-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Display individual scores of cipher (separate CBC and SHA1 in UI) #57
Comments
It is already. AES GCM gets the highest (10/10) and AES CBC (8/10) comes next. |
Really? So let's take this test site: https://cbc.badssl.com/ It gets 7.8, but as far as I know it only does not get 9, because of the SHA-1 HMAC. (at least this is the only thing, whcih is indicated to be "weak" in the GUI). |
Well, I meant not-quantifiable for the figures defined in cipher-suites.js. Like you could ask why 10/10 for GCM and 8/10 for AES-CBC there's no 'measurable' method I can give. The overall ratings are computed of-course! :)
Nope. If it was AES-GCM with a SHA1 HMAC (Well, there isn't a cipher-suite like that, but lets say there is), it could have been 3.0/4. The rating against the cipher suite is a weighted sum of key exchange, bulk cipher and hmac (weights being 3, 3, and 4 respectively). This figure is further 'normalized' for a score out of 4. Whcih is where it gets a 2.8 out of 4. Try the math yourself. |
So, if I understand it correctly:
But I have a UI/UX issue in this case: I cannot see (without my own calculations or something like that) whether the lower score is caused by the first or second "parameter". Because the grey "sum" displayed at the right shows the score of the whole cipher, so no one can see what exact "part" of the cipher caused the lower score. |
Indeed, the UI doesn't display the individual scores computed for the parameters in cipher suite. Had thought about that many times, but was never a priority. |
I've just renamed this issue. |
AES GCM is authenticated encryption and should therefore be considered more secure than AES CBC.
See:
The text was updated successfully, but these errors were encountered: