Institut plánování a rozvoje hlavního města Prahy
Všechno je v nejlepším pořádku a web se drží doporučených postupů.
Detailní report z HTTPs analýzy pomocí nástroje testssl.sh
server | supervizor.iprpraha.cz/193.35.105.104 |
pre_128cipher |
INFO
{
No 128 cipher limit bug} |
SSLv2 |
OK
{
not offered} |
SSLv3 |
OK
{
not offered} |
TLS1 |
INFO
{
not offered} |
TLS1_1 |
INFO
{
not offered} |
TLS1_2 |
OK
{
offered} |
TLS1_3 |
CRITICAL
{
connection failed rather than downgrading to TLSv1.2} |
NPN |
INFO
{
not offered} |
ALPN |
INFO
{
not offered} |
cipherlist_NULL
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_aNULL
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_EXPORT
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_LOW
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_3DES_IDEA
zranitelnosti:
CWE-310
|
INFO
{
not offered} |
cipherlist_AVERAGE
zranitelnosti:
CWE-310
|
LOW
{
offered} |
cipherlist_GOOD |
OK
{
offered} |
cipherlist_STRONG |
OK
{
offered} |
cipher_order |
OK
{
server} |
protocol_negotiated |
OK
{
Default protocol TLS1.2} |
cipher_negotiated |
OK
{
ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)} |
cipher-tls1_2_xc02f |
OK
{
TLSv1.2 xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256} |
cipher-tls1_2_xc030 |
OK
{
TLSv1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384} |
cipher-tls1_2_x9e |
OK
{
TLSv1.2 x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256} |
cipher-tls1_2_x9f |
OK
{
TLSv1.2 x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384} |
cipher-tls1_2_xc027 |
LOW
{
TLSv1.2 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256} |
cipher-tls1_2_xc013 |
LOW
{
TLSv1.2 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA} |
cipher-tls1_2_xc028 |
LOW
{
TLSv1.2 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384} |
cipher-tls1_2_xc014 |
LOW
{
TLSv1.2 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA} |
cipher-tls1_2_x67 |
LOW
{
TLSv1.2 x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256} |
cipher-tls1_2_x33 |
LOW
{
TLSv1.2 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA} |
cipher-tls1_2_x6b |
LOW
{
TLSv1.2 x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256} |
cipher-tls1_2_x39 |
LOW
{
TLSv1.2 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA} |
cipher-tls1_2_x9c |
OK
{
TLSv1.2 x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256} |
cipher-tls1_2_x9d |
OK
{
TLSv1.2 x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384} |
cipher-tls1_2_x3c |
LOW
{
TLSv1.2 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256} |
cipher-tls1_2_x3d |
LOW
{
TLSv1.2 x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256} |
cipher-tls1_2_x2f |
LOW
{
TLSv1.2 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA} |
cipher-tls1_2_x35 |
LOW
{
TLSv1.2 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA} |
cipher-tls1_2_xc0a3 |
OK
{
TLSv1.2 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8} |
cipher-tls1_2_xc09f |
OK
{
TLSv1.2 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM} |
cipher-tls1_2_xc0a2 |
OK
{
TLSv1.2 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8} |
cipher-tls1_2_xc09e |
OK
{
TLSv1.2 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM} |
cipher-tls1_2_xc0a1 |
OK
{
TLSv1.2 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8} |
cipher-tls1_2_xc09d |
OK
{
TLSv1.2 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM} |
cipher-tls1_2_xc0a0 |
OK
{
TLSv1.2 xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8} |
cipherorder_TLSv1_2 |
INFO
{
ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA AES128-GCM-SHA256 AES256-GCM-SHA384 AES128-SHA256 AES256-SHA256 AES128-SHA AES256-SHA DHE-RSA-AES256-CCM8 DHE-RSA-AES256-CCM DHE-RSA-AES128-CCM8 DHE-RSA-AES128-CCM AES256-CCM8 AES256-CCM AES128-CCM8} |
FS |
OK
{
offered} |
FS_ciphers |
INFO
{
ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-CCM8 DHE-RSA-AES256-CCM DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA ECDHE-RSA-CAMELLIA256-SHA384 DHE-RSA-CAMELLIA256-SHA256 DHE-RSA-CAMELLIA256-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-CCM8 DHE-RSA-AES128-CCM DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA ECDHE-RSA-CAMELLIA128-SHA256 DHE-RSA-CAMELLIA128-SHA256 DHE-RSA-CAMELLIA128-SHA} |
FS_ECDHE_curves |
OK
{
prime256v1} |
DH_groups |
OK
{
Unknown DH group (2048 bits)} |
TLS_extensions |
INFO
{
'renegotiation info/#65281' 'server name/#0' 'EC point formats/#11' 'session ticket/#35' 'encrypt-then-mac/#22' 'extended master secret/#23'} |
TLS_session_ticket |
INFO
{
valid for 7200 seconds only (<daily)} |
SSL_sessionID_support |
INFO
{
yes} |
sessionresumption_ticket |
INFO
{
supported} |
sessionresumption_ID |
INFO
{
supported} |
TLS_timestamp |
INFO
{
random} |
cert_compression |
INFO
{
N/A} |
clientAuth |
INFO
{
none} |
cert_numbers |
INFO
{
1} |
cert_signatureAlgorithm |
OK
{
SHA256 with RSA} |
cert_keySize |
INFO
{
RSA 2048 bits (exponent is 65537)} |
cert_keyUsage |
INFO
{
Digital Signature, Key Encipherment} |
cert_extKeyUsage |
INFO
{
TLS Web Server Authentication, TLS Web Client Authentication} |
cert_serialNumber |
INFO
{
0C10DB5998584797B4B6C43598344946} |
cert_serialNumberLen |
INFO
{
16} |
cert_fingerprintSHA1 |
INFO
{
5C653FCB5C22EFDCA773B4211DE79E8AB05A9D67} |
cert_fingerprintSHA256 |
INFO
{
B9B764068A76A7EAA9C07EA8E1F0A5A0D27F48CA6108155923E0EE08FFF5DD0F} |
cert |
INFO
{
-----BEGIN CERTIFICATE----- MIIGhDCCBWygAwIBAgIQDBDbWZhYR5e0tsQ1mDRJRjANBgkqhkiG9w0BAQsFADBg MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMR8wHQYDVQQDExZHZW9UcnVzdCBUTFMgUlNBIENBIEcx MB4XDTIzMDgwODAwMDAwMFoXDTI0MDgxMjIzNTk1OVowdjELMAkGA1UEBhMCQ1ox DjAMBgNVBAcTBVByYWhhMT8wPQYDVQQKDDZJbnN0aXR1dCBwbMOhbm92w6Fuw60g YSByb3p2b2plIGhsYXZuw61obyBtxJtzdGEgUHJhaHkxFjAUBgNVBAMMDSouaXBy cHJhaGEuY3owggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCj+hGvczu6 W9lO+7LkkLAfH7aN2ApHPivAUNXMUQUWj51sDnkXKaF8sMLwEM0hdYvAymWjowcq eupO6aGMAyzTDLNtKlzrSA3Pol0bW2tPVsXYPIvWQhGK94ybuxL4IETREYNt42zY yThTJ9n//mo7GhIAGHFZlo1qdWoYr5w5XFjBqIBIl5HI13yzIWQVgH+O3I4t+WUi ofDk+ncAAWvr093FlLes6wHX4bcbOy6S7Hz836TFvUZB4NR7AwL6syAyaloctIhI /3tHw15OkevIeeIkMJu0OdQFiiM0JlI+6yuhgRMR8eDM1JnpwWYpVymam4lJ9f2w lHgrLdVl0pBxAgMBAAGjggMiMIIDHjAfBgNVHSMEGDAWgBSUT9Rdi+Sk4qaA/v3Y +QDvo74CVzAdBgNVHQ4EFgQU6uLfG6TkMcQxcGIRtgRvDqV/dTYwJQYDVR0RBB4w HIINKi5pcHJwcmFoYS5jeoILaXBycHJhaGEuY3owDgYDVR0PAQH/BAQDAgWgMB0G A1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjA/BgNVHR8EODA2MDSgMqAwhi5o dHRwOi8vY2RwLmdlb3RydXN0LmNvbS9HZW9UcnVzdFRMU1JTQUNBRzEuY3JsMD4G A1UdIAQ3MDUwMwYGZ4EMAQICMCkwJwYIKwYBBQUHAgEWG2h0dHA6Ly93d3cuZGln aWNlcnQuY29tL0NQUzB2BggrBgEFBQcBAQRqMGgwJgYIKwYBBQUHMAGGGmh0dHA6 Ly9zdGF0dXMuZ2VvdHJ1c3QuY29tMD4GCCsGAQUFBzAChjJodHRwOi8vY2FjZXJ0 cy5nZW90cnVzdC5jb20vR2VvVHJ1c3RUTFNSU0FDQUcxLmNydDAJBgNVHRMEAjAA MIIBgAYKKwYBBAHWeQIEAgSCAXAEggFsAWoAdwDuzdBk1dsazsVct520zROiModG fLzs3sNRSFlGcR+1mwAAAYnUEeFsAAAEAwBIMEYCIQCh9mKSCQ+dM/UEd7boDo/9 ktL8qvwPLdLcqiCmO7bx5gIhAO3t0NubkBaV4/lZGZToBNBJE+Ew5Q/aIFrA0k26 vamuAHcASLDja9qmRzQP5WoC+p0w6xxSActW3SyB2bu/qznYhHMAAAGJ1BHhTAAA BAMASDBGAiEA0qYLn0+QwXsitV3BKGLjvxazwN2DnxtzPQZBaacKPwwCIQCKdlus ay69N6nuMv2E+fTljs49XXhXoBI+yGibU/vqTgB2ANq2v2s/tbYin5vCu1xr6HCR cWy7UYSFNL2kPTBI1/urAAABidQR4SEAAAQDAEcwRQIgAYryQF6VfFcOfX283ljQ 5xUDwMcL14cy1dhtPeSNZAYCIQCRoy9chRDxtuyIsYHM5VJRpM17FzcEzYwV1d3a dqd95TANBgkqhkiG9w0BAQsFAAOCAQEAMQCDHWnIUJvMeu1QwbckW2cARnYk3gGP ceRjKHpmcuQF7WT3WYZdyG2NOpqbUzoirl/HKEus5cI05uwtqbnn/WYXbmCzFJZb BPoHxByNSuqD/c7veV9/GOSYUt4T+PhsKwPbe5caxHkpFjxJB8S+2yeHM5Lsz08d kICF5S72gMQZqZivQwdAs36AdJx+p9Ga6afNq5JZ+FW2q7ZUT5besaE0ONSYbSgB PPwRmmDxWGvAPUCc6pStQXqmWKBgDFQC3a8goBUQ4QE33jiw7NYNvHvk8Ah8lwc1 oLWGfMtHOcTZrXhf5s3AUGRn069kdWQOox6ySCa8TEJDUOXcAkT19A== -----END CERTIFICATE-----} |
cert_commonName |
OK
{
*.iprpraha.cz} |
cert_commonName_wo_SNI |
INFO
{
*.iprpraha.cz} |
cert_subjectAltName |
INFO
{
*.iprpraha.cz iprpraha.cz} |
cert_trust |
OK
{
Ok via SAN wildcard and CN wildcard (same w/o SNI)} |
cert_chain_of_trust |
OK
{
passed.} |
cert_certificatePolicies_EV |
INFO
{
no} |
cert_expirationStatus |
OK
{
116 >= 60 days} |
cert_notBefore |
INFO
{
2023-08-08 00:00} |
cert_notAfter |
OK
{
2024-08-12 23:59} |
cert_extlifeSpan |
OK
{
certificate has no extended life time according to browser forum} |
cert_eTLS |
INFO
{
not present} |
cert_crlDistributionPoints |
INFO
{
http://cdp.geotrust.com/GeoTrustTLSRSACAG1.crl} |
cert_ocspURL |
INFO
{
http://status.geotrust.com} |
OCSP_stapling |
LOW
{
not offered} |
cert_mustStapleExtension |
INFO
{
--} |
DNS_CAArecord |
LOW
{
--} |
certificate_transparency |
OK
{
yes (certificate extension)} |
certs_countServer |
INFO
{
3} |
certs_list_ordering_problem |
LOW
{
yes} |
cert_caIssuers |
INFO
{
GeoTrust TLS RSA CA G1 (DigiCert Inc from US)} |
intermediate_cert <#1> |
INFO
{
-----BEGIN CERTIFICATE----- MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG 9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI 2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx 1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV 5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY 1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4 NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91 8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl MrY= -----END CERTIFICATE-----} |
intermediate_cert_fingerprintSHA256 <#1> |
INFO
{
CB3CCBB76031E5E0138F8DD39A23F9DE47FFC35E43C1144CEA27D46A5AB1CB5F} |
intermediate_cert_notBefore <#1> |
INFO
{
2013-08-01 12:00} |
intermediate_cert_notAfter <#1> |
OK
{
2038-01-15 12:00} |
intermediate_cert_expiration <#1> |
OK
{
ok > 40 days} |
intermediate_cert_chain <#1> |
INFO
{
DigiCert Global Root G2 <-- DigiCert Global Root G2} |
intermediate_cert <#2> |
INFO
{
-----BEGIN CERTIFICATE----- MIIEjTCCA3WgAwIBAgIQDQd4KhM/xvmlcpbhMf/ReTANBgkqhkiG9w0BAQsFADBh MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH MjAeFw0xNzExMDIxMjIzMzdaFw0yNzExMDIxMjIzMzdaMGAxCzAJBgNVBAYTAlVT MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j b20xHzAdBgNVBAMTFkdlb1RydXN0IFRMUyBSU0EgQ0EgRzEwggEiMA0GCSqGSIb3 DQEBAQUAA4IBDwAwggEKAoIBAQC+F+jsvikKy/65LWEx/TMkCDIuWegh1Ngwvm4Q yISgP7oU5d79eoySG3vOhC3w/3jEMuipoH1fBtp7m0tTpsYbAhch4XA7rfuD6whU gajeErLVxoiWMPkC/DnUvbgi74BJmdBiuGHQSd7LwsuXpTEGG9fYXcbTVN5SATYq DfbexbYxTMwVJWoVb6lrBEgM3gBBqiiAiy800xu1Nq07JdCIQkBsNpFtZbIZhsDS fzlGWP4wEmBQ3O67c+ZXkFr2DcrXBEtHam80Gp2SNhou2U5U7UesDL/xgLK6/0d7 6TnEVMSUVJkZ8VeZr+IUIlvoLrtjLbqugb0T3OYXW+CQU0kBAgMBAAGjggFAMIIB PDAdBgNVHQ4EFgQUlE/UXYvkpOKmgP792PkA76O+AlcwHwYDVR0jBBgwFoAUTiJU IBiV5uNu5g/6+rkS7QYXjzkwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsG AQUFBwMBBggrBgEFBQcDAjASBgNVHRMBAf8ECDAGAQH/AgEAMDQGCCsGAQUFBwEB BCgwJjAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEIGA1Ud HwQ7MDkwN6A1oDOGMWh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEds b2JhbFJvb3RHMi5jcmwwPQYDVR0gBDYwNDAyBgRVHSAAMCowKAYIKwYBBQUHAgEW HGh0dHBzOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwDQYJKoZIhvcNAQELBQADggEB AIIcBDqC6cWpyGUSXAjjAcYwsK4iiGF7KweG97i1RJz1kwZhRoo6orU1JtBYnjzB c4+/sXmnHJk3mlPyL1xuIAt9sMeC7+vreRIF5wFBC0MCN5sbHwhNN1JzKbifNeP5 ozpZdQFmkCo+neBiKR6HqIA+LMTMCMMuv2khGGuPHmtDze4GmEGZtYLyF8EQpa5Y jPuV6k2Cr/N3XxFpT3hRpt/3usU/Zb9wfKPtWpoznZ4/44c1p9rzFcZYrWkj3A+7 TNBJE0GmP2fhXhP1D/XVfIW/h0yCJGEiV9Glm/uGOa3DXHlmbAcxSyCRraG+ZBkA 7h4SeM6Y8l/7MBRpPCz6l8Y= -----END CERTIFICATE-----} |
intermediate_cert_fingerprintSHA256 <#2> |
INFO
{
C06E307F7CFC1D32FA72A4C033C87B90019AF216F0775D64978A2ECA6C8A230E} |
intermediate_cert_notBefore <#2> |
INFO
{
2017-11-02 12:23} |
intermediate_cert_notAfter <#2> |
OK
{
2027-11-02 12:23} |
intermediate_cert_expiration <#2> |
OK
{
ok > 40 days} |
intermediate_cert_chain <#2> |
INFO
{
GeoTrust TLS RSA CA G1 <-- DigiCert Global Root G2} |
intermediate_cert_badOCSP |
OK
{
intermediate certificate(s) is/are ok} |
heartbleed
zranitelnosti:
CVE-2014-0160
CWE-119
|
OK
{
not vulnerable, no heartbeat extension} |
CCS
zranitelnosti:
CVE-2014-0224
CWE-310
|
OK
{
not vulnerable} |
ticketbleed
zranitelnosti:
CVE-2016-9244
CWE-200
|
INFO
{
not applicable, not HTTP} |
ROBOT |
OK
{
not vulnerable} |
secure_renego
zranitelnosti:
CWE-310
|
OK
{
supported} |
secure_client_renego
zranitelnosti:
CVE-2011-1473
CWE-310
|
OK
{
not vulnerable} |
CRIME_TLS
zranitelnosti:
CVE-2012-4929
CWE-310
|
OK
{
not vulnerable (not using HTTP anyway)} |
POODLE_SSL
zranitelnosti:
CVE-2014-3566
CWE-310
|
OK
{
not vulnerable, no SSLv3} |
fallback_SCSV |
OK
{
no protocol below TLS 1.2 offered} |
SWEET32 |
OK
{
not vulnerable} |
FREAK
zranitelnosti:
CVE-2015-0204
CWE-310
|
OK
{
not vulnerable} |
DROWN |
OK
{
not vulnerable on this host and port} |
DROWN_hint |
INFO
{
Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://censys.io/ipv4?q=B9B764068A76A7EAA9C07EA8E1F0A5A0D27F48CA6108155923E0EE08FFF5DD0F} |
LOGJAM
zranitelnosti:
CVE-2015-4000
CWE-310
|
OK
{
not vulnerable, no DH EXPORT ciphers,} |
LOGJAM-common_primes
zranitelnosti:
CVE-2015-4000
CWE-310
|
OK
{
--} |
BEAST
zranitelnosti:
CVE-2011-3389
CWE-20
|
OK
{
not vulnerable, no SSL3 or TLS1} |
LUCKY13
zranitelnosti:
CVE-2013-0169
CWE-310
|
LOW
{
potentially vulnerable, uses TLS CBC ciphers} |
winshock
zranitelnosti:
CVE-2014-6321
CWE-94
|
OK
{
not vulnerable} |
RC4 |
OK
{
not vulnerable} |
clientsimulation-android_442 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_500 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_60 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_70 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_90 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_X |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-chrome_74_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-chrome_79_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-firefox_66_win81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-firefox_71_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-ie_6_xp |
INFO
{
No connection} |
clientsimulation-ie_8_win7 |
INFO
{
No connection} |
clientsimulation-ie_8_xp |
INFO
{
No connection} |
clientsimulation-ie_11_win7 |
INFO
{
TLSv1.2 DHE-RSA-AES128-GCM-SHA256} |
clientsimulation-ie_11_win81 |
INFO
{
TLSv1.2 DHE-RSA-AES128-GCM-SHA256} |
clientsimulation-ie_11_winphone81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-SHA256} |
clientsimulation-ie_11_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-edge_15_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-edge_17_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-opera_66_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-safari_9_ios9 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-safari_9_osx1011 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-safari_10_osx1012 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-safari_121_ios_122 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-safari_130_osx_10146 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-apple_ats_9_ios9 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-java_6u45 |
INFO
{
No connection} |
clientsimulation-java_7u25 |
INFO
{
No connection} |
clientsimulation-java_8u161 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-java1102 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-java1201 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-openssl_102e |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-openssl_110l |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-openssl_111d |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-thunderbird_68_3_1 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
rating_spec |
INFO
{
SSL Labs's 'SSL Server Rating Guide' (version 2009q from 2020-01-30)} |
rating_doc |
INFO
{
https://github.com/ssllabs/research/wiki/SSL-Server-Rating-Guide} |
protocol_support_score |
INFO
{
100} |
protocol_support_score_weighted |
INFO
{
30} |
key_exchange_score |
INFO
{
90} |
key_exchange_score_weighted |
INFO
{
27} |
cipher_strength_score |
INFO
{
90} |
cipher_strength_score_weighted |
INFO
{
36} |
final_score |
INFO
{
93} |
overall_grade |
OK
{
A+} |
scanTime |
INFO
{
124} |