-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Change score calculation formula #34
Comments
I think both the approaches would end up more or less the same.
There can be multiple components that could be worse (for eg: bad ciphersuite and a weak certificate). Agree that summing up everything may not be right approach to assess the security. The current way of calculating the score is done in a way that the user can change the default 'weights' for each component and customize the ratings. |
Maybe we should use the following approach. Then we need to decide, which time is more than user's information TTL (we can allow the user set this parameter, the default one is the one of the cyphersuite which is thought to be secure), and using this value we can calculate ciphersuite security. Also |
I had a similar thought to KOLANICH, maybe the three "components" would be: confidentiality, integrity, and authenticity.
Therefore the currently implemented approach seems good for now. |
Calculate score not as a sum of scores of the components, but as the score of the worst component. If the security features are not present, crop the maximum score.
The text was updated successfully, but these errors were encountered: