2014-01-10 06:50:03 +01:00
|
|
|
#!/usr/bin/env python
|
|
|
|
|
2014-05-20 14:23:57 +02:00
|
|
|
# This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
# Author: Julien Vehent [:ulfr] - 2013
|
|
|
|
# Contributors: Hubert Kario - 2014
|
|
|
|
|
2014-01-11 02:07:32 +01:00
|
|
|
from __future__ import division
|
|
|
|
|
2014-01-10 06:50:03 +01:00
|
|
|
path = "./results/"
|
|
|
|
|
|
|
|
import json
|
|
|
|
import sys
|
|
|
|
from collections import defaultdict
|
|
|
|
import os
|
2014-06-24 15:59:24 +02:00
|
|
|
import re
|
|
|
|
|
|
|
|
def natural_sort(l):
|
|
|
|
convert = lambda text: int(text) if text.isdigit() else text.lower()
|
|
|
|
alphanum_key = lambda key: [ convert(c) for c in re.split('([0-9]+)', key) ]
|
|
|
|
return sorted(l, key = alphanum_key)
|
2014-01-10 06:50:03 +01:00
|
|
|
|
2014-10-12 20:24:56 +02:00
|
|
|
""" client config cipher simulation """
|
|
|
|
client_ciphers={}
|
|
|
|
""" list of ciphers offered by Firefox 29 by default """
|
|
|
|
client_ciphers['FF 29']=[
|
2014-06-30 10:42:53 +02:00
|
|
|
'ECDHE-ECDSA-AES128-GCM-SHA256',
|
|
|
|
'ECDHE-RSA-AES128-GCM-SHA256',
|
|
|
|
'ECDHE-ECDSA-AES256-SHA',
|
|
|
|
'ECDHE-ECDSA-AES128-SHA',
|
|
|
|
'ECDHE-RSA-AES128-SHA',
|
|
|
|
'ECDHE-RSA-AES256-SHA',
|
|
|
|
'ECDHE-RSA-DES-CBC3-SHA',
|
|
|
|
'ECDHE-ECDSA-RC4-SHA',
|
|
|
|
'ECDHE-RSA-RC4-SHA',
|
|
|
|
'DHE-RSA-AES128-SHA',
|
|
|
|
'DHE-DSS-AES128-SHA',
|
|
|
|
'DHE-RSA-CAMELLIA128-SHA',
|
|
|
|
'DHE-RSA-AES256-SHA',
|
|
|
|
'DHE-DSS-AES256-SHA',
|
|
|
|
'DHE-RSA-CAMELLIA256-SHA',
|
|
|
|
'EDH-RSA-DES-CBC3-SHA',
|
|
|
|
'AES128-SHA',
|
|
|
|
'CAMELLIA128-SHA',
|
|
|
|
'AES256-SHA',
|
|
|
|
'CAMELLIA256-SHA',
|
|
|
|
'DES-CBC3-SHA',
|
|
|
|
'RC4-SHA',
|
|
|
|
'RC4-MD5']
|
|
|
|
|
2014-04-05 01:33:33 +02:00
|
|
|
report_untrused=False
|
|
|
|
|
2014-01-11 02:07:32 +01:00
|
|
|
cipherstats = defaultdict(int)
|
2014-10-12 20:24:56 +02:00
|
|
|
|
|
|
|
# stats about different client performance
|
|
|
|
# ciphers selected by them, unsupported, etc.
|
|
|
|
client_RC4_Only_cipherstats={}
|
|
|
|
client_RC4_preferred_cipherstats={}
|
|
|
|
client_incompatible_cipherstats={}
|
|
|
|
client_selected_cipherstats={}
|
|
|
|
for client_name in client_ciphers:
|
|
|
|
client_RC4_Only_cipherstats[client_name] = defaultdict(int)
|
|
|
|
client_RC4_preferred_cipherstats[client_name] = defaultdict(int)
|
|
|
|
client_incompatible_cipherstats[client_name] = defaultdict(int)
|
|
|
|
client_selected_cipherstats[client_name] = defaultdict(int)
|
|
|
|
|
2014-07-01 00:01:32 +02:00
|
|
|
cipherordering = defaultdict(int)
|
2014-01-11 02:07:32 +01:00
|
|
|
pfsstats = defaultdict(int)
|
|
|
|
protocolstats = defaultdict(int)
|
|
|
|
handshakestats = defaultdict(int)
|
2014-04-04 20:18:36 +02:00
|
|
|
keysize = defaultdict(int)
|
|
|
|
sigalg = defaultdict(int)
|
2014-05-16 16:55:19 +02:00
|
|
|
tickethint = defaultdict(int)
|
2014-05-16 17:31:44 +02:00
|
|
|
ocspstaple = defaultdict(int)
|
2014-04-04 21:08:38 +02:00
|
|
|
dsarsastack = 0
|
2014-01-11 02:07:32 +01:00
|
|
|
total = 0
|
2014-01-10 06:50:03 +01:00
|
|
|
for r,d,flist in os.walk(path):
|
2014-01-11 02:07:32 +01:00
|
|
|
|
2014-01-10 06:50:03 +01:00
|
|
|
for f in flist:
|
2014-01-11 02:07:32 +01:00
|
|
|
|
|
|
|
""" initialize variables for stats of the current site """
|
|
|
|
temppfsstats = {}
|
2014-04-04 20:18:36 +02:00
|
|
|
tempkeystats = {}
|
|
|
|
tempecckeystats = {}
|
|
|
|
tempdsakeystats = {}
|
|
|
|
tempsigstats = {}
|
2014-05-16 16:55:19 +02:00
|
|
|
tempticketstats = {}
|
2014-10-04 14:46:36 +02:00
|
|
|
""" supported ciphers by the server under scan """
|
2014-06-04 18:17:02 +02:00
|
|
|
tempcipherstats = {}
|
2014-01-11 02:07:32 +01:00
|
|
|
ciphertypes = 0
|
|
|
|
AESGCM = False
|
|
|
|
AES = False
|
2014-04-06 14:11:52 +02:00
|
|
|
CHACHA20 = False
|
2014-01-11 02:07:32 +01:00
|
|
|
DES3 = False
|
|
|
|
CAMELLIA = False
|
|
|
|
RC4 = False
|
2014-10-12 20:24:56 +02:00
|
|
|
""" variables to support handshake simulation for different clients """
|
|
|
|
client_RC4_Only={}
|
|
|
|
client_compat={}
|
|
|
|
temp_client_incompat={}
|
|
|
|
client_RC4_Pref={}
|
|
|
|
client_selected={}
|
|
|
|
for client_name in client_ciphers:
|
|
|
|
# the following depends on client_compat, so by default it can be True
|
|
|
|
client_RC4_Only[client_name]=True
|
|
|
|
client_compat[client_name]=False
|
|
|
|
temp_client_incompat[client_name]={}
|
|
|
|
client_RC4_Pref[client_name]=None
|
|
|
|
client_selected[client_name]=None
|
|
|
|
|
|
|
|
""" server side list of supported ciphers """
|
2014-07-01 00:01:32 +02:00
|
|
|
list_of_ciphers = []
|
2014-06-04 18:17:41 +02:00
|
|
|
ADH = False
|
2014-01-11 02:07:32 +01:00
|
|
|
DHE = False
|
2014-06-04 18:17:41 +02:00
|
|
|
AECDH = False
|
2014-01-11 02:07:32 +01:00
|
|
|
ECDHE = False
|
|
|
|
RSA = False
|
2014-06-04 18:17:41 +02:00
|
|
|
ECDH = False
|
|
|
|
DH = False
|
2014-01-11 02:07:32 +01:00
|
|
|
SSL2 = False
|
|
|
|
SSL3 = False
|
|
|
|
TLS1 = False
|
|
|
|
TLS1_1 = False
|
|
|
|
TLS1_2 = False
|
2014-04-04 21:08:38 +02:00
|
|
|
dualstack = False
|
|
|
|
ECDSA = False
|
2014-04-05 01:33:33 +02:00
|
|
|
trusted = False
|
2014-06-04 18:52:39 +02:00
|
|
|
ocsp_stapling = None
|
2014-01-11 02:07:32 +01:00
|
|
|
|
|
|
|
""" process the file """
|
2014-01-10 06:50:03 +01:00
|
|
|
f_abs = os.path.join(r,f)
|
|
|
|
with open(f_abs) as json_file:
|
2014-01-11 02:07:32 +01:00
|
|
|
""" discard files that fail to load """
|
|
|
|
try:
|
|
|
|
results = json.load(json_file)
|
|
|
|
except ValueError:
|
|
|
|
continue
|
|
|
|
|
|
|
|
""" discard files with empty results """
|
2014-01-10 06:50:03 +01:00
|
|
|
if len(results['ciphersuite']) < 1:
|
|
|
|
continue
|
2014-01-11 02:07:32 +01:00
|
|
|
|
|
|
|
""" loop over list of ciphers """
|
2014-01-10 06:50:03 +01:00
|
|
|
for entry in results['ciphersuite']:
|
2014-01-11 02:07:32 +01:00
|
|
|
|
2014-04-05 20:21:35 +02:00
|
|
|
# some servers return different certificates with different
|
|
|
|
# ciphers, also we may become redirected to other server with
|
|
|
|
# different config (because over-reactive IPS)
|
|
|
|
if 'False' in entry['trusted'] and report_untrused == False:
|
|
|
|
continue
|
2014-04-05 01:33:33 +02:00
|
|
|
|
2014-07-01 00:01:32 +02:00
|
|
|
list_of_ciphers.append(entry['cipher'])
|
|
|
|
|
2014-06-30 10:42:53 +02:00
|
|
|
# check if the advertised ciphers are not effectively RC4 Only
|
2014-10-12 20:24:56 +02:00
|
|
|
# for clients or incompatible with them
|
|
|
|
for client_name in client_ciphers:
|
|
|
|
if entry['cipher'] in client_ciphers[client_name]:
|
|
|
|
# if this is first cipher and we already are getting RC4
|
|
|
|
# then it means that RC4 is preferred (and client is
|
|
|
|
# compatible with server)
|
|
|
|
client_compat[client_name]=True
|
|
|
|
if not 'RC4' in entry['cipher']:
|
|
|
|
client_RC4_Only[client_name] = False
|
|
|
|
else:
|
|
|
|
temp_client_incompat[client_name][entry['cipher']] = 1
|
2014-06-30 10:42:53 +02:00
|
|
|
|
2014-01-11 02:07:32 +01:00
|
|
|
""" store the ciphers supported """
|
2014-06-04 15:15:32 +02:00
|
|
|
if 'ADH' in entry['cipher'] or 'AECDH' in entry['cipher']:
|
|
|
|
ciphertypes += 1
|
|
|
|
name = "z:" + entry['cipher']
|
2014-06-04 18:17:02 +02:00
|
|
|
tempcipherstats[name] = 1
|
2014-10-04 12:51:34 +02:00
|
|
|
tempcipherstats['Insecure'] = 1
|
2014-06-04 15:15:32 +02:00
|
|
|
elif 'AES128-GCM' in entry['cipher'] or 'AES256-GCM' in entry['cipher']:
|
2014-01-11 02:07:32 +01:00
|
|
|
if not AESGCM:
|
|
|
|
AESGCM = True
|
|
|
|
ciphertypes += 1
|
|
|
|
elif 'AES' in entry['cipher']:
|
|
|
|
if not AES:
|
|
|
|
AES = True
|
|
|
|
ciphertypes += 1
|
|
|
|
elif 'DES-CBC3' in entry['cipher']:
|
|
|
|
if not DES3:
|
|
|
|
DES3 = True
|
|
|
|
ciphertypes += 1
|
|
|
|
elif 'CAMELLIA' in entry['cipher']:
|
|
|
|
if not CAMELLIA:
|
|
|
|
CAMELLIA = True
|
|
|
|
ciphertypes += 1
|
|
|
|
elif 'RC4' in entry['cipher']:
|
|
|
|
if not RC4:
|
|
|
|
ciphertypes += 1
|
|
|
|
RC4 = True
|
2014-04-06 14:11:52 +02:00
|
|
|
elif 'CHACHA20' in entry['cipher']:
|
|
|
|
if not CHACHA20:
|
|
|
|
ciphertypes += 1
|
|
|
|
CHACHA20 = True
|
2014-10-04 12:51:34 +02:00
|
|
|
elif 'IDEA' in entry['cipher'] or 'SEED' in entry['cipher']:
|
|
|
|
ciphertypes += 1
|
|
|
|
name = "y:" + entry['cipher']
|
|
|
|
tempcipherstats[name] = 1
|
2014-01-11 02:07:32 +01:00
|
|
|
else:
|
|
|
|
ciphertypes += 1
|
|
|
|
name = "z:" + entry['cipher']
|
2014-06-04 18:17:02 +02:00
|
|
|
tempcipherstats[name] = 1
|
2014-10-04 12:51:34 +02:00
|
|
|
tempcipherstats['Insecure'] = 1
|
2014-01-11 02:07:32 +01:00
|
|
|
|
|
|
|
""" store key handshake methods """
|
2014-01-10 06:50:03 +01:00
|
|
|
if 'ECDHE' in entry['cipher']:
|
|
|
|
ECDHE = True
|
2014-01-11 02:07:32 +01:00
|
|
|
temppfsstats[entry['pfs']] = 1
|
2014-06-04 18:17:41 +02:00
|
|
|
elif 'DHE' in entry['cipher'] or 'EDH' in entry['cipher']:
|
2014-01-11 02:07:32 +01:00
|
|
|
DHE = True
|
|
|
|
temppfsstats[entry['pfs']] = 1
|
2014-06-04 18:17:41 +02:00
|
|
|
elif 'AECDH' in entry['cipher']:
|
|
|
|
AECDH = True
|
|
|
|
elif 'ADH' in entry['cipher']:
|
|
|
|
ADH = True
|
|
|
|
elif 'ECDH' in entry['cipher']:
|
|
|
|
ECDH = True
|
|
|
|
elif 'DH' in entry['cipher']:
|
|
|
|
DH = True
|
|
|
|
else:
|
|
|
|
RSA = True
|
2014-01-11 02:07:32 +01:00
|
|
|
|
2014-04-04 20:18:36 +02:00
|
|
|
""" save the key size """
|
2014-06-24 15:34:44 +02:00
|
|
|
if 'ECDSA' in entry['cipher'] or 'ECDH-RSA' in entry['cipher']:
|
2014-04-04 21:08:38 +02:00
|
|
|
ECDSA = True
|
2014-04-04 20:18:36 +02:00
|
|
|
tempecckeystats[entry['pubkey'][0]] = 1
|
|
|
|
elif 'DSS' in entry['cipher']:
|
|
|
|
tempdsakeystats[entry['pubkey'][0]] = 1
|
2014-04-04 21:08:38 +02:00
|
|
|
elif 'AECDH' in entry['cipher'] or 'ADH' in entry['cipher']:
|
|
|
|
""" skip """
|
2014-04-04 20:18:36 +02:00
|
|
|
else:
|
|
|
|
tempkeystats[entry['pubkey'][0]] = 1
|
2014-04-04 21:08:38 +02:00
|
|
|
if ECDSA:
|
|
|
|
dualstack = True
|
2014-04-04 20:18:36 +02:00
|
|
|
|
2014-04-05 20:21:35 +02:00
|
|
|
if 'True' in entry['trusted'] and not 'ADH' in entry['cipher'] and not 'AECDH' in entry['cipher']:
|
|
|
|
trusted = True
|
|
|
|
|
2014-04-04 20:18:36 +02:00
|
|
|
""" save key signatures size """
|
|
|
|
tempsigstats[entry['sigalg'][0]] = 1
|
|
|
|
|
2014-05-16 16:55:19 +02:00
|
|
|
""" save tls ticket hint """
|
2014-06-04 18:52:39 +02:00
|
|
|
if 'ticket_hint' in entry:
|
|
|
|
tempticketstats[entry['ticket_hint']] = 1
|
2014-05-16 16:55:19 +02:00
|
|
|
|
2014-05-16 17:31:44 +02:00
|
|
|
""" check if OCSP stapling is supported """
|
2014-06-04 18:52:39 +02:00
|
|
|
if 'ocsp_stapling' in entry:
|
|
|
|
if entry['ocsp_stapling'] == 'True':
|
|
|
|
ocsp_stapling=True
|
|
|
|
else:
|
|
|
|
ocsp_stapling=False
|
2014-05-16 17:31:44 +02:00
|
|
|
|
2014-01-11 02:07:32 +01:00
|
|
|
""" store the versions of TLS supported """
|
2014-01-10 06:50:03 +01:00
|
|
|
for protocol in entry['protocols']:
|
|
|
|
if protocol == 'SSLv2':
|
|
|
|
SSL2 = True
|
2014-01-11 02:07:32 +01:00
|
|
|
elif protocol == 'SSLv3':
|
2014-01-10 06:50:03 +01:00
|
|
|
SSL3 = True
|
2014-01-11 02:07:32 +01:00
|
|
|
elif protocol == 'TLSv1':
|
2014-01-10 06:50:03 +01:00
|
|
|
TLS1 = True
|
2014-01-11 02:07:32 +01:00
|
|
|
elif protocol == 'TLSv1.1':
|
2014-01-10 06:50:03 +01:00
|
|
|
TLS1_1 = True
|
2014-01-11 02:07:32 +01:00
|
|
|
elif protocol == 'TLSv1.2':
|
2014-01-10 06:50:03 +01:00
|
|
|
TLS1_2 = True
|
|
|
|
json_file.close()
|
2014-01-11 02:07:32 +01:00
|
|
|
|
2014-04-05 01:33:33 +02:00
|
|
|
""" don't store stats from unusued servers """
|
|
|
|
if report_untrused == False and trusted == False:
|
|
|
|
continue
|
|
|
|
|
|
|
|
total += 1
|
|
|
|
|
2014-01-11 02:07:32 +01:00
|
|
|
""" done with this file, storing the stats """
|
|
|
|
if DHE or ECDHE:
|
|
|
|
pfsstats['Support PFS'] += 1
|
|
|
|
if 'DHE-' in results['ciphersuite'][0]['cipher']:
|
|
|
|
pfsstats['Prefer PFS'] += 1
|
2014-04-06 14:15:32 +02:00
|
|
|
pfsstats['Prefer ' + results['ciphersuite'][0]['pfs']] += 1
|
2014-01-11 02:07:32 +01:00
|
|
|
for s in temppfsstats:
|
|
|
|
pfsstats[s] += 1
|
|
|
|
|
2014-04-04 20:18:36 +02:00
|
|
|
for s in tempkeystats:
|
|
|
|
keysize['RSA ' + s] += 1
|
|
|
|
for s in tempecckeystats:
|
|
|
|
keysize['ECDSA ' + s] += 1
|
|
|
|
for s in tempdsakeystats:
|
|
|
|
keysize['DSA ' + s] += 1
|
|
|
|
|
2014-04-04 21:08:38 +02:00
|
|
|
if dualstack:
|
|
|
|
dsarsastack += 1
|
|
|
|
|
2014-07-01 00:01:32 +02:00
|
|
|
""" save cipher ordering """
|
|
|
|
if 'serverside' in results:
|
|
|
|
if results['serverside'] == "False":
|
|
|
|
cipherordering['Client side'] += 1
|
|
|
|
else:
|
|
|
|
cipherordering['Server side'] += 1
|
|
|
|
else:
|
|
|
|
cipherordering['Unknown'] += 1
|
|
|
|
|
2014-10-12 20:24:56 +02:00
|
|
|
""" simulate handshake with clients """
|
|
|
|
for client_name in client_ciphers:
|
|
|
|
if client_compat[client_name]:
|
|
|
|
if 'serverside' in results and results['serverside'] == "False":
|
|
|
|
for cipher in client_ciphers[client_name]:
|
|
|
|
if cipher in list_of_ciphers:
|
|
|
|
client_selected[client_name] = cipher
|
|
|
|
if 'RC4' in cipher:
|
|
|
|
client_RC4_Pref[client_name] = True
|
|
|
|
break
|
|
|
|
else:
|
|
|
|
for cipher in list_of_ciphers:
|
|
|
|
if cipher in client_ciphers[client_name]:
|
|
|
|
client_selected[client_name] = cipher
|
|
|
|
if 'RC4' in cipher:
|
|
|
|
client_RC4_Pref[client_name] = True
|
|
|
|
break
|
2014-07-01 00:01:32 +02:00
|
|
|
|
2014-04-04 20:18:36 +02:00
|
|
|
for s in tempsigstats:
|
|
|
|
sigalg[s] += 1
|
|
|
|
|
2014-05-16 16:55:19 +02:00
|
|
|
if len(tempticketstats) == 1:
|
|
|
|
for s in tempticketstats:
|
|
|
|
tickethint[s + " only"] += 1
|
|
|
|
for s in tempticketstats:
|
|
|
|
tickethint[s] += 1
|
|
|
|
|
2014-06-04 18:52:39 +02:00
|
|
|
if ocsp_stapling is None:
|
|
|
|
ocspstaple['Unknown'] += 1
|
|
|
|
elif ocsp_stapling:
|
2014-05-16 17:31:44 +02:00
|
|
|
ocspstaple['Supported'] += 1
|
|
|
|
else:
|
|
|
|
ocspstaple['Unsupported'] += 1
|
|
|
|
|
2014-01-11 02:07:32 +01:00
|
|
|
""" store cipher stats """
|
|
|
|
if AESGCM:
|
|
|
|
cipherstats['AES-GCM'] += 1
|
|
|
|
if ciphertypes == 1:
|
|
|
|
cipherstats['AES-GCM Only'] += 1
|
|
|
|
if AES:
|
|
|
|
cipherstats['AES'] += 1
|
|
|
|
if ciphertypes == 1:
|
2014-04-06 14:09:03 +02:00
|
|
|
cipherstats['AES-CBC Only'] += 1
|
|
|
|
if (AES and ciphertypes == 1) or (AESGCM and ciphertypes == 1)\
|
|
|
|
or (AES and AESGCM and ciphertypes == 2):
|
2014-01-11 02:07:32 +01:00
|
|
|
cipherstats['AES Only'] += 1
|
2014-04-06 14:11:52 +02:00
|
|
|
if CHACHA20:
|
|
|
|
cipherstats['CHACHA20'] += 1
|
|
|
|
if ciphertypes == 1:
|
|
|
|
cipherstats['CHACHA20 Only'] += 1
|
2014-01-11 02:07:32 +01:00
|
|
|
if DES3:
|
|
|
|
cipherstats['3DES'] += 1
|
|
|
|
if ciphertypes == 1:
|
|
|
|
cipherstats['3DES Only'] += 1
|
|
|
|
if CAMELLIA:
|
|
|
|
cipherstats['CAMELLIA'] += 1
|
|
|
|
if ciphertypes == 1:
|
|
|
|
cipherstats['CAMELLIA Only'] += 1
|
|
|
|
if RC4:
|
|
|
|
cipherstats['RC4'] += 1
|
|
|
|
if ciphertypes == 1:
|
|
|
|
cipherstats['RC4 Only'] += 1
|
2014-04-06 14:19:37 +02:00
|
|
|
if 'RC4' in results['ciphersuite'][0]['cipher']:
|
|
|
|
if 'TLSv1.1' in results['ciphersuite'][0]['protocols'] or\
|
|
|
|
'TLSv1.2' in results['ciphersuite'][0]['protocols']:
|
|
|
|
cipherstats['RC4 forced in TLS1.1+'] += 1
|
|
|
|
cipherstats['RC4 Preferred'] += 1
|
|
|
|
|
2014-10-12 20:24:56 +02:00
|
|
|
for client_name in client_ciphers:
|
|
|
|
if client_compat[client_name]:
|
|
|
|
if 'ECDHE' in client_selected[client_name]:
|
|
|
|
client_selected_cipherstats[client_name]['x:ECDHE'] += 1
|
2014-10-25 16:11:18 +02:00
|
|
|
elif 'DHE' in client_selected[client_name] or \
|
|
|
|
'EDH' in client_selected[client_name]:
|
|
|
|
client_selected_cipherstats[client_name]['x:DHE'] += 1
|
2014-10-12 20:24:56 +02:00
|
|
|
else:
|
|
|
|
client_selected_cipherstats[client_name]['x:kRSA'] += 1
|
|
|
|
|
|
|
|
client_selected_cipherstats[client_name][client_selected[client_name]] += 1
|
|
|
|
|
|
|
|
if client_RC4_Only[client_name] and ciphertypes != 1:
|
|
|
|
cipherstats['x:' + client_name + ' RC4 Only'] += 1
|
|
|
|
for cipher in temp_client_incompat[client_name]:
|
|
|
|
client_RC4_Only_cipherstats[client_name][cipher] += 1
|
|
|
|
if client_RC4_Pref[client_name] and not 'RC4' in results['ciphersuite'][0]['cipher']:
|
|
|
|
cipherstats['x:' + client_name + ' RC4 Preferred'] += 1
|
|
|
|
for cipher in temp_client_incompat[client_name]:
|
|
|
|
client_RC4_preferred_cipherstats[client_name][cipher] += 1
|
2014-06-30 21:34:56 +02:00
|
|
|
else:
|
2014-10-12 20:24:56 +02:00
|
|
|
cipherstats['x:' + client_name + ' incompatible'] += 1
|
|
|
|
for cipher in temp_client_incompat[client_name]:
|
|
|
|
client_incompatible_cipherstats[client_name][cipher] += 1
|
2014-06-30 10:42:53 +02:00
|
|
|
|
2014-06-04 18:17:02 +02:00
|
|
|
for cipher in tempcipherstats:
|
|
|
|
cipherstats[cipher] += 1
|
2014-01-11 02:07:32 +01:00
|
|
|
|
|
|
|
""" store handshake stats """
|
2014-06-04 18:17:41 +02:00
|
|
|
if AECDH:
|
|
|
|
handshakestats['AECDH'] += 1
|
|
|
|
if ADH:
|
|
|
|
handshakestats['ADH'] += 1
|
2014-01-11 02:07:32 +01:00
|
|
|
if ECDHE:
|
|
|
|
handshakestats['ECDHE'] += 1
|
|
|
|
if DHE:
|
|
|
|
handshakestats['DHE'] += 1
|
2014-06-04 18:52:39 +02:00
|
|
|
if DHE and ECDHE:
|
|
|
|
handshakestats['ECDHE and DHE'] += 1
|
2014-06-04 18:17:41 +02:00
|
|
|
if ECDH:
|
|
|
|
handshakestats['ECDH'] += 1
|
|
|
|
if DH:
|
|
|
|
handshakestats['DH'] += 1
|
2014-01-11 02:07:32 +01:00
|
|
|
if RSA:
|
|
|
|
handshakestats['RSA'] += 1
|
|
|
|
|
|
|
|
""" store protocol stats """
|
|
|
|
if SSL2:
|
|
|
|
protocolstats['SSL2'] += 1
|
|
|
|
if not SSL3 and not TLS1 and not TLS1_1 and not TLS1_2:
|
|
|
|
protocolstats['SSL2 Only'] += 1
|
|
|
|
if SSL3:
|
|
|
|
protocolstats['SSL3'] += 1
|
|
|
|
if not SSL2 and not TLS1 and not TLS1_1 and not TLS1_2:
|
|
|
|
protocolstats['SSL3 Only'] += 1
|
|
|
|
if TLS1:
|
|
|
|
protocolstats['TLS1'] += 1
|
|
|
|
if not SSL2 and not SSL3 and not TLS1_1 and not TLS1_2:
|
|
|
|
protocolstats['TLS1 Only'] += 1
|
2014-04-06 14:17:24 +02:00
|
|
|
if not SSL2 and (SSL3 or TLS1) and not TLS1_1 and not TLS1_2:
|
|
|
|
protocolstats['SSL3 or TLS1 Only'] += 1
|
|
|
|
if not SSL2 and not SSL3 and not TLS1:
|
|
|
|
protocolstats['TLS1.1 or up Only'] += 1
|
2014-01-11 02:07:32 +01:00
|
|
|
if TLS1_1:
|
|
|
|
protocolstats['TLS1.1'] += 1
|
|
|
|
if not SSL2 and not SSL3 and not TLS1 and not TLS1_2:
|
2014-04-06 14:06:18 +02:00
|
|
|
protocolstats['TLS1.1 Only'] += 1
|
2014-01-11 02:07:32 +01:00
|
|
|
if TLS1_2:
|
|
|
|
protocolstats['TLS1.2'] += 1
|
|
|
|
if not SSL2 and not SSL3 and not TLS1 and not TLS1_1:
|
|
|
|
protocolstats['TLS1.2 Only'] += 1
|
2014-04-06 14:13:44 +02:00
|
|
|
if TLS1_2 and not TLS1_1 and TLS1:
|
|
|
|
protocolstats['TLS1.2, 1.0 but not 1.1'] += 1
|
2014-01-11 02:07:32 +01:00
|
|
|
|
|
|
|
# for testing, break early
|
|
|
|
#if total % 1999 == 0:
|
|
|
|
# break
|
|
|
|
|
2014-10-12 20:24:56 +02:00
|
|
|
""" The 'x:' + client_name + ' RC4 Preferred' counts only sites that
|
|
|
|
effectively prefer RC4 when using given client, to make reporting more
|
|
|
|
readable, sum it with sites that do that for all ciphers"""
|
2014-06-30 10:42:53 +02:00
|
|
|
|
2014-10-12 20:24:56 +02:00
|
|
|
for client_name in client_ciphers:
|
|
|
|
if 'x:' + client_name + ' RC4 Preferred' in cipherstats and 'RC4 Preferred' in cipherstats:
|
|
|
|
cipherstats['x:' + client_name + ' RC4 Preferred'] += cipherstats['RC4 Preferred']
|
2014-06-30 10:42:53 +02:00
|
|
|
|
2014-01-11 02:07:32 +01:00
|
|
|
print("SSL/TLS survey of %i websites from Alexa's top 1 million" % total)
|
2014-04-05 20:21:35 +02:00
|
|
|
if report_untrused == False:
|
|
|
|
print("Stats only from connections that did provide valid certificates")
|
|
|
|
print("(or anonymous DH from servers that do also have valid certificate installed)\n")
|
|
|
|
|
2014-01-11 02:07:32 +01:00
|
|
|
""" Display stats """
|
|
|
|
print("\nSupported Ciphers Count Percent")
|
|
|
|
print("-------------------------+---------+-------")
|
|
|
|
for stat in sorted(cipherstats):
|
|
|
|
percent = round(cipherstats[stat] / total * 100, 4)
|
|
|
|
sys.stdout.write(stat.ljust(25) + " " + str(cipherstats[stat]).ljust(10) + str(percent).ljust(4) + "\n")
|
|
|
|
|
2014-07-01 00:01:32 +02:00
|
|
|
print("\nCipher ordering Count Percent")
|
|
|
|
print("-------------------------+---------+-------")
|
|
|
|
for stat in sorted(cipherordering):
|
|
|
|
percent = round(cipherordering[stat] / total * 100, 4)
|
|
|
|
sys.stdout.write(stat.ljust(25) + " " + str(cipherordering[stat]).ljust(10) + str(percent).ljust(4) + "\n")
|
|
|
|
|
2014-10-12 20:24:56 +02:00
|
|
|
print("\nCLIENT specific statistics\n")
|
|
|
|
|
|
|
|
for client_name in client_ciphers:
|
|
|
|
print("\n" + client_name + " selected ciphers Count Percent")
|
|
|
|
print("-----------------------------+---------+------")
|
|
|
|
for stat in sorted(client_selected_cipherstats[client_name]):
|
|
|
|
percent = round(client_selected_cipherstats[client_name][stat] / total * 100, 4)
|
|
|
|
sys.stdout.write(stat.ljust(30) + " " + str(client_selected_cipherstats[client_name][stat]).ljust(10) + str(percent).ljust(4) + "\n")
|
|
|
|
|
|
|
|
print("\n" + client_name + " RC4 Only other ciphers Count Percent")
|
|
|
|
print("-----------------------------+---------+------")
|
|
|
|
for stat in sorted(client_RC4_Only_cipherstats[client_name]):
|
|
|
|
percent = round(client_RC4_Only_cipherstats[client_name][stat] / total * 100, 4)
|
|
|
|
sys.stdout.write(stat.ljust(30) + " " + str(client_RC4_Only_cipherstats[client_name][stat]).ljust(10) + str(percent).ljust(4) + "\n")
|
|
|
|
|
|
|
|
print("\n" + client_name + " RC4 pref other ciphers Count Percent")
|
|
|
|
print("-----------------------------+---------+------")
|
|
|
|
for stat in sorted(client_RC4_preferred_cipherstats[client_name]):
|
|
|
|
percent = round(client_RC4_preferred_cipherstats[client_name][stat] / total * 100, 4)
|
|
|
|
sys.stdout.write(stat.ljust(30) + " " + str(client_RC4_preferred_cipherstats[client_name][stat]).ljust(10) + str(percent).ljust(4) + "\n")
|
|
|
|
|
|
|
|
print("\n" + client_name + " incompatible ciphers Count Percent")
|
|
|
|
print("-----------------------------+---------+------")
|
|
|
|
for stat in sorted(client_incompatible_cipherstats[client_name]):
|
|
|
|
percent = round(client_incompatible_cipherstats[client_name][stat] / total * 100, 4)
|
|
|
|
sys.stdout.write(stat.ljust(30) + " " + str(client_incompatible_cipherstats[client_name][stat]).ljust(10) + str(percent).ljust(4) + "\n")
|
2014-06-30 10:42:53 +02:00
|
|
|
|
2014-01-11 02:07:32 +01:00
|
|
|
print("\nSupported Handshakes Count Percent")
|
|
|
|
print("-------------------------+---------+-------")
|
|
|
|
for stat in sorted(handshakestats):
|
|
|
|
percent = round(handshakestats[stat] / total * 100, 4)
|
|
|
|
sys.stdout.write(stat.ljust(25) + " " + str(handshakestats[stat]).ljust(10) + str(percent).ljust(4) + "\n")
|
|
|
|
|
|
|
|
print("\nSupported PFS Count Percent PFS Percent")
|
|
|
|
print("-------------------------+---------+--------+-----------")
|
|
|
|
for stat in sorted(pfsstats):
|
|
|
|
percent = round(pfsstats[stat] / total * 100, 4)
|
|
|
|
pfspercent = 0
|
|
|
|
if "ECDH," in stat:
|
|
|
|
pfspercent = round(pfsstats[stat] / handshakestats['ECDHE'] * 100, 4)
|
|
|
|
elif "DH," in stat:
|
|
|
|
pfspercent = round(pfsstats[stat] / handshakestats['DHE'] * 100, 4)
|
|
|
|
sys.stdout.write(stat.ljust(25) + " " + str(pfsstats[stat]).ljust(10) + str(percent).ljust(9) + str(pfspercent) + "\n")
|
|
|
|
|
2014-05-16 16:55:19 +02:00
|
|
|
print("\nTLS session ticket hint Count Percent ")
|
|
|
|
print("-------------------------+---------+--------")
|
2014-06-24 15:59:24 +02:00
|
|
|
for stat in natural_sort(tickethint):
|
2014-05-16 16:55:19 +02:00
|
|
|
percent = round(tickethint[stat] / total * 100, 4)
|
|
|
|
sys.stdout.write(stat.ljust(25) + " " + str(tickethint[stat]).ljust(10) + str(percent).ljust(9) + "\n")
|
|
|
|
|
2014-04-04 20:18:36 +02:00
|
|
|
print("\nCertificate sig alg Count Percent ")
|
|
|
|
print("-------------------------+---------+--------")
|
|
|
|
for stat in sorted(sigalg):
|
|
|
|
percent = round(sigalg[stat] / total * 100, 4)
|
|
|
|
sys.stdout.write(stat.ljust(25) + " " + str(sigalg[stat]).ljust(10) + str(percent).ljust(9) + "\n")
|
|
|
|
|
|
|
|
print("\nCertificate key size Count Percent ")
|
|
|
|
print("-------------------------+---------+--------")
|
|
|
|
for stat in sorted(keysize):
|
|
|
|
percent = round(keysize[stat] / total * 100, 4)
|
|
|
|
sys.stdout.write(stat.ljust(25) + " " + str(keysize[stat]).ljust(10) + str(percent).ljust(9) + "\n")
|
|
|
|
|
2014-04-04 21:08:38 +02:00
|
|
|
sys.stdout.write("RSA/ECDSA Dual Stack".ljust(25) + " " + str(dsarsastack).ljust(10) + str(round(dsarsastack/total * 100, 4)) + "\n")
|
|
|
|
|
2014-05-16 17:31:44 +02:00
|
|
|
print("\nOCSP stapling Count Percent ")
|
|
|
|
print("-------------------------+---------+--------")
|
|
|
|
for stat in sorted(ocspstaple):
|
|
|
|
percent = round(ocspstaple[stat] / total * 100, 4)
|
|
|
|
sys.stdout.write(stat.ljust(25) + " " + str(ocspstaple[stat]).ljust(10) + str(percent).ljust(9) + "\n")
|
|
|
|
|
2014-01-11 02:07:32 +01:00
|
|
|
print("\nSupported Protocols Count Percent")
|
|
|
|
print("-------------------------+---------+-------")
|
|
|
|
for stat in sorted(protocolstats):
|
|
|
|
percent = round(protocolstats[stat] / total * 100, 4)
|
|
|
|
sys.stdout.write(stat.ljust(25) + " " + str(protocolstats[stat]).ljust(10) + str(percent).ljust(4) + "\n")
|