Ministerstvo obrany Možnost podání elektronickou cestou z formuláře na www.army.cz.
Všechno je v nejlepším pořádku a web se drží doporučených postupů.
Detailní report z HTTPs analýzy pomocí nástroje testssl.sh
| server | www.army.cz/194.50.64.66 |
| pre_128cipher |
INFO
{
No 128 cipher limit bug} |
| SSLv2 |
OK
{
not offered} |
| SSLv3 |
OK
{
not offered} |
| TLS1 |
INFO
{
not offered} |
| TLS1_1 |
INFO
{
not offered} |
| TLS1_2 |
INFO
{
not offered} |
| TLS1_3 |
OK
{
offered with final} |
| NPN |
INFO
{
not offered} |
| ALPN |
INFO
{
not offered} |
|
cipherlist_NULL
zranitelnosti:
CWE-327
|
OK
{
not offered} |
|
cipherlist_aNULL
zranitelnosti:
CWE-327
|
OK
{
not offered} |
|
cipherlist_EXPORT
zranitelnosti:
CWE-327
|
OK
{
not offered} |
|
cipherlist_LOW
zranitelnosti:
CWE-327
|
OK
{
not offered} |
|
cipherlist_3DES_IDEA
zranitelnosti:
CWE-310
|
INFO
{
not offered} |
|
cipherlist_AVERAGE
zranitelnosti:
CWE-310
|
INFO
{
not offered} |
| cipherlist_GOOD |
INFO
{
not offered} |
| cipherlist_STRONG |
OK
{
offered} |
| cipher_order |
INFO
{
server (TLS 1.3)} |
| protocol_negotiated |
OK
{
Default protocol TLS1.3} |
| cipher_negotiated |
OK
{
TLS_AES_256_GCM_SHA384, 256 bit ECDH (P-256)} |
| cipher-tls1_3_x1302 |
OK
{
TLSv1.3 x1302 TLS_AES_256_GCM_SHA384 ECDH 256 AESGCM 256 TLS_AES_256_GCM_SHA384} |
| cipher-tls1_3_x1301 |
OK
{
TLSv1.3 x1301 TLS_AES_128_GCM_SHA256 ECDH 256 AESGCM 128 TLS_AES_128_GCM_SHA256} |
| cipher-tls1_3_x1304 |
OK
{
TLSv1.3 x1304 TLS_AES_128_CCM_SHA256 ECDH 256 AESCCM 128 TLS_AES_128_CCM_SHA256} |
| cipherorder_TLSv1_3 |
INFO
{
TLS_AES_256_GCM_SHA384 TLS_AES_128_GCM_SHA256 TLS_AES_128_CCM_SHA256} |
| FS |
OK
{
offered} |
| FS_ciphers |
INFO
{
TLS_AES_256_GCM_SHA384 TLS_AES_128_GCM_SHA256 TLS_AES_128_CCM_SHA256} |
| FS_ECDHE_curves |
OK
{
prime256v1 secp384r1 secp521r1} |
| DH_groups |
OK
{
ffdhe2048 ffdhe3072 ffdhe4096 ffdhe6144 ffdhe8192} |
| TLS_extensions |
INFO
{
'supported versions/#43' 'key share/#51' 'server name/#0' 'status request/#5' 'renegotiation info/#65281' 'max fragment length/#1' 'EC point formats/#11' 'application layer protocol negotiation/#16' 'extended master secret/#23'} |
| TLS_session_ticket |
INFO
{
no -- no lifetime advertised} |
| SSL_sessionID_support |
INFO
{
yes} |
| sessionresumption_ticket |
INFO
{
not supported} |
| sessionresumption_ID |
WARN
{
check failed because of connect problem} |
| TLS_timestamp |
INFO
{
random} |
| certificate_compression |
INFO
{
none} |
| clientAuth |
INFO
{
none} |
| cert_numbers |
INFO
{
1} |
| cert_signatureAlgorithm |
OK
{
SHA256 with RSA} |
| cert_keySize |
OK
{
RSA 4096 bits (exponent is 65537)} |
| cert_keyUsage |
INFO
{
Digital Signature, Key Encipherment} |
| cert_extKeyUsage |
INFO
{
TLS Web Server Authentication} |
| cert_serialNumber |
INFO
{
0E74FCF4D715BF528AFA32EB9CB9F339} |
| cert_serialNumberLen |
INFO
{
16} |
| cert_fingerprintSHA1 |
INFO
{
51F25F4087B4A905188BDB327DBA1800ECCA28EC} |
| cert_fingerprintSHA256 |
INFO
{
7B7FA6692041F84D4694BFF094EEFB56D03CB91088B041B7D477DA16705F68E2} |
| cert |
INFO
{
-----BEGIN CERTIFICATE----- MIIHxTCCBq2gAwIBAgIQDnT89NcVv1KK+jLrnLnzOTANBgkqhkiG9w0BAQsFADBZ MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMTMwMQYDVQQDEypE aWdpQ2VydCBHbG9iYWwgRzIgVExTIFJTQSBTSEEyNTYgMjAyMCBDQTEwHhcNMjUx MTIwMDAwMDAwWhcNMjYxMjExMjM1OTU5WjBPMQswCQYDVQQGEwJDWjEOMAwGA1UE BxMFUHJhaGExHDAaBgNVBAoTE01pbmlzdHJ5IG9mIERlZmVuY2UxEjAQBgNVBAMM CSouYXJteS5jejCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJZ6Ez0I 4X5RjPfAP1Jj9SwtQhE97tg8Yelt+gAtjNVir6PXyXVtuiawuoFU/65YyhQY9lm2 eJgkBy7c6KO2KBfXaZlFzRo0SP7NeneOX6ItYEDwfIqqMnp7OVbc+612/ZtohC1b SXeswaxeruvZJwNt/kZY9D+5+dFJM9GLFaBdUNyxIkt/tWn5aMVhZS2ebd0jdKhf ZtKAPjI2t0ZgMbX8IrXfq0vZWUfKHUx+wkgqiKQoDE+DpoRykgZtLgnhafEXmBIj y+lg7UgFgHroEyOACZg+e90I4Eou+Rbd5yTEiFjZOvdd5a7wZgrKqEsiZn9gXaae JtG5FHhJxqjvjHVZCWm8pICvFkXGdMTzgxfvel1Tj7x7RpMzrjBshjAu11A7jUUy u66oQYEMCWndiegcs8xFbxwsRo7POXmBRzMMHr+kOCHMXIsoOnrlOLmyOpAG1O8V OQ2GNjF9u4sOSzn6NEM/ss/2by78ZpOIApzTMZMyK47l0e9l62/L7s4TVrtQsKhr BrLULo6khygzwz0mn6wAbe3CRSn3KEE0Q4o6eESU/oHFJiZWALygtfIl4C16ACHK TDACoL++4hfQZ0kmJuUEpuDa86PYajNbt/mCnUIfF4x+2foV4s6tGaegVI5PoYqJ n/gDpWgojgTailTci+LkC50pTn1HwtLoDhI3AgMBAAGjggORMIIDjTAfBgNVHSME GDAWgBR0hYDAZsffN97PvSk3qgMdvu3NFzAdBgNVHQ4EFgQUg2x+y3JiEzE9y98U RpI17o1svHcwKgYDVR0RBCMwIYIJKi5hcm15LmN6ggdhcm15LmN6ggt3d3cuYXJt eS5jejA+BgNVHSAENzA1MDMGBmeBDAECAjApMCcGCCsGAQUFBwIBFhtodHRwOi8v d3d3LmRpZ2ljZXJ0LmNvbS9DUFMwDgYDVR0PAQH/BAQDAgWgMBMGA1UdJQQMMAoG CCsGAQUFBwMBMIGfBgNVHR8EgZcwgZQwSKBGoESGQmh0dHA6Ly9jcmwzLmRpZ2lj ZXJ0LmNvbS9EaWdpQ2VydEdsb2JhbEcyVExTUlNBU0hBMjU2MjAyMENBMS0xLmNy bDBIoEagRIZCaHR0cDovL2NybDQuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0R2xvYmFs RzJUTFNSU0FTSEEyNTYyMDIwQ0ExLTEuY3JsMIGHBggrBgEFBQcBAQR7MHkwJAYI KwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBRBggrBgEFBQcwAoZF aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0R2xvYmFsRzJUTFNS U0FTSEEyNTYyMDIwQ0ExLTEuY3J0MAwGA1UdEwEB/wQCMAAwggF+BgorBgEEAdZ5 AgQCBIIBbgSCAWoBaAB2ANgJVTuUT3r/yBYZb5RPhauw+Pxeh1UmDxXRLnK7RUsU AAABmqEf37oAAAQDAEcwRQIhAJRUgzsF5LoREkzoV9cCbIAIcYSoxsIRet1kB2Jr 1/miAiBTy0v1paW2xQhRHpX2AzbsX4fSumfDJVqHFrnRzuasPgB1AMIxfldFGaNF 7n843rKQQevHwiFaIr9/1bWtdprZDlLNAAABmqEf37cAAAQDAEYwRAIgH7fnaovq 2j3/CeJyZ2H/FDbFIazwtf84FMcxPEyeRsoCICiX7rCOE0/OgtCpuE1dQhSwDJjj 8JbCiCQkuJKtr8YkAHcAlE5Dh/rswe+B8xkkJqgYZQHH0184AgE/cmd9VTcuGdgA AAGaoR/fxQAABAMASDBGAiEA2lSvdtvMiA0UhQ2XoMaEoP4NjQ+YVTthFnXGoYgX V9oCIQChU8LXU+gucM7ar6rQ4UFAR0bNOP1pEj+YrvqvBIiFODANBgkqhkiG9w0B AQsFAAOCAQEAVa1I8H9B+/nRtmuFQsgcHagD5U+V1Y/Ws88sCT2s+DL+/j32WUsv QO71lkhdFLgLdtvZLxFwjttwJqQ2efXgU+eE9Ux4gRBdVGaJvtdZDyxaWEY48AOQ 4OvJjEJalepzabqpE2t1L7xrZns7gAamwIDOcNtzVRh7bVFqlsltnu+aSyMRcw1C gZKk6eusUbbKD5vP1YPQps9xxM8QrLC3cBg5Cv1/VpxMg6Ysbgb2n7M042y1zqdC kYYEeOnJn/S4QRfrwSGVhxwlTCccuC0V/SgDRRrqGjQYrlDXdo3/wm+HjD9fwlIA dpAaoqUWtXv+pYmHBKEVm7xXMsBjBNgQ1A== -----END CERTIFICATE-----} |
| cert_commonName |
OK
{
*.army.cz} |
| cert_commonName_wo_SNI |
INFO
{
*.army.cz} |
| cert_subjectAltName |
INFO
{
*.army.cz army.cz www.army.cz} |
| cert_trust |
OK
{
Ok via CN wildcard and SAN (same w/o SNI)} |
| cert_chain_of_trust |
OK
{
passed.} |
| cert_certificatePolicies_EV |
INFO
{
no} |
| cert_expirationStatus |
OK
{
206 >= 60 days} |
| cert_notBefore |
INFO
{
2025-11-20 00:00} |
| cert_notAfter |
OK
{
2026-12-11 23:59} |
| cert_extlifeSpan |
OK
{
certificate has no extended life time according to browser forum} |
| cert_eTLS |
INFO
{
not present} |
| cert_crlDistributionPoints |
INFO
{
http://crl3.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crl http://crl4.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crl} |
| cert_ocspURL |
INFO
{
http://ocsp.digicert.com} |
| OCSP_stapling |
OK
{
offered} |
| cert_ocspRevoked |
OK
{
not revoked} |
| cert_mustStapleExtension |
INFO
{
--} |
| DNS_CAArecord |
OK
{
issue=digicert.com, issuewild=digicert.com} |
| certificate_transparency |
OK
{
yes (certificate extension)} |
| certs_countServer |
INFO
{
2} |
| certs_list_ordering_problem |
INFO
{
no} |
| cert_caIssuers |
INFO
{
DigiCert Global G2 TLS RSA SHA256 2020 CA1 (DigiCert Inc from US)} |
| intermediate_cert <#1> |
INFO
{
-----BEGIN CERTIFICATE----- MIIEyDCCA7CgAwIBAgIQDPW9BitWAvR6uFAsI8zwZjANBgkqhkiG9w0BAQsFADBh MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH MjAeFw0yMTAzMzAwMDAwMDBaFw0zMTAzMjkyMzU5NTlaMFkxCzAJBgNVBAYTAlVT MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxMzAxBgNVBAMTKkRpZ2lDZXJ0IEdsb2Jh bCBHMiBUTFMgUlNBIFNIQTI1NiAyMDIwIENBMTCCASIwDQYJKoZIhvcNAQEBBQAD ggEPADCCAQoCggEBAMz3EGJPprtjb+2QUlbFbSd7ehJWivH0+dbn4Y+9lavyYEEV cNsSAPonCrVXOFt9slGTcZUOakGUWzUb+nv6u8W+JDD+Vu/E832X4xT1FE3LpxDy FuqrIvAxIhFhaZAmunjZlx/jfWardUSVc8is/+9dCopZQ+GssjoP80j812s3wWPc 3kbW20X+fSP9kOhRBx5Ro1/tSUZUfyyIxfQTnJcVPAPooTncaQwywa8WV0yUR0J8 osicfebUTVSvQpmowQTCd5zWSOTOEeAqgJnwQ3DPP3Zr0UxJqyRewg2C/Uaoq2yT zGJSQnWS+Jr6Xl6ysGHlHx+5fwmY6D36g39HaaECAwEAAaOCAYIwggF+MBIGA1Ud EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFHSFgMBmx9833s+9KTeqAx2+7c0XMB8G A1UdIwQYMBaAFE4iVCAYlebjbuYP+vq5Eu0GF485MA4GA1UdDwEB/wQEAwIBhjAd BgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwdgYIKwYBBQUHAQEEajBoMCQG CCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wQAYIKwYBBQUHMAKG NGh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEdsb2JhbFJvb3RH Mi5jcnQwQgYDVR0fBDswOTA3oDWgM4YxaHR0cDovL2NybDMuZGlnaWNlcnQuY29t L0RpZ2lDZXJ0R2xvYmFsUm9vdEcyLmNybDA9BgNVHSAENjA0MAsGCWCGSAGG/WwC ATAHBgVngQwBATAIBgZngQwBAgEwCAYGZ4EMAQICMAgGBmeBDAECAzANBgkqhkiG 9w0BAQsFAAOCAQEAkPFwyyiXaZd8dP3A+iZ7U6utzWX9upwGnIrXWkOH7U1MVl+t wcW1BSAuWdH/SvWgKtiwla3JLko716f2b4gp/DA/JIS7w7d7kwcsr4drdjPtAFVS slme5LnQ89/nD/7d+MS5EHKBCQRfz5eeLjJ1js+aWNJXMX43AYGyZm0pGrFmCW3R bpD0ufovARTFXFZkAdl9h6g4U5+LXUZtXMYnhIHUfoyMo5tS58aI7Dd8KvvwVVo4 chDYABPPTHPbqjc1qCmBaZx2vN4Ye5DUys/vZwP9BFohFrH/6j/f3IL16/RZkiMN JCqVJUzKoZHm1Lesh3Sz8W2jmdv51b2EQJ8HmA== -----END CERTIFICATE-----} |
| intermediate_cert_fingerprintSHA256 <#1> |
INFO
{
C8025F9FC65FDFC95B3CA8CC7867B9A587B5277973957917463FC813D0B625A9} |
| intermediate_cert_notBefore <#1> |
INFO
{
2021-03-30 00:00} |
| intermediate_cert_notAfter <#1> |
OK
{
2031-03-29 23:59} |
| intermediate_cert_expiration <#1> |
OK
{
ok > 40 days} |
| intermediate_cert_chain <#1> |
INFO
{
DigiCert Global G2 TLS RSA SHA256 2020 CA1 <-- DigiCert Global Root G2} |
| intermediate_cert_badOCSP |
OK
{
intermediate certificate(s) is/are ok} |
| HTTP_status_code |
WARN
{
HTTP header reply empty} |
| HTTP_status_code |
WARN
{
No HTTP status code} |
| scanProblem |
WARN
{
HTTP header was repeatedly zero.} |
|
heartbleed
zranitelnosti:
CVE-2014-0160
CWE-119
|
OK
{
not vulnerable, no heartbeat extension} |
|
CCS
zranitelnosti:
CVE-2014-0224
CWE-310
|
OK
{
not vulnerable} |
|
ticketbleed
zranitelnosti:
CVE-2016-9244
CWE-200
|
OK
{
no session ticket extension} |
| ROBOT |
OK
{
not vulnerable, no RSA key transport cipher} |
|
secure_renego
zranitelnosti:
CWE-310
|
OK
{
TLS 1.3 only server} |
|
secure_client_renego
zranitelnosti:
CVE-2011-1473
CWE-310
|
OK
{
not vulnerable, TLS 1.3 only} |
|
HTTP_clock_skew
zranitelnosti:
CVE-2012-4929
CWE-310
|
OK
{
TLS 1.3 only server} |
|
BREACH
zranitelnosti:
CVE-2013-3587
CWE-310
|
WARN
{
Test failed as first HTTP request stalled and was terminated} |
|
POODLE_SSL
zranitelnosti:
CVE-2014-3566
CWE-310
|
OK
{
not vulnerable, no SSLv3} |
| fallback_SCSV |
OK
{
only TLS 1.3 supported} |
| HTTP_clock_skew |
OK
{
not vulnerable} |
|
FREAK
zranitelnosti:
CVE-2015-0204
CWE-310
|
OK
{
not vulnerable} |
| DROWN |
OK
{
not vulnerable on this host and port} |
| DROWN_hint |
INFO
{
Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://censys.io/ipv4?q=7B7FA6692041F84D4694BFF094EEFB56D03CB91088B041B7D477DA16705F68E2} |
|
LOGJAM
zranitelnosti:
CVE-2015-4000
CWE-310
|
OK
{
not vulnerable, no DH EXPORT ciphers,} |
|
LOGJAM-common_primes
zranitelnosti:
CVE-2015-4000
CWE-310
|
OK
{
no DH key with <= TLS 1.2} |
|
BEAST
zranitelnosti:
CVE-2011-3389
CWE-20
|
OK
{
not vulnerable, no SSL3 or TLS1} |
|
LUCKY13
zranitelnosti:
CVE-2013-0169
CWE-310
|
OK
{
not vulnerable, TLS 1.3 only} |
|
winshock
zranitelnosti:
CVE-2014-6321
CWE-94
|
OK
{
not vulnerable} |
| RC4 |
OK
{
not vulnerable, TLS 1.3 only} |
| clientsimulation-android_442 |
INFO
{
No connection} |
| clientsimulation-android_500 |
INFO
{
No connection} |
| clientsimulation-android_60 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
| clientsimulation-android_70 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
| clientsimulation-android_81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
| clientsimulation-android_90 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
| clientsimulation-android_X |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
| clientsimulation-chrome_74_win10 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
| clientsimulation-chrome_79_win10 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
| clientsimulation-firefox_66_win81 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
| clientsimulation-firefox_71_win10 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
| clientsimulation-ie_6_xp |
INFO
{
No connection} |
| clientsimulation-ie_8_win7 |
INFO
{
No connection} |
| clientsimulation-ie_8_xp |
INFO
{
No connection} |
| clientsimulation-ie_11_win7 |
INFO
{
TLSv1.2 DHE-RSA-AES256-GCM-SHA384} |
| clientsimulation-ie_11_win81 |
INFO
{
TLSv1.2 DHE-RSA-AES256-GCM-SHA384} |
| clientsimulation-ie_11_winphone81 |
INFO
{
No connection} |
| clientsimulation-ie_11_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
| clientsimulation-edge_15_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
| clientsimulation-edge_17_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
| clientsimulation-opera_66_win10 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
| clientsimulation-safari_9_ios9 |
INFO
{
No connection} |
| clientsimulation-safari_9_osx1011 |
INFO
{
No connection} |
| clientsimulation-safari_10_osx1012 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
| clientsimulation-safari_121_ios_122 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
| clientsimulation-safari_130_osx_10146 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
| clientsimulation-apple_ats_9_ios9 |
INFO
{
No connection} |
| clientsimulation-java_6u45 |
INFO
{
No connection} |
| clientsimulation-java_7u25 |
INFO
{
No connection} |
| clientsimulation-java_8u161 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
| clientsimulation-java1102 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
| clientsimulation-java1201 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
| clientsimulation-openssl_102e |
INFO
{
No connection} |
| clientsimulation-openssl_110l |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
| clientsimulation-openssl_111d |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
| clientsimulation-thunderbird_68_3_1 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
| rating_spec |
INFO
{
SSL Labs's 'SSL Server Rating Guide' (version 2009q from 2020-01-30)} |
| rating_doc |
INFO
{
https://github.com/ssllabs/research/wiki/SSL-Server-Rating-Guide} |
| protocol_support_score |
INFO
{
100} |
| protocol_support_score_weighted |
INFO
{
30} |
| key_exchange_score |
INFO
{
100} |
| key_exchange_score_weighted |
INFO
{
30} |
| cipher_strength_score |
INFO
{
90} |
| cipher_strength_score_weighted |
INFO
{
36} |
| final_score |
INFO
{
96} |
| overall_grade |
OK
{
A+} |
| scanTime |
INFO
{
79} |