Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Discussion of requirements 9.1.1-3 (from #738) #770

Closed
tghosth opened this issue May 18, 2020 · 9 comments
Closed

Discussion of requirements 9.1.1-3 (from #738) #770

tghosth opened this issue May 18, 2020 · 9 comments
Assignees
Labels
2) Awaiting response Awaiting a response from the original poster

Comments

@tghosth
Copy link
Collaborator

tghosth commented May 18, 2020

This issue continues a discussion from the closed PR #738 with @csfreak92

These requirements state:

9.1.1 | Verify that secured TLS is used for all client connectivity, and does not fall back to insecure or unencrypted protocols
9.1.2 | Verify using online or up to date TLS testing tools that only strong algorithms, ciphers, and protocols are enabled, with the strongest algorithms and ciphers set as preferred.
9.1.3 | Verify that old versions of SSL and TLS protocols, algorithms, ciphers, and configuration are disabled, such as SSLv2, SSLv3, or TLS 1.0 and TLS 1.1. The latest version of TLS should be the preferred cipher suite.

I still believe these requirements should be considered separately but having read them more carefully, I think they also need to be clearer.

@tghosth tghosth mentioned this issue May 18, 2020
@tghosth
Copy link
Collaborator Author

tghosth commented May 18, 2020

See #771 where I have made some changes to try and make them clearer. @csfreak92 what do you think?

@jmanico
Copy link
Member

jmanico commented May 18, 2020 via email

@tghosth tghosth added the 2) Awaiting response Awaiting a response from the original poster label May 18, 2020
@tghosth
Copy link
Collaborator Author

tghosth commented May 18, 2020

@jmanico did you look at my propsed changes from #771? See also below:

# Description L1 L2 L3 CWE
9.1.1 Verify that TLS is used for all client connectivity, and does not fall back to insecure or unencrypted communications. (C8) 319
9.1.2 Verify using online or up to date TLS testing tools that only strong cipher suites are enabled, with the strongest cipher suites set as preferred. 326
9.1.3 Verify that only the latest recommended versions of the TLS protocol are enabled, such as TLS 1.2 and TLS 1.3. The latest version of the TLS protocol should be the preferred option. 326

@jmanico
Copy link
Member

jmanico commented May 18, 2020 via email

@jmanico
Copy link
Member

jmanico commented May 18, 2020 via email

@jmanico
Copy link
Member

jmanico commented May 18, 2020 via email

@tghosth
Copy link
Collaborator Author

tghosth commented May 18, 2020

@csfreak92 any further comments?

@csfreak92
Copy link
Collaborator

csfreak92 commented May 19, 2020

@tghosth, @jmanico, I agree. The changes look solid. Although a specific example of an application failing 9.1.1 but not failing 9.1.2 and 9.1.3 or in any combination not failing all these three requirements would help enlighten our team's understanding. Earlier today we were debating about these three specific controls. It seems like if an application being assessed failed 9.1.1, it automatically fails 9.1.2 and 9.1.3. They all look like tied together hence my recommendation to compress them. Thoughts?

@tghosth
Copy link
Collaborator Author

tghosth commented May 21, 2020

If an application supports well-configured TLS on port 443 but also HTTP on pot 80 then technically it passes 9.1.2 and 9.1.3 but not 9.1.1.

@tghosth tghosth closed this as completed in 8d773b7 Jun 2, 2020
elarlang pushed a commit to elarlang/ASVS that referenced this issue Oct 25, 2021
elarlang pushed a commit to elarlang/ASVS that referenced this issue Oct 25, 2021
elarlang pushed a commit to elarlang/ASVS that referenced this issue Oct 25, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
2) Awaiting response Awaiting a response from the original poster
Projects
None yet
Development

No branches or pull requests

3 participants