/** * TLS-Attacker - A Modular Penetration Testing Framework for TLS * * Copyright 2014-2016 Ruhr University Bochum / Hackmanit GmbH * * Licensed under Apache License 2.0 * http://www.apache.org/licenses/LICENSE-2.0 */ package de.rub.nds.tlsattacker.testtls.config; import com.beust.jcommander.Parameter; import de.rub.nds.tlsattacker.tls.config.ClientCommandConfig; /** * Configuration for testing TLS server capabilities. By now, per default all * the checks are performed. In the future, more fine granular tests can be * executed, as is the case in testssl.sh. See also the commented out variables. * * @author Juraj Somorovsky - juraj.somorovsky@rub.de */ public class TestServerConfig extends ClientCommandConfig { public static final String COMMAND = "testtls_server"; // @Parameter(names = "-all", description = "Performs all checks.") // protected boolean all = true; // // @Parameter(names = "-crypto", description = "Checks supported cipher suites and other crypto properties.") // protected boolean crypto; // // @Parameter(names = "-protocols", description = "Checks supported TLS protocol versions.") // protected boolean supportedProtocols; // // @Parameter(names = "-cipher_suite_order", description = "Checks whether the server supports cipher suite ordering.") // protected boolean cipherSuiteOrder; // // @Parameter(names = "-named_curves", description = "Checks supported elliptic curves.") // protected boolean supportedNamedCurves; // // @Parameter(names = "-signature_hash_algorithms", description = "Checks supported signature and hash algorithms.") // protected boolean supportedSignatureAndHashAlgorithms; // // @Parameter(names = "-attacks", description = "Checks for potential vulnerabilities.") // protected boolean attacks; @Parameter(names = "-policy", description = "Checks the TLS configuration conformance against the provided (Botan-styled) policy.") protected String policy; public String getPolicy() { return policy; } public void setPolicy(String policy) { this.policy = policy; } }