-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Key exchange parameters subtest: check for the exact ECDHE curves #972
Comments
@gthess Can you remember if there was a certain reason to not test for the exact curve? |
No, looking at the code I believe that this part was probably not updated for the new guidelines. From a quick look I don't see the length requirement in the current guidelines. |
In the first version of NCSC's TLS guidelines footnote 9 clarified the term "Andere krommen" with status "Onvoldoende" as follows:
|
It seems that this earlier footnote was not used in the earlier code and I believe the check there was wrong and it bled through to the current version.
For the last sentence specifically I sadly have no recollection; the code seems to suggest otherwise unless we don't get any values from nassl. |
Found some mail conversations between GT and BK from1 Nov 2019 when the we implemented version 2 of NCSC's TLS guidelines in Internet.nl. Below some relevant quotes:
|
This will almost certainly be outdated by #1218 as that gets us exact curve names. |
The Key exchange parameters subtest does not seem to check for the exact curve but only for the length. Therefore, for example, the cruve sect283k1 (length >=224) now passes the test, while it should fail because it is considered to be "Insufficient" according to the NCSC's TLS guidelines (table 9).
The text was updated successfully, but these errors were encountered: