ssllabs / ssllabs-scan

A command-line reference-implementation client for SSL Labs APIs, designed for automated and/or bulk testing.
https://www.ssllabs.com/projects/ssllabs-apis/
Apache License 2.0
1.7k stars 242 forks source link

Servers can still get an A even if they can't handshake with most browsers #507

Open Pascal666 opened 7 years ago

Pascal666 commented 7 years ago

Handshake Simulation results do not appear to affect a server's Overall Rating.

ArchangeGabriel commented 7 years ago

Yes, and I think this is partially right since getting maximum scores means you have to break support for most browsers. It’s even worse if you consider all NIST curves to be backdoored and choose to support only 25519 and/or 448.

Pascal666 commented 7 years ago

Handshaking with older browsers probably shouldn't matter, but IMHO a server that cannot handshake with the current versions of Chrome, Firefox, and Android should not be given an A. Perhaps the loss of a grade for each major browser whose current version the server cannot handshake with?

ArchangeGabriel commented 7 years ago

OK, then in this direction you’re likely already penalized for this: latest version of Chrome/Firefox/Android supports secure crypto, if you do not support them this very likely mean that you only support obsolete crytpo. Or do you have other ideas/example in mind? Especially a site that effectively scores an A but does not handshake with either Android, Chrome or Firefox in their latest version?

Pascal666 commented 7 years ago

Example of a severely broken server receiving an A: screencapture-ssllabs-ssltest-analyze-html-1496223097318

ArchangeGabriel commented 7 years ago

Hum. I see, Firefox/Chrome/Android do not support AES CBC with SHA-2, only SHA-1 (not sure why though). Well I would be in favour of moving SHA-1 suites support to a lower grade. But I’m not running SSLLabs.

Looking a bit around I found this: https://community.qualys.com/thread/12415. So I guess this is expected as a valid behaviour.

Lack of support in browsers is strange especially in the light of the Modern section in https://wiki.mozilla.org/Security/Server_Side_TLS.

ivanr commented 7 years ago

As you've correctly pointed out, interoperability is not taken into account at the moment. I will consider it for the next grading update. Thanks!