Skip to content

Commit 9350c26

Browse files
committed
Remove sufficient_above_good cipher order
We decided not to test this scenario after considering the suites at each level. Only bad>(sufficient+good) is considered.
1 parent e3f3a37 commit 9350c26

File tree

5 files changed

+5
-29
lines changed

5 files changed

+5
-29
lines changed

checks/categories.py

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1098,11 +1098,6 @@ def result_na(self):
10981098
self.verdict = "detail web tls cipher-order verdict na"
10991099
self.tech_data = ""
11001100

1101-
def result_sufficient_above_good(self):
1102-
self._status(STATUS_INFO)
1103-
self.verdict = "detail web tls cipher-order verdict sufficient-above-good"
1104-
self.tech_data = ""
1105-
11061101

11071102
class WebTlsVersion(Subtest):
11081103
def __init__(self):
@@ -1751,11 +1746,6 @@ def result_na(self):
17511746
self.verdict = "detail mail tls cipher-order verdict na"
17521747
self.tech_data = ""
17531748

1754-
def result_sufficient_above_good(self):
1755-
self._status(STATUS_INFO)
1756-
self.verdict = "detail web tls cipher-order verdict sufficient-above-good"
1757-
self.tech_data = ""
1758-
17591749

17601750
class MailTlsVersion(Subtest):
17611751
def __init__(self):

checks/models.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,6 @@ class CipherOrderStatus(Enum):
114114
not_prescribed = 2
115115
not_seclevel = 3
116116
na = 4 # Don't care about order; only GOOD ciphers.
117-
sufficient_above_good = 5
118117

119118

120119
class TLSExtendedMasterSecretStatus(Enum):

checks/tasks/tls/scans.py

Lines changed: 5 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -999,19 +999,11 @@ def test_cipher_order(
999999

10001000
order_tuples = [
10011001
(
1002-
CipherOrderStatus.sufficient_above_good,
1003-
cipher_evaluation.ciphers_bad + cipher_evaluation.ciphers_phase_out + cipher_evaluation.ciphers_sufficient,
1004-
# Make sure we do not mix in TLS 1.3 ciphers, all TLS 1.3 ciphers are good.
1005-
cipher_evaluation.ciphers_good_no_tls13,
1002+
cipher_evaluation.ciphers_phase_out,
1003+
cipher_evaluation.ciphers_sufficient + cipher_evaluation.ciphers_good_no_tls13,
10061004
),
1007-
(
1008-
CipherOrderStatus.bad,
1009-
cipher_evaluation.ciphers_bad + cipher_evaluation.ciphers_phase_out,
1010-
cipher_evaluation.ciphers_sufficient,
1011-
),
1012-
(CipherOrderStatus.bad, cipher_evaluation.ciphers_bad, cipher_evaluation.ciphers_phase_out),
10131005
]
1014-
for fail_status, expected_less_preferred, expected_more_preferred_list in order_tuples:
1006+
for expected_less_preferred, expected_more_preferred_list in order_tuples:
10151007
if cipher_order_violation:
10161008
break
10171009
# Sort CHACHA as later in the list, in case SSL_OP_PRIORITIZE_CHACHA is enabled #461
@@ -1035,10 +1027,10 @@ def test_cipher_order(
10351027
)
10361028
if preferred_suite != expected_more_preferred:
10371029
cipher_order_violation = [preferred_suite.name, expected_more_preferred.name]
1038-
status = fail_status
1030+
status = CipherOrderStatus.bad
10391031
log.info(
10401032
f"found cipher order violation for {server_connectivity_info.server_location.hostname}:"
1041-
f" preferred {preferred_suite.name} instead of {expected_more_preferred.name}, status {fail_status}"
1033+
f" preferred {preferred_suite.name} instead of {expected_more_preferred.name}, status {status}"
10421034
)
10431035
break
10441036

checks/tasks/tls/tasks_reports.py

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -451,8 +451,6 @@ def annotate_and_combine_all(good_items, sufficient_items, bad_items, phaseout_i
451451
category.subtests["tls_cipher_order"].result_bad(dttls.cipher_order_violation)
452452
elif dttls.cipher_order == CipherOrderStatus.na:
453453
category.subtests["tls_cipher_order"].result_na()
454-
elif dttls.cipher_order == CipherOrderStatus.sufficient_above_good:
455-
category.subtests["tls_cipher_order"].result_sufficient_above_good()
456454
else:
457455
category.subtests["tls_cipher_order"].result_good()
458456

@@ -614,8 +612,6 @@ def annotate_and_combine_all(good_items, sufficient_items, bad_items, phaseout_i
614612
category.subtests["tls_cipher_order"].result_bad(dttls.cipher_order_violation)
615613
elif dttls.cipher_order == CipherOrderStatus.na:
616614
category.subtests["tls_cipher_order"].result_na()
617-
elif dttls.cipher_order == CipherOrderStatus.sufficient_above_good:
618-
category.subtests["tls_cipher_order"].result_sufficient_above_good()
619615
else:
620616
category.subtests["tls_cipher_order"].result_good()
621617

interface/batch/openapi.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -636,7 +636,6 @@ components:
636636
the configured order is not based on security level (deprecated).
637637
* `na` - The server only supports GOOD ciphers; cipher order is
638638
not relevant.
639-
* `sufficient_above_good` - the server prefers sufficient ciphers over good.
640639
cipher_order_violation:
641640
type: array
642641
description: |

0 commit comments

Comments
 (0)