Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Different results with sslyze 6.1.0 #688

Open
friedelwolff opened this issue Jan 8, 2025 · 1 comment
Open

Different results with sslyze 6.1.0 #688

friedelwolff opened this issue Jan 8, 2025 · 1 comment

Comments

@friedelwolff
Copy link

Firstly, thanks for sslyze!

When testing my domains against Mozilla's intermediate configuration, I get a failure when upgrading to version 6.1.0. sslyze 6.0.0 and ssllabs.com are still happy with my configuration.

Steps to reproduce the behaviour:

  1. Install SSLyze using pip
  2. Run sslyze --mozilla_config intermediate sadilar.org
  3. See output:
    sadilar.org:443: FAILED - Not compliant.
        * tls_curves: TLS curves {'secp256k1', 'secp521r1'} are supported, but should be rejected.
        * tls_vulnerability_extended_master_secret: Server does not support the Extended Master Secret TLS extension.

Expected behaviour
With sslyze 6.0.0 for the same host passes successfully:

    sadilar.org:443: OK - Compliant.

Python environment:

  • My local Mageia OS with Python 3.10
  • also on our CI system which is using the docker image python:3.11-slim (Debian based)

Additional related issue:
On a different host (mvn.sadilar.org) which has a different web server (but also the Mozilla intermediate configuration), gives different output, but this is also new with sslyze 6.1.0:

mvn.sadilar.org:443: FAILED - Not compliant.

        * certificate_curves: Certificate curve is secp256r1, should be one of {'secp384r1', 'prime256v1'}.
        * tls_curves: TLS curves {'secp521r1', 'X448'} are supported, but should be rejected.
@nabla-c0d3
Copy link
Owner

Hello,

The Mozilla intermediate profile requires specific curves to be enabled (https://github.com/nabla-c0d3/sslyze/blob/release/sslyze/mozilla_tls_profile/5.7.json#L90). This requirement was previously disabled (in SSLyze v6.0.0) and has been enabled in v6.1.0.

The check for Extended Master Secret TLS extension is a new check; see also https://www.redhat.com/en/blog/tls-extended-master-secret-and-fips-rhel

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants