Skip to content

Commit 47cb164

Browse files
authored
Merge pull request #10 from RUB-NDS/readme
Changed listing to a table
2 parents 34bb20f + c263b2a commit 47cb164

File tree

1 file changed

+18
-13
lines changed

1 file changed

+18
-13
lines changed

README.md

Lines changed: 18 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,9 @@ $ ./mvnw clean install
2121
```
2222

2323
For hints on installing the required libraries checkout the corresponding GitHub repositories:
24+
2425
[TLS-Attacker](https://github.com/RUB-NDS/TLS-Attacker-Development)
26+
2527
[ModifiableVariables](https://github.com/RUB-NDS/ModifiableVariable)
2628

2729
# Running
@@ -39,18 +41,21 @@ TLS-Scanner uses the concept of "Checks" which are performed after it collected
3941

4042
There are currently multiple checks implemented:
4143

42-
⋅⋅* CERTIFICATE_EXPIRED - Checks if the Certificate is expired yet
43-
⋅⋅* CERTIFICATE_NOT_VALID_YET - Checks if the Certificate is valid yet
44-
⋅⋅* CERTIFICATE_WEAK_HASH_FUNCTION - Checks if the Server uses a weak Hash algorithm for its Certificate
45-
⋅⋅* CERTIFICATE_WEAK_SIGN_ALGORITHM - Checks if the Server uses a weak Signature algorithm for its Certificate
46-
⋅⋅* CERTIFICATE_NOT_SENT_BY_SERVER - Checks if the Server did sent a Certificate at all
47-
⋅⋅* CIPHERSUITE_ANON - Checks if the Server has Anon Ciphersuites enabled
48-
⋅⋅* CIPHERSUITE_CBC - Checks if the Server has CBC Ciphersuites enabled for TLS 1.0
49-
⋅⋅* CIPHERSUITE_EXPORT - Checks if the Server has Export Ciphersuites enabled
50-
⋅⋅* CIPHERSUITE_NULL - Checks if the Server has Null Ciphersuites enabled
51-
⋅⋅* CIPHERSUITE_RC4 - Checks if the Server has RC4 Ciphersuites enabled
52-
⋅⋅* CIPHERSUITEORDER_ENFORCED - Checks if the Server does not enforce a Ciphersuite Ordering
53-
⋅⋅* PROTOCOLVERSION_SSL2 - Checks if SSL 2 is enabled
54-
⋅⋅* PROTOCOLVERSION_SSL3 - Checks if SSL 3 is enabled
44+
45+
| Check | Meaning |
46+
| ------------------------------- |:------------------------------------------------------------------------:|
47+
| CERTIFICATE_EXPIRED | Checks if the Certificate is expired yet |
48+
| CERTIFICATE_NOT_VALID_YET | Checks if the Certificate is valid yet |
49+
| CERTIFICATE_WEAK_HASH_FUNCTION | Checks if the Server uses a weak Hash algorithm for its Certificate |
50+
| CERTIFICATE_WEAK_SIGN_ALGORITHM | Checks if the Server uses a weak Signature algorithm for its Certificate |
51+
| CERTIFICATE_NOT_SENT_BY_SERVER | Checks if the Server did sent a Certificate at all |
52+
| CIPHERSUITE_ANON | Checks if the Server has Anon Ciphersuites enabled |
53+
| CIPHERSUITE_CBC | Checks if the Server has CBC Ciphersuites enabled for TLS 1.0 |
54+
| CIPHERSUITE_EXPORT | Checks if the Server has Export Ciphersuites enabled |
55+
| CIPHERSUITE_NULL | Checks if the Server has Null Ciphersuites enabled |
56+
| CIPHERSUITE_RC4 | Checks if the Server has RC4 Ciphersuites enabled |
57+
| CIPHERSUITEORDER_ENFORCED | Checks if the Server does not enforce a Ciphersuite ordering |
58+
| PROTOCOLVERSION_SSL2 | Checks if SSL 2 is enabled |
59+
| PROTOCOLVERSION_SSL3 | Checks if SSL 3 is enabled |
5560

5661
**Please note:** *A Check with a _result_ of true is considered non optimal*

0 commit comments

Comments
 (0)