Gourmet
Advanced Member | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору Partial Test Failure Failed, probably due to firewall restrictions We couldn't detect any secure protocols. Many of our tests run on non-standard protocols; it's possible that you are in an environment that limits outbound connections, thus breaking our tests. If possible, try this test in a different environment. CVE-2020-0601 (CurveBall) Vulnerability Your user agent is not vulnerable. For more information about the CVE-2020-0601 (CurveBall) Vulnerability, please go to CVE-2020-0601. To test manually, click here. Your user agent is not vulnerable if it fails to connect to the site. Logjam Vulnerability Your user agent is not vulnerable. For more information about the Logjam attack, please go to weakdh.org. To test manually, click here. Your user agent is not vulnerable if it fails to connect to the site. FREAK Vulnerability Your user agent is not vulnerable. For more information about the FREAK attack, please go to www.freakattack.com. To test manually, click here. Your user agent is not vulnerable if it fails to connect to the site. POODLE Vulnerability Your user agent is not vulnerable. For more information about the POODLE attack, please read this blog post. Protocol Features Protocols TLS 1.3 Yes TLS 1.2 Yes TLS 1.1 Yes TLS 1.0 Yes SSL 3 Firewall SSL 2 Firewall Cipher Suites (in order of preference) TLS_AES_128_GCM_SHA256 (0x1301) Forward Secrecy 128 TLS_AES_256_GCM_SHA384 (0x1302) Forward Secrecy 256 TLS_CHACHA20_POLY1305_SHA256 (0x1303) Forward Secrecy 256 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b) Forward Secrecy 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) Forward Secrecy 128 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c) Forward Secrecy 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) Forward Secrecy 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca9) Forward Secrecy 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca8) Forward Secrecy 256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) WEAK 128 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) WEAK 256 TLS_RSA_WITH_AES_128_GCM_SHA256 (0x9c) WEAK 128 TLS_RSA_WITH_AES_256_GCM_SHA384 (0x9d) WEAK 256 TLS_RSA_WITH_AES_128_CBC_SHA (0x2f) WEAK 128 TLS_RSA_WITH_AES_256_CBC_SHA (0x35) WEAK 256 TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa) WEAK 112 (1) When a browser supports SSL 2, its SSL 2-only suites are shown only on the very first connection to this site. To see the suites, close all browser windows, then open this exact page directly. Don't refresh. Protocol Details Server Name Indication (SNI) Yes Secure Renegotiation Yes TLS compression No Session tickets Yes OCSP stapling Yes Signature algorithms SHA256/ECDSA, RSA_PSS_SHA256, SHA256/RSA, SHA384/ECDSA, RSA_PSS_SHA384, SHA384/RSA, RSA_PSS_SHA512, SHA512/RSA, SHA1/RSA, Unknown (0x10)/Unknown (0x10) Named Groups x25519, secp256r1, secp384r1, ffdhe3072 Next Protocol Negotiation No Application Layer Protocol Negotiation Yes h2 http/1.1 SSL 2 handshake compatibility No Mixed Content Handling Mixed Content Tests Images Passive Yes CSS Active No Scripts Active No XMLHttpRequest Active No WebSockets Active No Frames Active No (1) These tests might cause a mixed content warning in your browser. That's expected. (2) If you see a failed test, try to reload the page. If the error persists, please get in touch. Related Functionality Upgrade Insecure Requests request header (more info) Yes | Всего записей: 1782 | Зарегистр. 26-06-2003 | Отправлено: 12:16 08-03-2021 | Исправлено: Gourmet, 12:31 08-03-2021 |
|