You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: json_output_schema.json
+5-10Lines changed: 5 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -1200,7 +1200,7 @@
1200
1200
"type": "object"
1201
1201
},
1202
1202
"_CertificateDeploymentAnalysisResultAsJson": {
1203
-
"description": "The result of analyzing a server's certificate to verify its validity.\n\nAny certificate available within the fields that follow is parsed as a ``Certificate`` object using the cryptography\nmodule; documentation is available at\nhttps://cryptography.io/en/latest/x509/reference.html?highlight=Certificate#cryptography.x509.Certificate\n\nAttributes:\n received_certificate_chain: The certificate chain sent by the server; index 0 is the leaf certificate.\n verified_certificate_chain: The verified certificate chain returned by OpenSSL for one of the trust stores\n packaged within SSLyze. Will be ``None`` if the validation failed with all of the available trust stores\n (Apple, Mozilla, etc.). This is essentially a shortcut to\n ``path_validation_result_list[0].verified_certificate_chain``.\n path_validation_results: The result of validating the server's\n certificate chain using each trust store that is packaged with SSLyze (Mozilla, Apple, etc.).\n If for a given trust store, the validation was successful, the verified certificate chain built by OpenSSL\n can be retrieved from the ``PathValidationResult``.\n leaf_certificate_subject_matches_hostname: ``True`` if the leaf certificate's Common Name or Subject Alternative\n Names match the server's hostname.\n leaf_certificate_is_ev: ``True`` if the leaf certificate is Extended Validation, according to Mozilla.\n leaf_certificate_has_must_staple_extension: ``True`` if the OCSP must-staple extension is present in the leaf\n certificate.\n leaf_certificate_signed_certificate_timestamps_count: The number of Signed Certificate\n Timestamps (SCTs) for Certificate Transparency embedded in the leaf certificate. ``None`` if the version of\n OpenSSL installed on the system is too old to be able to parse the SCT extension.\n received_chain_has_valid_order: ``True`` if the certificate chain returned by the server was sent in the right\n order. `None`` if any of the certificates in the chain could not be parsed.\n received_chain_contains_anchor_certificate: ``True`` if the server included the anchor/root\n certificate in the chain it sends back to clients. ``None`` if the verified chain could not be built.\n verified_chain_has_sha1_signature: ``True`` if any of the leaf or intermediate certificates are\n signed using the SHA-1 algorithm. ``None`` if the verified chain could not be built.\n verified_chain_has_legacy_symantec_anchor: ``True`` if the certificate chain contains a distrusted Symantec\n anchor\n (https://blog.qualys.com/ssllabs/2017/09/26/google-and-mozilla-deprecating-existing-symantec-certificates).\n ``None`` if the verified chain could not be built.\n ocsp_response: The OCSP response returned by the server. ``None`` if no response was sent by the server or if\n the scan was run through an HTTP proxy (the proxy will not forward the server's OCSP response). If present,\n the OCSP response is an ``OCSPResponse`` object parsed using the cryptography module; documentation is\n available at\n https://cryptography.io/en/latest/x509/ocsp.html?highlight=OCSPResponse#cryptography.x509.ocsp.OCSPResponse\n ocsp_response_is_trusted: ``True`` if the OCSP response is trusted using the Mozilla trust store.\n ``None`` if no OCSP response was sent by the server.",
1203
+
"description": "The result of analyzing a server's certificate to verify its validity.\n\nAny certificate available within the fields that follow is parsed as a ``Certificate`` object using the cryptography\nmodule; documentation is available at\nhttps://cryptography.io/en/latest/x509/reference.html?highlight=Certificate#cryptography.x509.Certificate\n\nAttributes:\n received_certificate_chain: The certificate chain sent by the server; index 0 is the leaf certificate.\n verified_certificate_chain: The verified certificate chain returned by OpenSSL for one of the trust stores\n packaged within SSLyze. Will be ``None`` if the validation failed with all of the available trust stores\n (Apple, Mozilla, etc.). This is essentially a shortcut to\n ``path_validation_result_list[0].verified_certificate_chain``.\n path_validation_results: The result of validating the server's\n certificate chain using each trust store that is packaged with SSLyze (Mozilla, Apple, etc.).\n If for a given trust store, the validation was successful, the verified certificate chain can be\n retrieved from the ``PathValidationResult``.\n leaf_certificate_is_ev: ``True`` if the leaf certificate is Extended Validation, according to Mozilla.\n leaf_certificate_has_must_staple_extension: ``True`` if the OCSP must-staple extension is present in the leaf\n certificate.\n leaf_certificate_signed_certificate_timestamps_count: The number of Signed Certificate\n Timestamps (SCTs) for Certificate Transparency embedded in the leaf certificate. ``None`` if the version of\n OpenSSL installed on the system is too old to be able to parse the SCT extension.\n received_chain_has_valid_order: ``True`` if the certificate chain returned by the server was sent in the right\n order. `None`` if any of the certificates in the chain could not be parsed.\n received_chain_contains_anchor_certificate: ``True`` if the server included the anchor/root\n certificate in the chain it sends back to clients. ``None`` if the verified chain could not be built.\n verified_chain_has_sha1_signature: ``True`` if any of the leaf or intermediate certificates are\n signed using the SHA-1 algorithm. ``None`` if the verified chain could not be built.\n verified_chain_has_legacy_symantec_anchor: ``True`` if the certificate chain contains a distrusted Symantec\n anchor\n (https://blog.qualys.com/ssllabs/2017/09/26/google-and-mozilla-deprecating-existing-symantec-certificates).\n ``None`` if the verified chain could not be built.\n ocsp_response: The OCSP response returned by the server. ``None`` if no response was sent by the server or if\n the scan was run through an HTTP proxy (the proxy will not forward the server's OCSP response). If present,\n the OCSP response is an ``OCSPResponse`` object parsed using the cryptography module; documentation is\n available at\n https://cryptography.io/en/latest/x509/ocsp.html?highlight=OCSPResponse#cryptography.x509.ocsp.OCSPResponse\n ocsp_response_is_trusted: ``True`` if the OCSP response is trusted using the Mozilla trust store.\n ``None`` if no OCSP response was sent by the server.",
"description": "The result of trying to validate a server's certificate chain using a specific trust store.\n\nAttributes:\n trust_store: The trust store used for validation.\n verified_certificate_chain: The verified certificate chain returned by OpenSSL.\n Index 0 is the leaf certificate and the last element is the anchor/CA certificate from the trust store.\n Will be None if the validation failed or the verified chain could not be built.\n Each certificate is parsed using the cryptography module; documentation is available at\n https://cryptography.io/en/latest/x509/reference/#x-509-certificate-object.\nopenssl_error_string: The result string returned by OpenSSL's validation function; None if validation was\n successful.\n was_validation_successful: Whether the certificate chain is trusted when using supplied the trust_stores.",
1722
+
"description": "The result of trying to validate a server's certificate chain using a specific trust store.\n\nAttributes:\n trust_store: The trust store used for validation.\n verified_certificate_chain: The verified certificate chain returned by OpenSSL.\n Index 0 is the leaf certificate and the last element is the anchor/CA certificate from the trust store.\n Will be None if the validation failed or the verified chain could not be built.\n Each certificate is parsed using the cryptography module; documentation is available at\n https://cryptography.io/en/latest/x509/reference/#x-509-certificate-object.\nvalidation_error: The error returned by the cryptography module's validation function; None if validation was\n successful.\n was_validation_successful: Whether the certificate chain is trusted when using supplied the trust_stores.",
0 commit comments