Národní ústav pro vzdělávání, školské poradenské zařízení a zařízení pro další vzdělávání pedagogických pracovníků NUV
Služba je chráněna certifikátem od certifikační autority, kterou hlavní prohlížeče neznají hlavní prohlížeče neznají nebo jí nedůvěřují. V českých podmínkách to znamená nejspíše certifikáty vydané našimi vnitrostátními autoritami (ICA, PostSignum a eIdentity), které sice stát zákonem prohlásil za důvěryhodné, ale které nesplňují mezinárodní podmínky nutné proto, aby je za důvěryhodné pokládali i autoři prohlížečů.
Detailní report z HTTPs analýzy pomocí nástroje testssl.sh
server | www.nuv.cz/195.113.77.143 |
pre_128cipher |
INFO
{
No 128 cipher limit bug} |
SSLv2 |
OK
{
not offered} |
SSLv3 |
OK
{
not offered} |
TLS1 |
INFO
{
not offered} |
TLS1_1 |
INFO
{
not offered} |
TLS1_2 |
OK
{
offered} |
TLS1_3 |
INFO
{
not offered + downgraded to weaker protocol} |
NPN |
INFO
{
not offered} |
ALPN_HTTP2 |
OK
{
h2} |
ALPN |
INFO
{
http/1.1} |
cipherlist_NULL
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_aNULL
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_EXPORT
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_LOW
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_3DES_IDEA
zranitelnosti:
CWE-310
|
INFO
{
not offered} |
cipherlist_AVERAGE
zranitelnosti:
CWE-310
|
LOW
{
offered} |
cipherlist_GOOD |
OK
{
offered} |
cipherlist_STRONG |
OK
{
offered} |
cipher_order |
OK
{
server} |
protocol_negotiated |
OK
{
Default protocol TLS1.2} |
cipher_negotiated |
OK
{
ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)} |
cipher-tls1_2_xc030 |
OK
{
TLSv1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 253 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384} |
cipher-tls1_2_xcca8 |
OK
{
TLSv1.2 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256} |
cipher-tls1_2_xc061 |
OK
{
TLSv1.2 xc061 ECDHE-ARIA256-GCM-SHA384 ECDH 253 ARIAGCM 256 TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384} |
cipher-tls1_2_xc02f |
OK
{
TLSv1.2 xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 253 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256} |
cipher-tls1_2_xc060 |
OK
{
TLSv1.2 xc060 ECDHE-ARIA128-GCM-SHA256 ECDH 253 ARIAGCM 128 TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256} |
cipher-tls1_2_xc028 |
LOW
{
TLSv1.2 xc028 ECDHE-RSA-AES256-SHA384 ECDH 253 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384} |
cipher-tls1_2_xc077 |
LOW
{
TLSv1.2 xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 253 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384} |
cipher-tls1_2_xc027 |
LOW
{
TLSv1.2 xc027 ECDHE-RSA-AES128-SHA256 ECDH 253 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256} |
cipher-tls1_2_xc076 |
LOW
{
TLSv1.2 xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 253 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256} |
cipher-tls1_2_xc014 |
LOW
{
TLSv1.2 xc014 ECDHE-RSA-AES256-SHA ECDH 253 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA} |
cipher-tls1_2_xc013 |
LOW
{
TLSv1.2 xc013 ECDHE-RSA-AES128-SHA ECDH 253 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA} |
cipher-tls1_2_x9d |
OK
{
TLSv1.2 x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384} |
cipher-tls1_2_xc0a1 |
OK
{
TLSv1.2 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8} |
cipher-tls1_2_xc09d |
OK
{
TLSv1.2 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM} |
cipher-tls1_2_xc051 |
OK
{
TLSv1.2 xc051 ARIA256-GCM-SHA384 RSA ARIAGCM 256 TLS_RSA_WITH_ARIA_256_GCM_SHA384} |
cipher-tls1_2_x9c |
OK
{
TLSv1.2 x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256} |
cipher-tls1_2_xc0a0 |
OK
{
TLSv1.2 xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8} |
cipher-tls1_2_xc09c |
OK
{
TLSv1.2 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM} |
cipher-tls1_2_xc050 |
OK
{
TLSv1.2 xc050 ARIA128-GCM-SHA256 RSA ARIAGCM 128 TLS_RSA_WITH_ARIA_128_GCM_SHA256} |
cipher-tls1_2_x3d |
LOW
{
TLSv1.2 x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256} |
cipher-tls1_2_xc0 |
LOW
{
TLSv1.2 xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256} |
cipher-tls1_2_x3c |
LOW
{
TLSv1.2 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256} |
cipher-tls1_2_xba |
LOW
{
TLSv1.2 xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256} |
cipherorder_TLSv1_2 |
INFO
{
ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-CHACHA20-POLY1305 ECDHE-ARIA256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-ARIA128-GCM-SHA256 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-CAMELLIA256-SHA384 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-CAMELLIA128-SHA256 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA AES256-GCM-SHA384 AES256-CCM8 AES256-CCM ARIA256-GCM-SHA384 AES128-GCM-SHA256 AES128-CCM8 AES128-CCM ARIA128-GCM-SHA256 AES256-SHA256 CAMELLIA256-SHA256 AES128-SHA256 CAMELLIA128-SHA256} |
prioritize_chacha_TLSv1_2 |
INFO
{
false} |
FS |
OK
{
offered} |
FS_ciphers |
INFO
{
ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-CHACHA20-POLY1305 ECDHE-RSA-CAMELLIA256-SHA384 ECDHE-ARIA256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA ECDHE-RSA-CAMELLIA128-SHA256 ECDHE-ARIA128-GCM-SHA256} |
FS_ECDHE_curves |
OK
{
prime256v1 secp384r1 secp521r1 X25519 X448} |
TLS_extensions |
INFO
{
'renegotiation info/#65281' 'server name/#0' 'EC point formats/#11' 'max fragment length/#1' 'application layer protocol negotiation/#16' 'encrypt-then-mac/#22' 'extended master secret/#23'} |
TLS_session_ticket |
INFO
{
no -- no lifetime advertised} |
SSL_sessionID_support |
INFO
{
yes} |
sessionresumption_ticket |
INFO
{
not supported} |
sessionresumption_ID |
INFO
{
supported} |
TLS_timestamp |
INFO
{
random} |
cert_compression |
INFO
{
N/A} |
clientAuth |
INFO
{
none} |
cert_numbers |
INFO
{
1} |
cert_signatureAlgorithm |
OK
{
SHA256 with RSA} |
cert_keySize |
INFO
{
RSA 2048 bits (exponent is 65537)} |
cert_keyUsage |
INFO
{
Digital Signature, Key Encipherment} |
cert_extKeyUsage |
INFO
{
TLS Web Server Authentication, TLS Web Client Authentication} |
cert_serialNumber |
INFO
{
046C1DB441E20632729207FF82E946F0} |
cert_serialNumberLen |
INFO
{
16} |
cert_fingerprintSHA1 |
INFO
{
E4D82AFA2034274C2BB8A90449AE33C09429C008} |
cert_fingerprintSHA256 |
INFO
{
6CE798CCD5F049EA8B074F74C02446C7F7FCE602C230D0E3BD7454A7A76D5ECA} |
cert |
INFO
{
-----BEGIN CERTIFICATE----- MIIGeTCCBWGgAwIBAgIQBGwdtEHiBjJykgf/gulG8DANBgkqhkiG9w0BAQsFADBZ MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMTMwMQYDVQQDEypS YXBpZFNTTCBUTFMgRFYgUlNBIE1peGVkIFNIQTI1NiAyMDIwIENBLTEwHhcNMjEx MjIxMDAwMDAwWhcNMjMwMTE5MjM1OTU5WjATMREwDwYDVQQDDAgqLm51di5jejCC ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALOeH8NBMpOcB6mA+xRNdD3U jbFeXYKeP8XoiPtOXNb5Kg+dqVRw0wqdfpceK2BtLFS1jD/oXYJef9aVx2Vf/AkY mlXjXO6aJy7K6EiXRmuztcMlZ+Qbj26h7x3L7M4X7Hsys0vDrxvqUg1am6CClyle OzAJdaLpfrtO1HOqHpInQlmBx264h2rvHS9URw26oQRXTpIXB/k70sdoV8wNx9/v nt0W9QE9gQbBCBYVDFrkUFoBvSqAA3mzntwKNvvZNqoSHvPHvI9kguLCxA4E66sv FlAeAm1EZZP+2Co0RhV2shwopYsHhfHErd4Dn4Px1gw3/3SS1LF+1+Sa+M8Ap2sC AwEAAaOCA4EwggN9MB8GA1UdIwQYMBaAFKSN5b58eeRwI20uKTStI1jc9TF/MB0G A1UdDgQWBBT5l/lphJHrjXjk+y49bY9qsQKd6DAbBgNVHREEFDASgggqLm51di5j eoIGbnV2LmN6MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYI KwYBBQUHAwIwgZsGA1UdHwSBkzCBkDBGoESgQoZAaHR0cDovL2NybDMuZGlnaWNl cnQuY29tL1JhcGlkU1NMVExTRFZSU0FNaXhlZFNIQTI1NjIwMjBDQS0xLmNybDBG oESgQoZAaHR0cDovL2NybDQuZGlnaWNlcnQuY29tL1JhcGlkU1NMVExTRFZSU0FN aXhlZFNIQTI1NjIwMjBDQS0xLmNybDA+BgNVHSAENzA1MDMGBmeBDAECATApMCcG CCsGAQUFBwIBFhtodHRwOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwgYUGCCsGAQUF BwEBBHkwdzAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tME8G CCsGAQUFBzAChkNodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vUmFwaWRTU0xU TFNEVlJTQU1peGVkU0hBMjU2MjAyMENBLTEuY3J0MAkGA1UdEwQCMAAwggF8Bgor BgEEAdZ5AgQCBIIBbASCAWgBZgB1AOg+0No+9QY1MudXKLyJa8kD08vREWvs62nh d31tBr1uAAABfd1TqtoAAAQDAEYwRAIgX5dTNh6dz2ce6C4d8x1NwJaoDtWCiNPU QtggcNFFmEoCIGzmIfEpxbQIPcyS3VA61ZtLDuPH9ZFsjllWvG1SC2uzAHUANc8Z G7+xbFe/D61MbULLu7YnICZR6j/hKu+oA8M71kwAAAF93VOq/AAABAMARjBEAiAJ 7Bfdcj0TTgCVPJjv9gL+3VFTYI82Dw3fXRaUk0qrhgIgN/BXxBeswBrS7Pl9z37e VFZ9j5j43GUNhs6530qj6PkAdgCzc3cH4YRQ+GOG1gWp3BEJSnktsWcMC4fc8AMO eTalmgAAAX3dU6sSAAAEAwBHMEUCICB0wU2XHEJsEMdTAQNaRZPq9vZx3Me8e3Pq jNVurOsZAiEAtXSDQJX417RYhw/UySDkzk6LNy0Il6EvICVhO7GZyWwwDQYJKoZI hvcNAQELBQADggEBAMyhdIai+0fJCVvDpYLDv+66hOtFd1AIg2ddrMD0vnIhKYZO dH442z0dyUIQFTUUeXZAYPojnuaQkgoVJkvkMiN/LQ8AUmd03YRPWMGm3jOztbt9 p6WVjH2TTW0TiB5IRYt9I2Pv18BTfdCIhXJ+kRJ1Q2TrKWAzSahHIQF+xfnrUmye QNN6cw8GDjD8g3WFS0PQwepktpDAKKslJTTxFnJICfMHtI1xwioBrdXhvQMQSuSa F+bQqqd46uygFTNWzNRi71rOX+2rTccttIEETKcnUdcUHWJ7C1NDFKZs3driIXlL 1nRqu0/Mio6t8VGfjdUxrNdYwlnFtxC3W0pkMoE= -----END CERTIFICATE-----} |
cert_commonName |
OK
{
*.nuv.cz} |
cert_commonName_wo_SNI |
INFO
{
*.npi.cz} |
cert_subjectAltName |
INFO
{
*.nuv.cz nuv.cz} |
cert_trust |
OK
{
Ok via SAN wildcard and CN wildcard (SNI mandatory)} |
cert_chain_of_trust |
CRITICAL
{
failed (expired).} |
cert_certificatePolicies_EV |
INFO
{
no} |
cert_expirationStatus |
CRITICAL
{
expired} |
cert_notBefore |
INFO
{
2021-12-21 00:00} |
cert_notAfter |
CRITICAL
{
2023-01-19 23:59} |
cert_extlifeSpan |
OK
{
certificate has no extended life time according to browser forum} |
cert_eTLS |
INFO
{
not present} |
cert_crlDistributionPoints |
INFO
{
http://crl3.digicert.com/RapidSSLTLSDVRSAMixedSHA2562020CA-1.crl http://crl4.digicert.com/RapidSSLTLSDVRSAMixedSHA2562020CA-1.crl} |
cert_ocspURL |
INFO
{
http://ocsp.digicert.com} |
OCSP_stapling |
LOW
{
not offered} |
cert_mustStapleExtension |
INFO
{
--} |
DNS_CAArecord |
LOW
{
--} |
certificate_transparency |
OK
{
yes (certificate extension)} |
certs_countServer |
INFO
{
2} |
certs_list_ordering_problem |
INFO
{
no} |
cert_caIssuers |
INFO
{
RapidSSL TLS DV RSA Mixed SHA256 2020 CA-1 (DigiCert Inc from US)} |
intermediate_cert <#1> |
INFO
{
-----BEGIN CERTIFICATE----- MIIFUTCCBDmgAwIBAgIQB5g2A63jmQghnKAMJ7yKbDANBgkqhkiG9w0BAQsFADBh MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBD QTAeFw0yMDA3MTYxMjI1MjdaFw0yMzA1MzEyMzU5NTlaMFkxCzAJBgNVBAYTAlVT MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxMzAxBgNVBAMTKlJhcGlkU1NMIFRMUyBE ViBSU0EgTWl4ZWQgU0hBMjU2IDIwMjAgQ0EtMTCCASIwDQYJKoZIhvcNAQEBBQAD ggEPADCCAQoCggEBANpuQ1VVmXvZlaJmxGVYotAMFzoApohbJAeNpzN+49LbgkrM Lv2tblII8H43vN7UFumxV7lJdPwLP22qa0sV9cwCr6QZoGEobda+4pufG0aSfHQC QhulaqKpPcYYOPjTwgqJA84AFYj8l/IeQ8n01VyCurMIHA478ts2G6GGtEx0ucnE fV2QHUL64EC2yh7ybboo5v8nFWV4lx/xcfxoxkFTVnAIRgHrH2vUdOiV9slOix3z 5KPs2rK2bbach8Sh5GSkgp2HRoS/my0tCq1vjyLJeP0aNwPd3rk5O8LiffLev9j+ UKZo0tt0VvTLkdGmSN4h1mVY6DnGfOwp1C5SK0MCAwEAAaOCAgswggIHMB0GA1Ud DgQWBBSkjeW+fHnkcCNtLik0rSNY3PUxfzAfBgNVHSMEGDAWgBQD3lA1VtFMu2bw o+IbG8OXsj3RVTAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0lBBYwFAYIKwYBBQUHAwEG CCsGAQUFBwMCMBIGA1UdEwEB/wQIMAYBAf8CAQAwNAYIKwYBBQUHAQEEKDAmMCQG CCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wewYDVR0fBHQwcjA3 oDWgM4YxaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0R2xvYmFsUm9v dENBLmNybDA3oDWgM4YxaHR0cDovL2NybDQuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 R2xvYmFsUm9vdENBLmNybDCBzgYDVR0gBIHGMIHDMIHABgRVHSAAMIG3MCgGCCsG AQUFBwIBFhxodHRwczovL3d3dy5kaWdpY2VydC5jb20vQ1BTMIGKBggrBgEFBQcC AjB+DHxBbnkgdXNlIG9mIHRoaXMgQ2VydGlmaWNhdGUgY29uc3RpdHV0ZXMgYWNj ZXB0YW5jZSBvZiB0aGUgUmVseWluZyBQYXJ0eSBBZ3JlZW1lbnQgbG9jYXRlZCBh dCBodHRwczovL3d3dy5kaWdpY2VydC5jb20vcnBhLXVhMA0GCSqGSIb3DQEBCwUA A4IBAQAi49xtSOuOygBycy50quCThG45xIdUAsQCaXFVRa9asPaB/jLINXJL3qV9 J0Gh2bZM0k4yOMeAMZ57smP6JkcJihhOFlfQa18aljd+xNc6b+GX6oFcCHGr+gsE yPM8qvlKGxc5T5eHVzV6jpjpyzl6VEKpaxH6gdGVpQVgjkOR9yY9XAUlFnzlOCpq sm7r2ZUKpDfrhUnVzX2nSM15XSj48rVBBAnGJWkLPijlACd3sWFMVUiKRz1C5PZy el2l7J/W4d99KFLSYgoy5GDmARpwLc//fXfkr40nMY8ibCmxCsjXQTe0fJbtrrLL yWQlk9VDV296EI/kQOJNLVEkJ54P -----END CERTIFICATE-----} |
intermediate_cert_fingerprintSHA256 <#1> |
INFO
{
E6FA484A858940D101978555454AA466531AB6C4ABC4AD2B000626AAAC0D04F9} |
intermediate_cert_notBefore <#1> |
INFO
{
2020-07-16 12:25} |
intermediate_cert_notAfter <#1> |
CRITICAL
{
2023-05-31 23:59} |
intermediate_cert_expiration <#1> |
CRITICAL
{
expired!} |
intermediate_cert_chain <#1> |
INFO
{
RapidSSL TLS DV RSA Mixed SHA256 2020 CA-1 <-- DigiCert Global Root CA} |
intermediate_cert_badOCSP |
OK
{
intermediate certificate(s) is/are ok} |
insecure_redirect |
HIGH
{
Redirect to insecure URL: 'http://archiv-nuv.npi.cz/'} |
HTTP_status_code |
INFO
{
301 Moved Permanently ('/')} |
HTTP_clock_skew |
INFO
{
0 seconds from localtime} |
HTTP_headerTime |
INFO
{
1713471035} |
HSTS |
LOW
{
not offered} |
HPKP |
INFO
{
No support for HTTP Public Key Pinning} |
banner_server |
INFO
{
Apache/2.4.59} |
banner_application |
INFO
{
No application banner found} |
cookie_count |
INFO
{
0 at '/' (30x detected, better try target URL of 30x)} |
security_headers |
MEDIUM
{
--} |
banner_reverseproxy
zranitelnosti:
CWE-200
|
INFO
{
--} |
heartbleed
zranitelnosti:
CVE-2014-0160
CWE-119
|
OK
{
not vulnerable, no heartbeat extension} |
CCS
zranitelnosti:
CVE-2014-0224
CWE-310
|
OK
{
not vulnerable} |
ticketbleed
zranitelnosti:
CVE-2016-9244
CWE-200
|
OK
{
no session ticket extension} |
ROBOT |
OK
{
not vulnerable} |
secure_renego
zranitelnosti:
CWE-310
|
OK
{
supported} |
secure_client_renego
zranitelnosti:
CVE-2011-1473
CWE-310
|
OK
{
not vulnerable} |
CRIME_TLS
zranitelnosti:
CVE-2012-4929
CWE-310
|
OK
{
not vulnerable} |
BREACH
zranitelnosti:
CVE-2013-3587
CWE-310
|
OK
{
not vulnerable, no gzip/deflate/compress/br HTTP compression - only supplied '/' tested} |
POODLE_SSL
zranitelnosti:
CVE-2014-3566
CWE-310
|
OK
{
not vulnerable, no SSLv3} |
fallback_SCSV |
OK
{
no protocol below TLS 1.2 offered} |
SWEET32 |
OK
{
not vulnerable} |
FREAK
zranitelnosti:
CVE-2015-0204
CWE-310
|
OK
{
not vulnerable} |
DROWN |
OK
{
not vulnerable on this host and port} |
DROWN_hint |
INFO
{
Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://censys.io/ipv4?q=6CE798CCD5F049EA8B074F74C02446C7F7FCE602C230D0E3BD7454A7A76D5ECA} |
LOGJAM
zranitelnosti:
CVE-2015-4000
CWE-310
|
OK
{
not vulnerable, no DH EXPORT ciphers,} |
LOGJAM-common_primes
zranitelnosti:
CVE-2015-4000
CWE-310
|
OK
{
no DH key with <= TLS 1.2} |
BEAST
zranitelnosti:
CVE-2011-3389
CWE-20
|
OK
{
not vulnerable, no SSL3 or TLS1} |
LUCKY13
zranitelnosti:
CVE-2013-0169
CWE-310
|
LOW
{
potentially vulnerable, uses TLS CBC ciphers} |
winshock
zranitelnosti:
CVE-2014-6321
CWE-94
|
OK
{
not vulnerable} |
RC4 |
OK
{
not vulnerable} |
clientsimulation-android_442 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-android_500 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_60 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_70 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-android_81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-android_90 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-android_X |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-chrome_74_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-chrome_79_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-firefox_66_win81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-firefox_71_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-ie_6_xp |
INFO
{
No connection} |
clientsimulation-ie_8_win7 |
INFO
{
No connection} |
clientsimulation-ie_8_xp |
INFO
{
No connection} |
clientsimulation-ie_11_win7 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-SHA384} |
clientsimulation-ie_11_win81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-SHA384} |
clientsimulation-ie_11_winphone81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-SHA256} |
clientsimulation-ie_11_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-edge_15_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-edge_17_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-opera_66_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-safari_9_ios9 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-safari_9_osx1011 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-safari_10_osx1012 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-safari_121_ios_122 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-safari_130_osx_10146 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-apple_ats_9_ios9 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-java_6u45 |
INFO
{
No connection} |
clientsimulation-java_7u25 |
INFO
{
No connection} |
clientsimulation-java_8u161 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-java1102 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-java1201 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-openssl_102e |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-openssl_110l |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-openssl_111d |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
clientsimulation-thunderbird_68_3_1 |
INFO
{
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384} |
rating_spec |
INFO
{
SSL Labs's 'SSL Server Rating Guide' (version 2009q from 2020-01-30)} |
rating_doc |
INFO
{
https://github.com/ssllabs/research/wiki/SSL-Server-Rating-Guide} |
protocol_support_score |
INFO
{
0} |
protocol_support_score_weighted |
INFO
{
0} |
key_exchange_score |
INFO
{
0} |
key_exchange_score_weighted |
INFO
{
0} |
cipher_strength_score |
INFO
{
0} |
cipher_strength_score_weighted |
INFO
{
0} |
final_score |
INFO
{
0} |
overall_grade |
CRITICAL
{
T} |
grade_cap_reason_1 |
INFO
{
Grade capped to T. Issues with the chain of trust (expired)} |
grade_cap_reason_2 |
INFO
{
Grade capped to T. Certificate expired} |
grade_cap_reason_3 |
INFO
{
Grade capped to A. HSTS is not offered} |
scanTime |
INFO
{
105} |