Státní ústav pro kontrolu léčiv Aplikace pro přístup k elektronickým receptům - pro pacienty
Všechno je v nejlepším pořádku a web se drží doporučených postupů.
Detailní report z HTTPs analýzy pomocí nástroje testssl.sh
server | pacient.erecept.sukl.cz/46.30.92.21 |
pre_128cipher |
INFO
{
No 128 cipher limit bug} |
SSLv2 |
OK
{
not offered} |
SSLv3 |
OK
{
not offered} |
TLS1 |
INFO
{
not offered} |
TLS1_1 |
INFO
{
not offered} |
TLS1_2 |
OK
{
offered} |
TLS1_3 |
OK
{
offered with final} |
NPN |
INFO
{
not offered} |
ALPN |
INFO
{
not offered} |
cipherlist_NULL
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_aNULL
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_EXPORT
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_LOW
zranitelnosti:
CWE-327
|
OK
{
not offered} |
cipherlist_3DES_IDEA
zranitelnosti:
CWE-310
|
INFO
{
not offered} |
cipherlist_AVERAGE
zranitelnosti:
CWE-310
|
LOW
{
offered} |
cipherlist_GOOD |
OK
{
offered} |
cipherlist_STRONG |
OK
{
offered} |
cipher_order |
OK
{
server} |
protocol_negotiated |
OK
{
Default protocol TLS1.3} |
cipher_negotiated |
OK
{
TLS_AES_128_GCM_SHA256, 256 bit ECDH (P-256)} |
cipher-tls1_2_xc02f |
OK
{
TLSv1.2 xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256} |
cipher-tls1_2_xc013 |
LOW
{
TLSv1.2 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA} |
cipher-tls1_2_xc027 |
LOW
{
TLSv1.2 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256} |
cipher-tls1_2_xc030 |
OK
{
TLSv1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384} |
cipher-tls1_2_xc014 |
LOW
{
TLSv1.2 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA} |
cipher-tls1_2_xc028 |
LOW
{
TLSv1.2 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384} |
cipher-tls1_2_xcca8 |
OK
{
TLSv1.2 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256} |
cipher-tls1_2_x9c |
OK
{
TLSv1.2 x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256} |
cipher-tls1_2_x2f |
LOW
{
TLSv1.2 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA} |
cipher-tls1_2_x3c |
LOW
{
TLSv1.2 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256} |
cipher-tls1_2_x9d |
OK
{
TLSv1.2 x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384} |
cipher-tls1_2_x35 |
LOW
{
TLSv1.2 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA} |
cipher-tls1_2_x3d |
LOW
{
TLSv1.2 x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256} |
cipher-tls1_2_x41 |
LOW
{
TLSv1.2 x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA} |
cipher-tls1_2_x84 |
LOW
{
TLSv1.2 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA} |
cipherorder_TLSv1_2 |
INFO
{
ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES256-SHA384 ECDHE-RSA-CHACHA20-POLY1305 AES128-GCM-SHA256 AES128-SHA AES128-SHA256 AES256-GCM-SHA384 AES256-SHA AES256-SHA256 CAMELLIA128-SHA CAMELLIA256-SHA} |
prioritize_chacha_TLSv1_2 |
INFO
{
false} |
cipher-tls1_3_x1301 |
OK
{
TLSv1.3 x1301 TLS_AES_128_GCM_SHA256 ECDH 256 AESGCM 128 TLS_AES_128_GCM_SHA256} |
cipher-tls1_3_x1302 |
OK
{
TLSv1.3 x1302 TLS_AES_256_GCM_SHA384 ECDH 256 AESGCM 256 TLS_AES_256_GCM_SHA384} |
cipher-tls1_3_x1303 |
OK
{
TLSv1.3 x1303 TLS_CHACHA20_POLY1305_SHA256 ECDH 256 ChaCha20 256 TLS_CHACHA20_POLY1305_SHA256} |
cipherorder_TLSv1_3 |
INFO
{
TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256} |
prioritize_chacha_TLSv1_3 |
INFO
{
false} |
FS |
OK
{
offered} |
FS_ciphers |
INFO
{
TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-CHACHA20-POLY1305 TLS_AES_128_GCM_SHA256 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA} |
FS_ECDHE_curves |
OK
{
prime256v1 secp384r1 X25519} |
TLS_extensions |
INFO
{
'renegotiation info/#65281' 'EC point formats/#11' 'key share/#51' 'supported versions/#43' 'extended master secret/#23'} |
TLS_session_ticket |
INFO
{
no -- no lifetime advertised} |
SSL_sessionID_support |
INFO
{
yes} |
sessionresumption_ticket |
INFO
{
not supported} |
sessionresumption_ID |
INFO
{
supported} |
TLS_timestamp |
INFO
{
random} |
certificate_compression |
INFO
{
none} |
clientAuth |
INFO
{
none} |
cert_numbers |
INFO
{
1} |
cert_signatureAlgorithm |
OK
{
SHA256 with RSA} |
cert_keySize |
INFO
{
RSA 2048 bits (exponent is 65537)} |
cert_keyUsage |
INFO
{
Digital Signature, Key Encipherment} |
cert_extKeyUsage |
INFO
{
TLS Web Server Authentication, TLS Web Client Authentication} |
cert_serialNumber |
INFO
{
090CBFFE82377EFCD1E7C91388B6A1C9} |
cert_serialNumberLen |
INFO
{
16} |
cert_fingerprintSHA1 |
INFO
{
C63A3A2870F82C50F5E98D5CDDB55CE6759E30F9} |
cert_fingerprintSHA256 |
INFO
{
F445250967792EF591D4E3BBAEF25B5958D37E22BBB2581055EC84FEF73EEC79} |
cert |
INFO
{
-----BEGIN CERTIFICATE----- MIIHnTCCBYWgAwIBAgIQCQy//oI3fvzR58kTiLahyTANBgkqhkiG9w0BAQsFADBc MQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xNDAyBgNVBAMT K1JhcGlkU1NMIEdsb2JhbCBUTFMgUlNBNDA5NiBTSEEyNTYgMjAyMiBDQTEwHhcN MjMwNzEzMDAwMDAwWhcNMjQwNzE2MjM1OTU5WjAcMRowGAYDVQQDDBEqLmVyZWNl cHQuc3VrbC5jejCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOE7UgYc BjLFosXvx9IcYzGbzo6mogmvJyel7N4vPXiVdqFYKndADqr7pXh7YyvXSDYhKBZj 1RSog2qNCRE8Sb2u0bB82XC162nP+TBQmGmo/C4R6ub9+A+ZX+lQczdng6Gus8Qg ZO1Ac7Z1nIQ/UtIK4MAbt/L+/CmBfTbcH1tOTtRPliswzY8JFNmwbmxym9TtcKcu oy8BqV7/OMAtQVrtGuiGtYQsiNCUw83JOOD7PyuuBnGaY8emlw4gaLCqTKzKvrA1 JgyxRepD9Ra84BsQxIXhrSBpmjISUVovWOEx50ncmXoNBz3+UTTvdVso1wvSUsz/ J0z3ry7J6AuHdqkCAwEAAaOCA5kwggOVMB8GA1UdIwQYMBaAFPCchf2in32PyWi7 1dSJTR2+05D/MB0GA1UdDgQWBBRVERfFK9UdOPhFfuPZ5HppO4Rt+TAtBgNVHREE JjAkghEqLmVyZWNlcHQuc3VrbC5jeoIPZXJlY2VwdC5zdWtsLmN6MA4GA1UdDwEB /wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwgZ8GA1UdHwSB lzCBlDBIoEagRIZCaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL1JhcGlkU1NMR2xv YmFsVExTUlNBNDA5NlNIQTI1NjIwMjJDQTEuY3JsMEigRqBEhkJodHRwOi8vY3Js NC5kaWdpY2VydC5jb20vUmFwaWRTU0xHbG9iYWxUTFNSU0E0MDk2U0hBMjU2MjAy MkNBMS5jcmwwPgYDVR0gBDcwNTAzBgZngQwBAgEwKTAnBggrBgEFBQcCARYbaHR0 cDovL3d3dy5kaWdpY2VydC5jb20vQ1BTMIGHBggrBgEFBQcBAQR7MHkwJAYIKwYB BQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBRBggrBgEFBQcwAoZFaHR0 cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL1JhcGlkU1NMR2xvYmFsVExTUlNBNDA5 NlNIQTI1NjIwMjJDQTEuY3J0MAkGA1UdEwQCMAAwggF8BgorBgEEAdZ5AgQCBIIB bASCAWgBZgB1AO7N0GTV2xrOxVy3nbTNE6Iyh0Z8vOzew1FIWUZxH7WbAAABiU5J APQAAAQDAEYwRAIgHiqfR8C3BqWoPLfX6IgPdr6/W7JPBNx6z3SoxeDuo5kCICeB uPL7QpaufimXQRMetRSOEP/kHlxEvxg0hB1kkLh6AHYA2ra/az+1tiKfm8K7XGvo cJFxbLtRhIU0vaQ9MEjX+6sAAAGJTkkBLgAABAMARzBFAiBoNWZO50/Pw5bgVo1r uJdNJeH0xTOwCdYJrGqj29NH3gIhALybFJi/OPfjPNOUrvxL6C7+/nQanVJxT8gD aMcNF/8uAHUAO1N3dT4tuYBOizBbBv5AO2fYT8P0x70ADS1yb+H61BcAAAGJTkkB QgAABAMARjBEAiAvfWQslrupZVihPrV7ReDYwLl7rdjfWMo011s63xNJ3QIgHbVt vgkPIWggJ4+tW1PPGeFKd9bkEZry4gYoG2WkXoYwDQYJKoZIhvcNAQELBQADggIB AEfbvdKy3oGnyHegclAjfFINaQiCaCZc0YDTrDxVUhhNX35QdYOiKUBXZFIVqOZG GCLjC4PkgQy8b+aJQplSsWOnfTNyayXzrooCtXh3XySbIUGsHGYx4O4F0uHAQ+mZ jTQ7JWldLNc5v5pjrxFdivFUySzbonDjg4ewxpVlCdcYTuwuDcjgXr6mSXNFWFLx bHET3ZJ43FHA+ek0S2dM8sw9q+hrOSS0C+RhmH8j23yPcKFqh0O3MJEESjjKwJr0 asmKCtl7xpVj219B78h/Wf2EYOlNaHCr3g20grhUnwiU3xzrXjhj3ujpdqOqYK4r ilHptWyPiwSjg5ucJpGP9xH8u6lGVlPsxBO5zwOA0y77anhlrXwYx53VkozW0iku 9JrjtS08vHvWrAF2TGryjhuCe6zywHV4XTgXV2zJ3mAcdq/PI0iQYBSHbrzCXFSr 0uVVxKRO1hdTJoyl2uZfBSieFabwLZ6Ufty3zXgQl8N7My6mNj79JRRG28HKo98F hF1J0zB/z+eIVxIuGKv6T2qXR2kyzISMCTFBLG9R0mjsjBGebI2gKSfNYjrnofGt +xfvKuqqYUUKdRUlTi6FIs7GijjSGbsHT08g0cshcypketW2QhQyRcByFKKgBmCu ktwRSAqeLwgVm++x5dHtsuGN9frFWqkflNmaT1G7N8uQ -----END CERTIFICATE-----} |
cert_commonName |
OK
{
*.erecept.sukl.cz} |
cert_commonName_wo_SNI |
INFO
{
*.erecept.sukl.cz} |
cert_subjectAltName |
INFO
{
*.erecept.sukl.cz erecept.sukl.cz} |
cert_trust |
OK
{
Ok via SAN wildcard and CN wildcard (same w/o SNI)} |
cert_chain_of_trust |
OK
{
passed.} |
cert_certificatePolicies_EV |
INFO
{
no} |
cert_expirationStatus |
OK
{
72 >= 60 days} |
cert_notBefore |
INFO
{
2023-07-13 00:00} |
cert_notAfter |
OK
{
2024-07-16 23:59} |
cert_extlifeSpan |
OK
{
certificate has no extended life time according to browser forum} |
cert_eTLS |
INFO
{
not present} |
cert_crlDistributionPoints |
INFO
{
http://crl3.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crl http://crl4.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crl} |
cert_ocspURL |
INFO
{
http://ocsp.digicert.com} |
OCSP_stapling |
LOW
{
not offered} |
cert_mustStapleExtension |
INFO
{
--} |
DNS_CAArecord |
OK
{
issue=geotrust.com, issue=rapidssl.com} |
certificate_transparency |
OK
{
yes (certificate extension)} |
certs_countServer |
INFO
{
2} |
certs_list_ordering_problem |
INFO
{
no} |
cert_caIssuers |
INFO
{
RapidSSL Global TLS RSA4096 SHA256 2022 CA1 (DigiCert, Inc. from US)} |
intermediate_cert <#1> |
INFO
{
-----BEGIN CERTIFICATE----- MIIFyzCCBLOgAwIBAgIQCgWbJfVLPYeUzGYxR3U4ozANBgkqhkiG9w0BAQsFADBh MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBD QTAeFw0yMjA1MDQwMDAwMDBaFw0zMTExMDkyMzU5NTlaMFwxCzAJBgNVBAYTAlVT MRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE0MDIGA1UEAxMrUmFwaWRTU0wgR2xv YmFsIFRMUyBSU0E0MDk2IFNIQTI1NiAyMDIyIENBMTCCAiIwDQYJKoZIhvcNAQEB BQADggIPADCCAgoCggIBAKY5PJhwCX2UyBb1nelu9APen53D5+C40T+BOZfSFaB0 v0WJM3BGMsuiHZX2IHtwnjUhLL25d8tgLASaUNHCBNKKUlUGRXGztuDIeXb48d64 k7Gk7u7mMRSrj+yuLSWOKnK6OGKe9+s6oaVIjHXY+QX8p2I2S3uew0bW3BFpkeAr LBCU25iqeaoLEOGIa09DVojd3qc/RKqr4P11173R+7Ub05YYhuIcSv8e0d7qN1sO 1+lfoNMVfV9WcqPABmOasNJ+ol0hAC2PTgRLy/VZo1L0HRMr6j8cbR7q0nKwdbn4 Ar+ZMgCgCcG9zCMFsuXYl/rqobiyV+8U37dDScAebZTIF/xPEvHcmGi3xxH6g+dT CjetOjJx8sdXUHKXGXC9ka33q7EzQIYlZISF7EkbT5dZHsO2DOMVLBdP1N1oUp0/ 1f6fc8uTDduELoKBRzTTZ6OOBVHeZyFZMMdi6tA5s/jxmb74lqH1+jQ6nTU2/Mma hGNxUuJpyhUHezgBA6sto5lNeyqc+3Cr5ehFQzUuwNsJaWbDdQk1v7lqRaqOlYjn iomOl36J5txTs0wL7etCeMRfyPsmc+8HmH77IYVMUOcPJb+0gNuSmAkvf5QXbgPI Zursn/UYnP9obhNbHc/9LYdQkB7CXyX9mPexnDNO7pggNA2jpbEarLmZGi4grMmf AgMBAAGjggGCMIIBfjASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTwnIX9 op99j8lou9XUiU0dvtOQ/zAfBgNVHSMEGDAWgBQD3lA1VtFMu2bwo+IbG8OXsj3R VTAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC MHYGCCsGAQUFBwEBBGowaDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNl cnQuY29tMEAGCCsGAQUFBzAChjRodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20v RGlnaUNlcnRHbG9iYWxSb290Q0EuY3J0MEIGA1UdHwQ7MDkwN6A1oDOGMWh0dHA6 Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEdsb2JhbFJvb3RDQS5jcmwwPQYD VR0gBDYwNDALBglghkgBhv1sAgEwBwYFZ4EMAQEwCAYGZ4EMAQIBMAgGBmeBDAEC AjAIBgZngQwBAgMwDQYJKoZIhvcNAQELBQADggEBAAfjh/s1f5dDdfm0sNm74/dW MbbsxfYV1LoTpFt+3MSUWvSbiPQfUkoV57b5rutRJvnPP9mSlpFwcZ3e1nSUbi2o ITGA7RCOj23I1F4zk0YJm42qAwJIqOVenR3XtyQ2VR82qhC6xslxtNf7f2Ndx2G7 Mem4wpFhyPDT2P6UJ2MnrD+FC//ZKH5/ERo96ghz8VqNlmL5RXo8Ks9rMr/Ad9xw Y4hyRvAz5920myUffwdUqc0SvPlFnahsZg15uT5HkK48tHR0TLuLH8aRpzh4KJ/Y p0sARNb+9i1R4Fg5zPNvHs2BbIve0vkwxAy+R4727qYzl3027w9jEFC6HMXRaDc= -----END CERTIFICATE-----} |
intermediate_cert_fingerprintSHA256 <#1> |
INFO
{
92A5F515AD35D3A27C490EDB135DE7044B1E399D608AC1ABE883FC82FB4B16BE} |
intermediate_cert_notBefore <#1> |
INFO
{
2022-05-04 00:00} |
intermediate_cert_notAfter <#1> |
OK
{
2031-11-09 23:59} |
intermediate_cert_expiration <#1> |
OK
{
ok > 40 days} |
intermediate_cert_chain <#1> |
INFO
{
RapidSSL Global TLS RSA4096 SHA256 2022 CA1 <-- DigiCert Global Root CA} |
intermediate_cert_badOCSP |
OK
{
intermediate certificate(s) is/are ok} |
HTTP_status_code |
INFO
{
302 Found ('/')} |
HTTP_clock_skew |
INFO
{
0 seconds from localtime} |
HTTP_headerTime |
INFO
{
1714940523} |
HSTS_time |
OK
{
186 days (=16070400 seconds) > 15552000 seconds} |
HSTS_subdomains |
OK
{
includes subdomains} |
HSTS_preload |
INFO
{
domain is NOT marked for preloading} |
HPKP |
INFO
{
No support for HTTP Public Key Pinning} |
banner_server |
INFO
{
No Server banner line in header, interesting!} |
banner_application |
INFO
{
No application banner found} |
cookie_count |
INFO
{
3 at '/' (30x detected, better try target URL of 30x)} |
cookie_secure |
INFO
{
2/3 at '/' marked as secure} |
cookie_httponly |
INFO
{
2/3 at '/' marked as HttpOnly (30x detected, better try target URL of 30x)} |
cookie_bigip_f5
zranitelnosti:
CWE-212
|
MEDIUM
{
Information leakage: F5 cookie BIGipServerpool-pacient 201393674.20480.0000 is default IPv4 pool member 10.6.1.12:80} |
X-Frame-Options |
OK
{
DENY} |
X-Content-Type-Options |
OK
{
nosniff} |
X-XSS-Protection |
INFO
{
1; mode=block} |
X-UA-Compatible |
INFO
{
IE=11;IE=Edge,chrome=1} |
Cache-Control |
INFO
{
private} |
banner_reverseproxy
zranitelnosti:
CWE-200
|
INFO
{
--} |
heartbleed
zranitelnosti:
CVE-2014-0160
CWE-119
|
OK
{
not vulnerable, no heartbeat extension} |
CCS
zranitelnosti:
CVE-2014-0224
CWE-310
|
OK
{
not vulnerable} |
ticketbleed
zranitelnosti:
CVE-2016-9244
CWE-200
|
OK
{
no session ticket extension} |
ROBOT |
OK
{
not vulnerable} |
secure_renego
zranitelnosti:
CWE-310
|
OK
{
supported} |
secure_client_renego
zranitelnosti:
CVE-2011-1473
CWE-310
|
OK
{
not vulnerable, mitigated} |
CRIME_TLS
zranitelnosti:
CVE-2012-4929
CWE-310
|
OK
{
not vulnerable} |
BREACH
zranitelnosti:
CVE-2013-3587
CWE-310
|
OK
{
not vulnerable, no gzip/deflate/compress/br HTTP compression - only supplied '/' tested} |
POODLE_SSL
zranitelnosti:
CVE-2014-3566
CWE-310
|
OK
{
not vulnerable, no SSLv3} |
fallback_SCSV |
OK
{
no protocol below TLS 1.2 offered} |
SWEET32 |
OK
{
not vulnerable} |
FREAK
zranitelnosti:
CVE-2015-0204
CWE-310
|
OK
{
not vulnerable} |
DROWN |
OK
{
not vulnerable on this host and port} |
DROWN_hint |
INFO
{
Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://censys.io/ipv4?q=F445250967792EF591D4E3BBAEF25B5958D37E22BBB2581055EC84FEF73EEC79} |
LOGJAM
zranitelnosti:
CVE-2015-4000
CWE-310
|
OK
{
not vulnerable, no DH EXPORT ciphers,} |
LOGJAM-common_primes
zranitelnosti:
CVE-2015-4000
CWE-310
|
OK
{
no DH key with <= TLS 1.2} |
BEAST
zranitelnosti:
CVE-2011-3389
CWE-20
|
OK
{
not vulnerable, no SSL3 or TLS1} |
LUCKY13
zranitelnosti:
CVE-2013-0169
CWE-310
|
LOW
{
potentially vulnerable, uses TLS CBC ciphers} |
winshock
zranitelnosti:
CVE-2014-6321
CWE-94
|
OK
{
not vulnerable} |
RC4 |
OK
{
not vulnerable} |
clientsimulation-android_442 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_500 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_60 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_70 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-android_90 |
INFO
{
TLSv1.3 TLS_AES_128_GCM_SHA256} |
clientsimulation-android_X |
INFO
{
TLSv1.3 TLS_AES_128_GCM_SHA256} |
clientsimulation-chrome_74_win10 |
INFO
{
TLSv1.3 TLS_AES_128_GCM_SHA256} |
clientsimulation-chrome_79_win10 |
INFO
{
TLSv1.3 TLS_AES_128_GCM_SHA256} |
clientsimulation-firefox_66_win81 |
INFO
{
TLSv1.3 TLS_AES_128_GCM_SHA256} |
clientsimulation-firefox_71_win10 |
INFO
{
TLSv1.3 TLS_AES_128_GCM_SHA256} |
clientsimulation-ie_6_xp |
INFO
{
No connection} |
clientsimulation-ie_8_win7 |
INFO
{
No connection} |
clientsimulation-ie_8_xp |
INFO
{
No connection} |
clientsimulation-ie_11_win7 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-SHA} |
clientsimulation-ie_11_win81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-SHA} |
clientsimulation-ie_11_winphone81 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-SHA} |
clientsimulation-ie_11_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-edge_15_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-edge_17_win10 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-opera_66_win10 |
INFO
{
TLSv1.3 TLS_AES_128_GCM_SHA256} |
clientsimulation-safari_9_ios9 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-safari_9_osx1011 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-safari_10_osx1012 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-safari_121_ios_122 |
INFO
{
TLSv1.3 TLS_AES_128_GCM_SHA256} |
clientsimulation-safari_130_osx_10146 |
INFO
{
TLSv1.3 TLS_AES_128_GCM_SHA256} |
clientsimulation-apple_ats_9_ios9 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-java_6u45 |
INFO
{
No connection} |
clientsimulation-java_7u25 |
INFO
{
No connection} |
clientsimulation-java_8u161 |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-java1102 |
INFO
{
TLSv1.3 TLS_AES_128_GCM_SHA256} |
clientsimulation-java1201 |
INFO
{
TLSv1.3 TLS_AES_128_GCM_SHA256} |
clientsimulation-openssl_102e |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-openssl_110l |
INFO
{
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256} |
clientsimulation-openssl_111d |
INFO
{
TLSv1.3 TLS_AES_128_GCM_SHA256} |
clientsimulation-thunderbird_68_3_1 |
INFO
{
TLSv1.3 TLS_AES_128_GCM_SHA256} |
rating_spec |
INFO
{
SSL Labs's 'SSL Server Rating Guide' (version 2009q from 2020-01-30)} |
rating_doc |
INFO
{
https://github.com/ssllabs/research/wiki/SSL-Server-Rating-Guide} |
protocol_support_score |
INFO
{
100} |
protocol_support_score_weighted |
INFO
{
30} |
key_exchange_score |
INFO
{
90} |
key_exchange_score_weighted |
INFO
{
27} |
cipher_strength_score |
INFO
{
90} |
cipher_strength_score_weighted |
INFO
{
36} |
final_score |
INFO
{
93} |
overall_grade |
OK
{
A+} |
scanTime |
INFO
{
115} |