hogehoge
hogehoge
Home Projects Qualys Free Trial Contact
You are here: Home > Projects > SSL Server Test > yrm.in
SSL Report: yrm.in (150.95.8.212)
Assessed on: Tue, 06 Aug 2019 04:54:43 UTC | Hide | Clear cache
Summary
Overall Rating
A+
Visit our documentation page for more information, configuration guides, and books. Known issues are documented here.
This site works only in browsers with SNI support.
Experimental: This server supports TLS 1.3 (RFC 8446).
HTTP Strict Transport Security (HSTS) with long duration deployed on this server. MORE INFO »
Certificate #1: RSA 2048 bits (SHA256withRSA)
Server Key and Certificate #1
|
|
Subject |
yrm.in |
Common names |
yrm.in |
Alternative names |
yrm.in |
Serial Number |
04cb4843e69843e521efa7f5c478404907bf |
Valid from |
Mon, 05 Aug 2019 02:05:52 UTC |
Valid until |
Sun, 03 Nov 2019 02:05:52 UTC (expires in 2 months and 27 days) |
Key |
RSA 2048 bits (e 65537) |
Weak key (Debian) |
No |
Issuer |
Let's Encrypt Authority X3 |
Signature algorithm |
SHA256withRSA |
Extended Validation |
No |
Certificate Transparency |
Yes (certificate) |
OCSP Must Staple |
No |
Revocation information |
OCSP |
Revocation status |
Good (not revoked) |
DNS CAA |
No (more info) |
Trusted |
Yes |
Additional Certificates (if supplied)
|
|
Certificates provided |
2 (2526 bytes) |
Chain issues |
None |
#2 |
|
Subject |
Let's Encrypt Authority X3 |
Valid until |
Wed, 17 Mar 2021 16:40:46 UTC (expires in 1 year and 7 months) |
Key |
RSA 2048 bits (e 65537) |
Issuer |
DST Root CA X3 |
Signature algorithm |
SHA256withRSA |
Certification Paths |
Click here to expand
Certificate #2: RSA 2048 bits (SHA256withRSA) No SNI
Click here to expand
Configuration
Protocols |
|
TLS 1.3 |
Yes |
TLS 1.2 |
Yes |
TLS 1.1 |
No |
TLS 1.0 |
No |
SSL 3 |
No |
SSL 2 |
No |
For TLS 1.3 tests, we only support RFC 8446. |
Cipher Suites |
||
# TLS 1.3 (suites in server-preferred order) |
||
TLS_AES_256_GCM_SHA384 (0x1302) ECDH x25519 (eq. 3072 bits RSA) FS |
256 |
|
TLS_CHACHA20_POLY1305_SHA256 (0x1303) ECDH x25519 (eq. 3072 bits RSA) FS |
256 |
|
TLS_AES_128_GCM_SHA256 (0x1301) ECDH x25519 (eq. 3072 bits RSA) FS |
128 |
|
# TLS 1.2 (suites in server-preferred order) |
||
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) ECDH x25519 (eq. 3072 bits RSA) FS |
128 |
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) ECDH x25519 (eq. 3072 bits RSA) FS |
256 |
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027) ECDH x25519 (eq. 3072 bits RSA) FS WEAK |
128 |
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) ECDH x25519 (eq. 3072 bits RSA) FS WEAK |
128 |
|
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028) ECDH x25519 (eq. 3072 bits RSA) FS WEAK |
256 |
|
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) ECDH x25519 (eq. 3072 bits RSA) FS WEAK |
256 |
|
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x9c) WEAK |
128 |
|
TLS_RSA_WITH_AES_256_GCM_SHA384 (0x9d) WEAK |
256 |
|
TLS_RSA_WITH_AES_128_CBC_SHA (0x2f) WEAK |
128 |
|
TLS_RSA_WITH_AES_256_CBC_SHA (0x35) WEAK |
256 |
|
TLS_DHE_RSA_WITH_AES_256_CCM_8 (0xc0a3) DH 2048 bits FS |
256 |
|
TLS_DHE_RSA_WITH_AES_256_CCM (0xc09f) DH 2048 bits FS |
256 |
|
TLS_DHE_RSA_WITH_AES_128_CCM_8 (0xc0a2) DH 2048 bits FS |
128 |
|
TLS_DHE_RSA_WITH_AES_128_CCM (0xc09e) DH 2048 bits FS |
128 |
|
TLS_RSA_WITH_AES_256_CCM_8 (0xc0a1) WEAK |
256 |
|
TLS_RSA_WITH_AES_256_CCM (0xc09d) WEAK |
256 |
|
TLS_RSA_WITH_AES_128_CCM_8 (0xc0a0) WEAK |
128 |
|
TLS_RSA_WITH_AES_128_CCM (0xc09c) WEAK |
128 |
|
TLS_RSA_WITH_AES_256_CBC_SHA256 (0x3d) WEAK |
256 |
|
TLS_RSA_WITH_AES_128_CBC_SHA256 (0x3c) WEAK |
128 |
|
TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (0xc077) ECDH x25519 (eq. 3072 bits RSA) FS WEAK |
256 |
|
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (0xc4) DH 2048 bits FS WEAK |
256 |
|
TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0xc076) ECDH x25519 (eq. 3072 bits RSA) FS WEAK |
128 |
|
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0xbe) DH 2048 bits FS WEAK |
128 |
|
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (0xc0) WEAK |
256 |
|
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0xba) WEAK |
128 |
|
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (0x84) WEAK |
256 |
|
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (0x41) WEAK |
128 |
Handshake Simulation |
|||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > http/1.1 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS |
||
- |
TLS 1.3 |
TLS_AES_256_GCM_SHA384 ECDH x25519 FS |
|
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > http/1.1 |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > http/1.1 |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > http/1.1 |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 > h2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
TLS 1.2 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
||
# Not simulated clients (Protocol mismatch) |
|||
Click here to expand |
|||
(1) Clients that do not support Forward Secrecy (FS) are excluded when determining support for it. |
|||
(2) No support for virtual SSL hosting (SNI). Connects to the default site if the server uses SNI. |
|||
(3) Only first connection attempt simulated. Browsers sometimes retry with a lower protocol version. |
|||
(R) Denotes a reference browser or client, with which we expect better effective security. |
|||
(All) We use defaults, but some platforms do not use their best protocols and features (e.g., Java 6 & 7, older IE). |
|||
(All) Certificate trust is not checked in handshake simulation, we only perform TLS handshake. |
Protocol Details |
||
DROWN |
No, server keys and hostname not seen elsewhere with SSLv2
|
|
Secure Renegotiation |
Supported |
|
Secure Client-Initiated Renegotiation |
No |
|
Insecure Client-Initiated Renegotiation |
No |
|
BEAST attack |
Mitigated server-side (more info) |
|
POODLE (SSLv3) |
No, SSL 3 not supported (more info) |
|
POODLE (TLS) |
No (more info) |
|
Zombie POODLE |
No (more info) TLS 1.2 : 0xc027 |
|
GOLDENDOODLE |
No (more info) TLS 1.2 : 0xc027 |
|
OpenSSL 0-Length |
No (more info) TLS 1.2 : 0xc027 |
|
Sleeping POODLE |
No (more info) TLS 1.2 : 0xc027 |
|
Downgrade attack prevention |
Yes, TLS_FALLBACK_SCSV supported (more info) |
|
SSL/TLS compression |
No |
|
RC4 |
No |
|
Heartbeat (extension) |
No |
|
Heartbleed (vulnerability) |
No (more info) |
|
Ticketbleed (vulnerability) |
No (more info) |
|
OpenSSL CCS vuln. (CVE-2014-0224) |
No (more info) |
|
OpenSSL Padding Oracle vuln. |
No (more info) |
|
ROBOT (vulnerability) |
No (more info) |
|
Forward Secrecy |
Yes (with most browsers) ROBUST (more info) |
|
ALPN |
Yes h2 http/1.1 |
|
NPN |
No |
|
Session resumption (caching) |
Yes |
|
Session resumption (tickets) |
Yes |
|
OCSP stapling |
No |
|
Strict Transport Security (HSTS) |
Yes |
|
HSTS Preloading |
Not in: Chrome Edge Firefox IE |
|
Public Key Pinning (HPKP) |
No (more info) |
|
Public Key Pinning Report-Only |
No |
|
Public Key Pinning (Static) |
No (more info) |
|
Long handshake intolerance |
No |
|
TLS extension intolerance |
No |
|
TLS version intolerance |
No |
|
Incorrect SNI alerts |
No |
|
Uses common DH primes |
No |
|
DH public server param (Ys) reuse |
No |
|
ECDH public server param reuse |
No |
|
Supported Named Groups |
x25519, secp256r1, x448, secp521r1, secp384r1 (server preferred order) |
|
SSL 2 handshake compatibility |
Yes |
|
0-RTT enabled |
No |
HTTP Requests |
1 https://yrm.in/ (HTTP/1.1 200 OK) |
Miscellaneous |
|
Test date |
Tue, 06 Aug 2019 04:52:46 UTC |
Test duration |
117.380 seconds |
HTTP status code |
200 |
HTTP server signature |
Apache |
Server hostname |
s140.xrea.com |
SSL Report v1.35.1
コピペここまで。
Hosting:
当サイトでは、第三者配信の広告サービス(Googleアドセンス)を利用しています。
このような広告配信事業者は、ユーザーの興味に応じた商品やサービスの広告を表示するため、当サイトや他サイトへのアクセスに関する情報 『Cookie』(氏名、住所、メール アドレス、電話番号は含まれません) を使用することがあります。
またGoogleアドセンスに関して、このプロセスの詳細やこのような情報が広告配信事業者に使用されないようにする方法については、こちらをクリックしてください。
当サイトでは、Googleによるアクセス解析ツール「Googleアナリティクス」を利用しています。
このGoogleアナリティクスはトラフィックデータの収集のためにCookieを使用しています。
このトラフィックデータは匿名で収集されており、個人を特定するものではありません。
この機能はCookieを無効にすることで収集を拒否することが出来ますので、お使いのブラウザの設定をご確認ください。
この規約に関して、詳しくはこちら、またはこちらをクリックしてください。
当サイトでは、スパム・荒らしへの対応として、コメントの際に使用されたIPアドレスを記録しています。
これはブログの標準機能としてサポートされている機能で、スパム・荒らしへの対応以外にこのIPアドレスを使用することはありません。
また、メールアドレスとURLの入力に関しては、任意となっております。
全てのコメントは管理人であるhogehogeが事前にその内容を確認し、承認した上での掲載となりますことをあらかじめご了承下さい。
加えて、次の各号に掲げる内容を含むコメントは管理人の裁量によって承認せず、削除する事があります。
· 特定の自然人または法人を誹謗し、中傷するもの。
· 極度にわいせつな内容を含むもの。
· 禁制品の取引に関するものや、他者を害する行為の依頼など、法律によって禁止されている物品、行為の依頼や斡旋などに関するもの。
· その他、公序良俗に反し、または管理人によって承認すべきでないと認められるもの。