256",
7172
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
73+
# CAMELLIA is not in appendix C but is sufficient (footnote 31)
74+
"TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA",
75+
"TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256",
76+
"TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA",
77+
"TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256",
78+
"TLS_RSA_WITH_CAMELLIA_128_CBC_SHA",
79+
"TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256",
80+
"TLS_RSA_WITH_CAMELLIA_256_CBC_SHA",
81+
"TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256",
82+
"TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256",
83+
"TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384",
84+
"TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256",
85+
"TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384",
7286
]
7387
CIPHERS_PHASE_OUT = [
7488
"TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA",

0 commit comments

Comments
 (0)