@@ -21,7 +21,9 @@ $ ./mvnw clean install
21
21
```
22
22
23
23
For hints on installing the required libraries checkout the corresponding GitHub repositories:
24
+
24
25
[ TLS-Attacker] ( https://github.com/RUB-NDS/TLS-Attacker-Development )
26
+
25
27
[ ModifiableVariables] ( https://github.com/RUB-NDS/ModifiableVariable )
26
28
27
29
# Running
@@ -39,18 +41,21 @@ TLS-Scanner uses the concept of "Checks" which are performed after it collected
39
41
40
42
There are currently multiple checks implemented:
41
43
42
- ⋅⋅* CERTIFICATE_EXPIRED - Checks if the Certificate is expired yet
43
- ⋅⋅* CERTIFICATE_NOT_VALID_YET - Checks if the Certificate is valid yet
44
- ⋅⋅* CERTIFICATE_WEAK_HASH_FUNCTION - Checks if the Server uses a weak Hash algorithm for its Certificate
45
- ⋅⋅* CERTIFICATE_WEAK_SIGN_ALGORITHM - Checks if the Server uses a weak Signature algorithm for its Certificate
46
- ⋅⋅* CERTIFICATE_NOT_SENT_BY_SERVER - Checks if the Server did sent a Certificate at all
47
- ⋅⋅* CIPHERSUITE_ANON - Checks if the Server has Anon Ciphersuites enabled
48
- ⋅⋅* CIPHERSUITE_CBC - Checks if the Server has CBC Ciphersuites enabled for TLS 1.0
49
- ⋅⋅* CIPHERSUITE_EXPORT - Checks if the Server has Export Ciphersuites enabled
50
- ⋅⋅* CIPHERSUITE_NULL - Checks if the Server has Null Ciphersuites enabled
51
- ⋅⋅* CIPHERSUITE_RC4 - Checks if the Server has RC4 Ciphersuites enabled
52
- ⋅⋅* CIPHERSUITEORDER_ENFORCED - Checks if the Server does not enforce a Ciphersuite Ordering
53
- ⋅⋅* PROTOCOLVERSION_SSL2 - Checks if SSL 2 is enabled
54
- ⋅⋅* PROTOCOLVERSION_SSL3 - Checks if SSL 3 is enabled
44
+
45
+ | Check | Meaning |
46
+ | ------------------------------- | :------------------------------------------------------------------------:|
47
+ | CERTIFICATE_EXPIRED | Checks if the Certificate is expired yet |
48
+ | CERTIFICATE_NOT_VALID_YET | Checks if the Certificate is valid yet |
49
+ | CERTIFICATE_WEAK_HASH_FUNCTION | Checks if the Server uses a weak Hash algorithm for its Certificate |
50
+ | CERTIFICATE_WEAK_SIGN_ALGORITHM | Checks if the Server uses a weak Signature algorithm for its Certificate |
51
+ | CERTIFICATE_NOT_SENT_BY_SERVER | Checks if the Server did sent a Certificate at all |
52
+ | CIPHERSUITE_ANON | Checks if the Server has Anon Ciphersuites enabled |
53
+ | CIPHERSUITE_CBC | Checks if the Server has CBC Ciphersuites enabled for TLS 1.0 |
54
+ | CIPHERSUITE_EXPORT | Checks if the Server has Export Ciphersuites enabled |
55
+ | CIPHERSUITE_NULL | Checks if the Server has Null Ciphersuites enabled |
56
+ | CIPHERSUITE_RC4 | Checks if the Server has RC4 Ciphersuites enabled |
57
+ | CIPHERSUITEORDER_ENFORCED | Checks if the Server does not enforce a Ciphersuite ordering |
58
+ | PROTOCOLVERSION_SSL2 | Checks if SSL 2 is enabled |
59
+ | PROTOCOLVERSION_SSL3 | Checks if SSL 3 is enabled |
55
60
56
61
** Please note:** * A Check with a _ result_ of true is considered non optimal*
0 commit comments