Český úřad zeměměřický a katastrální Aplikace pro základní analýzy výškopisných dat. Jako zdroj dat pro analýzu jsou použity nové modely výškopisu území České republiky, které byly pořízeny metodou leteckého laserového skenování.
Všechno je v nejlepším pořádku a web se drží doporučených postupů.
Detailní report z HTTPs analýzy pomocí nástroje testssl.sh
server | ags.cuzk.cz/195.245.209.226 |
pre_128cipher |
INFO
{
No 128 cipher limit bug} |
SSLv2 |
OK
{
not offered} |
SSLv3 |
OK
{
not offered} |
TLS1 |
INFO
{
not offered} |
TLS1_1 |
INFO
{
not offered} |
TLS1_2 |
OK
{
offered} |
TLS1_3 |
OK
{
offered with final} |
NPN |
INFO
{
not offered} |
ALPN |
INFO
{
not offered} |
cipherlist_NULL
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_aNULL
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_EXPORT
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_LOW
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_3DES_IDEA
zranitelnosti:
CWE-310
|
INFO
{
not offered} |
cipherlist_AVERAGE
zranitelnosti:
CWE-310
|
LOW
{
offered} |
cipherlist_GOOD |
INFO
{
not offered} |
cipherlist_STRONG |
OK
{
offered} |
cipher_order |
OK
{
server} |
protocol_negotiated |
OK
{
Default protocol TLS1.3} |
cipher_negotiated |
OK
{
TLS_AES_256_GCM_SHA384, 253 bit ECDH (X25519)} |
cipher-tls1_2_xc030 |
OK
{
TLSv1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384} |
cipher-tls1_2_xc028 |
LOW
{
TLSv1.2 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384} |
cipher-tls1_2_x9f |
OK
{
TLSv1.2 x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384} |
cipher-tls1_2_xc02f |
OK
{
TLSv1.2 xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256} |
cipher-tls1_2_xc027 |
LOW
{
TLSv1.2 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256} |
cipher-tls1_2_x9e |
OK
{
TLSv1.2 x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256} |
cipherorder_TLSv1_2 |
INFO
{
ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 DHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 DHE-RSA-AES128-GCM-SHA256} |
cipher-tls1_3_x1302 |
OK
{
TLSv1.3 x1302 TLS_AES_256_GCM_SHA384 ECDH 253 AESGCM 256 TLS_AES_256_GCM_SHA384} |
cipher-tls1_3_x1301 |
OK
{
TLSv1.3 x1301 TLS_AES_128_GCM_SHA256 ECDH 253 AESGCM 128 TLS_AES_128_GCM_SHA256} |
cipher-tls1_3_x1303 |
OK
{
TLSv1.3 x1303 TLS_CHACHA20_POLY1305_SHA256 ECDH 253 ChaCha20 256 TLS_CHACHA20_POLY1305_SHA256} |
cipher-tls1_3_x1304 |
OK
{
TLSv1.3 x1304 TLS_AES_128_CCM_SHA256 ECDH 253 AESCCM 128 TLS_AES_128_CCM_SHA256} |
cipher-tls1_3_x1305 |
OK
{
TLSv1.3 x1305 TLS_AES_128_CCM_8_SHA256 ECDH 253 AESCCM8 128 TLS_AES_128_CCM_8_SHA256} |
cipherorder_TLSv1_3 |
INFO
{
TLS_AES_256_GCM_SHA384 TLS_AES_128_GCM_SHA256 TLS_CHACHA20_POLY1305_SHA256 TLS_AES_128_CCM_SHA256 TLS_AES_128_CCM_8_SHA256} |
prioritize_chacha_TLSv1_3 |
INFO
{
false} |
FS |
OK
{
offered} |
FS_ciphers |
INFO
{
TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 DHE-RSA-AES256-GCM-SHA384 TLS_AES_128_GCM_SHA256 TLS_AES_128_CCM_SHA256 TLS_AES_128_CCM_8_SHA256 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 DHE-RSA-AES128-GCM-SHA256} |
FS_ECDHE_curves |
OK
{
prime256v1 secp384r1 secp521r1 X25519 X448} |
DH_groups |
OK
{
HAProxy} |
TLS_extensions |
INFO
{
'renegotiation info/#65281' 'server name/#0' 'EC point formats/#11' 'session ticket/#35' 'supported versions/#43' 'key share/#51' 'supported_groups/#10' 'max fragment length/#1' 'encrypt-then-mac/#22' 'extended master secret/#23'} |
TLS_session_ticket |
INFO
{
valid for 300 seconds only (<daily)} |
SSL_sessionID_support |
INFO
{
yes} |
sessionresumption_ticket |
INFO
{
supported} |
sessionresumption_ID |
INFO
{
supported} |
TLS_timestamp |
INFO
{
random} |
certificate_compression |
INFO
{
none} |
clientAuth |
INFO
{
none} |
cert_numbers |
INFO
{
1} |
cert_signatureAlgorithm |
OK
{
SHA256 with RSA} |
cert_keySize |
INFO
{
RSA 2048 bits (exponent is 65537)} |
cert_keyUsage |
INFO
{
Digital Signature, Key Encipherment} |
cert_extKeyUsage |
INFO
{
TLS Web Server Authentication, TLS Web Client Authentication} |
cert_serialNumber |
INFO
{
0C68A7D894E92F7B7CE803CF078253F3} |
cert_serialNumberLen |
INFO
{
16} |
cert_fingerprintSHA1 |
INFO
{
3DA7C12BEF0D3800B0899F3545E0427B54878C50} |
cert_fingerprintSHA256 |
INFO
{
669D49D725A38B8373B943B9E37D792B41707F6A10C4C1FE3BC41B544384CE95} |
cert |
INFO
{
-----BEGIN CERTIFICATE----- MIIGXzCCBUegAwIBAgIQDGin2JTpL3t86APPB4JT8zANBgkqhkiG9w0BAQsFADBe MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMR0wGwYDVQQDExRHZW9UcnVzdCBSU0EgQ0EgMjAxODAe Fw0yMzA2MDcwMDAwMDBaFw0yNDA2MTMyMzU5NTlaMGAxCzAJBgNVBAYTAkNaMQ4w DAYDVQQHEwVQcmFoYTEtMCsGA1UEChMkQ2Vza3kgdXJhZCB6ZW1lbWVyaWNreSBh IGthdGFzdHJhbG5pMRIwEAYDVQQDDAkqLmN1emsuY3owggEiMA0GCSqGSIb3DQEB AQUAA4IBDwAwggEKAoIBAQD5YhabC0L3eoq98eYRG9ZHQf7tWfsCv907RbvecezL 86JInxQXPc8ckgHE/qu6aYrOTAf8xtizGTdMyx/vZqL5xnslB3sSImBEGs66cvOI InsiMT8xmE1MfZYMszcaeC/X8EAvm38Hk0nKxOkbsEwICPgBeQYtXjrVZoR44mSA kFzPR4HPoH7B6EL6F1qw4QJ2P3qlm5DOihrFyQZKgq0lu82cz5cDTB1AjNy1TWnx 5qVQa6br4NlyhF3shvV0X3+ztbYpTMzN1zvRs6bK/FSzfs6WofEhzFkhYCN9dWGG 8JfjmAW5Cj3I+7xkAATuCfxnM5Zrk3lplbGaHL9zakdpAgMBAAGjggMVMIIDETAf BgNVHSMEGDAWgBSQWP+wnHWoUVR3se3yo0MWOJ5sxTAdBgNVHQ4EFgQUAWg87bcJ l013xAiMytWVXPaig3MwHQYDVR0RBBYwFIIJKi5jdXprLmN6ggdjdXprLmN6MA4G A1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwPgYD VR0fBDcwNTAzoDGgL4YtaHR0cDovL2NkcC5nZW90cnVzdC5jb20vR2VvVHJ1c3RS U0FDQTIwMTguY3JsMD4GA1UdIAQ3MDUwMwYGZ4EMAQICMCkwJwYIKwYBBQUHAgEW G2h0dHA6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzB1BggrBgEFBQcBAQRpMGcwJgYI KwYBBQUHMAGGGmh0dHA6Ly9zdGF0dXMuZ2VvdHJ1c3QuY29tMD0GCCsGAQUFBzAC hjFodHRwOi8vY2FjZXJ0cy5nZW90cnVzdC5jb20vR2VvVHJ1c3RSU0FDQTIwMTgu Y3J0MAkGA1UdEwQCMAAwggF9BgorBgEEAdZ5AgQCBIIBbQSCAWkBZwB2AHb/iD8K tvuVUcJhzPWHujS0pM27KdxoQgqf5mdMWjp0AAABiJTgpOUAAAQDAEcwRQIgVZ+V 3yleqGyoczmkssbC4WIgDmJwesT/kDUMoxtfPPgCIQCJL5REuilKs1m15i39iPNz r0xk7PcFIGeLezp0HiyrsAB2AEiw42vapkc0D+VqAvqdMOscUgHLVt0sgdm7v6s5 2IRzAAABiJTgpNkAAAQDAEcwRQIgTOLAw6wvy5CgwzPDFbgQAwrAjiorWhxYQ6lO B4VHlqMCIQDd4XAqqn+Y3MjpgmDeOTJairHdrQt8lgnSf071eIVVAQB1ANq2v2s/ tbYin5vCu1xr6HCRcWy7UYSFNL2kPTBI1/urAAABiJTgpJsAAAQDAEYwRAIgLxSE 4Jtg/pLQG/nEInAU4FTzVnYKKsJQFu09+1qVvRcCICkdiiy+39fvlELQnYFuAOnq uRL/OL/3o14O860LYvNQMA0GCSqGSIb3DQEBCwUAA4IBAQCXZBMR165Jc1z2S9og +tZH0KbHXK2eHKA3F0QzEmsb67LXdpE7HguxIAh9zWwJ5VWwVL9WuRIBdxwYt9D9 p1sTQXa+4Ny/EX+SpkYkDxBJlxGzNDKOv2bqbJm+c6uSUN4FURriE/+W+kLNA3Ci I8WCls+l+tBhYCx5/QM5Y4VSMUQjM5siM196U/U5sE9YiagQUaqGXKX+1LmB2KpN nxPYJ2V72932e3i7ZMcNAFXt8k7Qptkr76NLWNyFX4ST9yn30YmxhDEQf7yRs+hM Fb1NwU1mYg7KJFWtMXdY2nF5tzOdtnIwvWUS5wxF0muSzI5cH0Gub8gQeI3eim2T TAB8 -----END CERTIFICATE-----} |
cert_commonName |
OK
{
*.cuzk.cz} |
cert_commonName_wo_SNI |
INFO
{
*.cuzk.cz} |
cert_subjectAltName |
INFO
{
*.cuzk.cz cuzk.cz} |
cert_trust |
OK
{
Ok via SAN wildcard and CN wildcard (same w/o SNI)} |
cert_chain_of_trust |
OK
{
passed.} |
cert_certificatePolicies_EV |
INFO
{
no} |
cert_expirationStatus |
MEDIUM
{
expires < 60 days (47)} |
cert_notBefore |
INFO
{
2023-06-07 00:00} |
cert_notAfter |
MEDIUM
{
2024-06-13 23:59} |
cert_extlifeSpan |
OK
{
certificate has no extended life time according to browser forum} |
cert_eTLS |
INFO
{
not present} |
cert_crlDistributionPoints |
INFO
{
http://cdp.geotrust.com/GeoTrustRSACA2018.crl} |
cert_ocspURL |
INFO
{
http://status.geotrust.com} |
OCSP_stapling |
LOW
{
not offered} |
cert_mustStapleExtension |
INFO
{
--} |
DNS_CAArecord |
LOW
{
--} |
certificate_transparency |
OK
{
yes (certificate extension)} |
certs_countServer |
INFO
{
2} |
certs_list_ordering_problem |
INFO
{
no} |
cert_caIssuers |
INFO
{
GeoTrust RSA CA 2018 (DigiCert Inc from US)} |
intermediate_cert <#1> |
INFO
{
-----BEGIN CERTIFICATE----- MIIEizCCA3OgAwIBAgIQBUb+GCP34ZQdo5/OFMRhczANBgkqhkiG9w0BAQsFADBh MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBD QTAeFw0xNzExMDYxMjIzNDVaFw0yNzExMDYxMjIzNDVaMF4xCzAJBgNVBAYTAlVT MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j b20xHTAbBgNVBAMTFEdlb1RydXN0IFJTQSBDQSAyMDE4MIIBIjANBgkqhkiG9w0B AQEFAAOCAQ8AMIIBCgKCAQEAv4rRY03hGOqHXegWPI9/tr6HFzekDPgxP59FVEAh 150Hm8oDI0q9m+2FAmM/n4W57Cjv8oYi2/hNVEHFtEJ/zzMXAQ6CkFLTxzSkwaEB 2jKgQK0fWeQz/KDDlqxobNPomXOMJhB3y7c/OTLo0lko7geG4gk7hfiqafapa59Y rXLIW4dmrgjgdPstU0Nigz2PhUwRl9we/FAwuIMIMl5cXMThdSBK66XWdS3cLX18 4ND+fHWhTkAChJrZDVouoKzzNYoq6tZaWmyOLKv23v14RyZ5eqoi6qnmcRID0/i6 U9J5nL1krPYbY7tNjzgC+PBXXcWqJVoMXcUw/iBTGWzpwwIDAQABo4IBQDCCATww HQYDVR0OBBYEFJBY/7CcdahRVHex7fKjQxY4nmzFMB8GA1UdIwQYMBaAFAPeUDVW 0Uy7ZvCj4hsbw5eyPdFVMA4GA1UdDwEB/wQEAwIBhjAdBgNVHSUEFjAUBggrBgEF BQcDAQYIKwYBBQUHAwIwEgYDVR0TAQH/BAgwBgEB/wIBADA0BggrBgEFBQcBAQQo MCYwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBCBgNVHR8E OzA5MDegNaAzhjFodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRHbG9i YWxSb290Q0EuY3JsMD0GA1UdIAQ2MDQwMgYEVR0gADAqMCgGCCsGAQUFBwIBFhxo dHRwczovL3d3dy5kaWdpY2VydC5jb20vQ1BTMA0GCSqGSIb3DQEBCwUAA4IBAQAw 8YdVPYQI/C5earp80s3VLOO+AtpdiXft9OlWwJLwKlUtRfccKj8QW/Pp4b7h6QAl ufejwQMb455OjpIbCZVS+awY/R8pAYsXCnM09GcSVe4ivMswyoCZP/vPEn/LPRhH hdgUPk8MlD979RGoUWz7qGAwqJChi28uRds3thx+vRZZIbEyZ62No0tJPzsSGSz8 nQ//jP8BIwrzBAUH5WcBAbmvgWfrKcuv+PyGPqRcc4T55TlzrBnzAzZ3oClo9fTv O9PuiHMKrC6V6mgi0s2sa/gbXlPCD9Z24XUMxJElwIVTDuKB0Q4YMMlnpN/QChJ4 B0AFsQ+DU0NCO+f78Xf7 -----END CERTIFICATE-----} |
intermediate_cert_fingerprintSHA256 <#1> |
INFO
{
8CC34E11C167045824ADE61C4907A6440EDB2C4398E99C112A859D661F8E2BC7} |
intermediate_cert_notBefore <#1> |
INFO
{
2017-11-06 12:23} |
intermediate_cert_notAfter <#1> |
OK
{
2027-11-06 12:23} |
intermediate_cert_expiration <#1> |
OK
{
ok > 40 days} |
intermediate_cert_chain <#1> |
INFO
{
GeoTrust RSA CA 2018 <-- DigiCert Global Root CA} |
intermediate_cert_badOCSP |
OK
{
intermediate certificate(s) is/are ok} |
insecure_redirect |
HIGH
{
Redirect to insecure URL: 'http://ags.cuzk.cz/geoprohlizec'} |
HTTP_status_code |
INFO
{
301 Moved Permanently ('/')} |
HTTP_clock_skew |
INFO
{
-1 seconds from localtime} |
HTTP_headerTime |
INFO
{
1714218800} |
HSTS |
LOW
{
not offered} |
HPKP |
INFO
{
No support for HTTP Public Key Pinning} |
banner_server |
INFO
{
Microsoft-IIS/8.5} |
banner_application |
INFO
{
No application banner found} |
cookie_count |
INFO
{
0 at '/' (30x detected, better try target URL of 30x)} |
security_headers |
MEDIUM
{
--} |
banner_reverseproxy
zranitelnosti:
CWE-200
|
INFO
{
--} |
heartbleed
zranitelnosti:
CVE-2014-0160
CWE-119
|
OK
{
not vulnerable, no heartbeat extension} |
CCS
zranitelnosti:
CVE-2014-0224
CWE-310
|
OK
{
not vulnerable} |
ticketbleed
zranitelnosti:
CVE-2016-9244
CWE-200
|
OK
{
not vulnerable} |
ROBOT |
OK
{
not vulnerable, no RSA key transport cipher} |
secure_renego
zranitelnosti:
CWE-310
|
OK
{
supported} |
secure_client_renego
zranitelnosti:
CVE-2011-1473
CWE-310
|
OK
{
not vulnerable} |
CRIME_TLS
zranitelnosti:
CVE-2012-4929
CWE-310
|
OK
{
not vulnerable} |
BREACH
zranitelnosti:
CVE-2013-3587
CWE-310
|
OK
{
not vulnerable, no gzip/deflate/compress/br HTTP compression - only supplied '/' tested} |
POODLE_SSL
zranitelnosti:
CVE-2014-3566
CWE-310
|
OK
{
not vulnerable, no SSLv3} |
fallback_SCSV |
OK
{
no protocol below TLS 1.2 offered} |
SWEET32 |
OK
{
not vulnerable} |
FREAK
zranitelnosti:
CVE-2015-0204
CWE-310
|
OK
{
not vulnerable} |
DROWN |
OK
{
not vulnerable on this host and port} |
DROWN_hint |
INFO
{
Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://censys.io/ipv4?q=669D49D725A38B8373B943B9E37D792B41707F6A10C4C1FE3BC41B544384CE95} |
LOGJAM-common_primes
zranitelnosti:
CVE-2015-4000
CWE-310
|
INFO
{
HAProxy} |
LOGJAM
zranitelnosti:
CVE-2015-4000
CWE-310
|
OK
{
not vulnerable, no DH EXPORT ciphers,} |
BEAST
zranitelnosti:
CVE-2011-3389
CWE-20
|
OK
{
not vulnerable, no SSL3 or TLS1} |
LUCKY13
zranitelnosti:
CVE-2013-0169
CWE-310
|
LOW
{
potentially vulnerable, uses TLS CBC ciphers} |
winshock
zranitelnosti:
CVE-2014-6321
CWE-94
|
OK
{
not vulnerable} |
RC4 |
OK
{
not vulnerable} |
clientsimulation-android_442 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-android_500 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_60 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_70 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-android_81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-android_90 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
clientsimulation-android_X |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
clientsimulation-chrome_74_win10 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
clientsimulation-chrome_79_win10 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
clientsimulation-firefox_66_win81 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
clientsimulation-firefox_71_win10 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
clientsimulation-ie_6_xp |
INFO
{
No connection} |
clientsimulation-ie_8_win7 |
INFO
{
No connection} |
clientsimulation-ie_8_xp |
INFO
{
No connection} |
clientsimulation-ie_11_win7 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-SHA384} |
clientsimulation-ie_11_win81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-SHA384} |
clientsimulation-ie_11_winphone81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-SHA256} |
clientsimulation-ie_11_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-edge_15_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-edge_17_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-opera_66_win10 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
clientsimulation-safari_9_ios9 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-safari_9_osx1011 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-safari_10_osx1012 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-safari_121_ios_122 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
clientsimulation-safari_130_osx_10146 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
clientsimulation-apple_ats_9_ios9 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-java_6u45 |
INFO
{
No connection} |
clientsimulation-java_7u25 |
INFO
{
No connection} |
clientsimulation-java_8u161 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-java1102 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
clientsimulation-java1201 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
clientsimulation-openssl_102e |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-openssl_110l |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-openssl_111d |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
clientsimulation-thunderbird_68_3_1 |
INFO
{
TLSv1.3 TLS_AES_256_GCM_SHA384} |
rating_spec |
INFO
{
SSL Labs's 'SSL Server Rating Guide' (version 2009q from 2020-01-30)} |
rating_doc |
INFO
{
https://github.com/ssllabs/research/wiki/SSL-Server-Rating-Guide} |
protocol_support_score |
INFO
{
100} |
protocol_support_score_weighted |
INFO
{
30} |
key_exchange_score |
INFO
{
90} |
key_exchange_score_weighted |
INFO
{
27} |
cipher_strength_score |
INFO
{
90} |
cipher_strength_score_weighted |
INFO
{
36} |
final_score |
INFO
{
93} |
overall_grade |
OK
{
A} |
grade_cap_reason_1 |
INFO
{
Grade capped to A. HSTS is not offered} |
scanTime |
INFO
{
68} |