gofbf.site
Score 90/100
Web site information
SEO data
title
Корисні поради на кожен день
Protocols
SSLv2
not offered
SSLv3
not offered
TLS 1.0
not offered
TLS 1.1
not offered
TLS 1.2
offered
TLS 1.3
offered with final
ALPN
http/1.1
Vulnerabilities
heartbleed
not vulnerable, no heartbeat extension
CCS
not vulnerable
ticketbleed
no session ticket extension
ROBOT
not vulnerable, no RSA key transport cipher
SSL renegotiation
supported
SSL client renegotiation
not vulnerable
CRIME TLS
not vulnerable
BREACH
potentially VULNERABLE, gzip HTTP compression detected - only supplied '/' tested
POODLE SSL
not vulnerable, no SSLv3
fallback SCSV
no protocol below TLS 1.2 offered
SWEET32
not vulnerable
FREAK
not vulnerable
DROWN
not vulnerable on this host and port
DROWN hint
no RSA certificate, can't be used with SSLv2 elsewhere
LOGJAM
not vulnerable, no DH EXPORT ciphers,
LOGJAM-common primes
no DH key with <= TLS 1.2
BEAST
not vulnerable, no SSL3 or TLS1
LUCKY13
not vulnerable
RC4
not vulnerable
Header Responses
Status code
200 OK ('/')
Clock skew
0 seconds from localtime
HSTS
not offered
HPKP
No support for HTTP Public Key Pinning
security headers
--
Server Defaults
TLS extensions
'renegotiation info/#65281' 'server name/#0' 'EC point formats/#11' 'next protocol/#13172' 'supported versions/#43' 'key share/#51' 'supported_groups/#10' 'max fragment length/#1' 'application layer protocol negotiation/#16' 'extended master secret/#23'
TLS session ticket
no -- no lifetime advertised
SSL sessionID support
yes
Session Ticket Resumption
not supported
Session ID Resumption
supported
cert numbers
1
Signature algorithm
ECDSA with SHA384
Key size
EC 256 bits
Key usage
Digital Signature
Extended key usage
TLS Web Server Authentication, TLS Web Client Authentication
Serial number
04F4BB59AC9627C13314087C8951DCE9C5A3
cert serialNumberLen
18
Fingerprint SHA1
6F0FC4901B6D43CF3FB694FA5C72C6047B7B1296
Fingerprint SHA256
3860F8D4EF19CEF6FDE13ED556D71719C60D8F03AF517F007479014A1355748F
Certificate details
-----BEGIN CERTIFICATE----- MIIDdTCCAvygAwIBAgISBPS7WayWJ8EzFAh8iVHc6cWjMAoGCCqGSM49BAMDMDIx CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF NTAeFw0yNDExMDIwNzQ4MzFaFw0yNTAxMzEwNzQ4MzBaMBUxEzARBgNVBAMTCmdv ZmJmLnNpdGUwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQ1mvJMXz2rIvaILM+I q3h19gQWCqS65rWk5VpR4IT4boYjzFTateIpE4ta4h1LkXghJgBdTVfkHae+yQa3 d0Ozo4ICDTCCAgkwDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQGCCsGAQUFBwMB BggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQUn3qYVu5EPFvjEpbn 2HpQTf2xaDAfBgNVHSMEGDAWgBSfK1/PPCFPnQS37SssxMZwi9LXDTBVBggrBgEF BQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNS5vLmxlbmNyLm9yZzAiBggr BgEFBQcwAoYWaHR0cDovL2U1LmkubGVuY3Iub3JnLzAVBgNVHREEDjAMggpnb2Zi Zi5zaXRlMBMGA1UdIAQMMAowCAYGZ4EMAQIBMIIBBQYKKwYBBAHWeQIEAgSB9gSB 8wDxAHcAE0rfGrWYQgl4DG/vTHqRpBa3I0nOWFdq367ap8Kr4CIAAAGS7A5wOQAA BAMASDBGAiEAix3v5E1Q/KpJi7+Gid9krSZgqooOHLf3yJhpKQ7Aa+cCIQDhY/Ix nnezThGTTpEwdbwHcVcQxVHRL3mDYUwGkOU2UAB2AM8RVu7VLnyv84db2Wkum+ka cWdKsBfsrAHSW3fOzDsIAAABkuwOd30AAAQDAEcwRQIgB+IZGbeDdyC8FuURPW3G aGBcaauKXogX36Hzi8cmCV8CIQCxtU3fCIjbEiA/hpvg/ZfJk5Ev+uJmizcQ9QHS KlM+8TAKBggqhkjOPQQDAwNnADBkAjAPmmEHpKJ9GyitQoYwbGP/AqPG7kh/RpOk TVrsnBOTXVeEibL/bOFtbMFeXVxy3tkCMArbdeU53SoSFY+0nYrHY0BUH7jhEQho DnE2kcivYGzK5VErEmmk/LcXEe4GUlbyJg== -----END CERTIFICATE-----
Common names
gofbf.site
Service Name Indication
barneus.site
SubjectAlternative Name
gofbf.site
Certificate authority issuers
E5 (Let's Encrypt from US)
Certificate trusted
Ok via SAN (SNI mandatory)
Certificate chain trusted
passed.
Is certificate Extended Validation
no
cert eTLS
not present
cert expirationStatus
72 >= 30 days
Valid from
2024-11-02 07:48
Valid until
2025-01-31 07:48
cert validityPeriod
No finding
Chain
2
certs list ordering problem
no
cert crlDistributionPoints
--
Online Certificate Status Protocol URL
http://e5.o.lencr.org
OCSP stapling
not offered
cert mustStapleExtension
--
DNS CAArecord
--
certificate transparency
yes (certificate extension)
Server Preferences
order
NOT a cipher order configured
Which protocol negotiated
Default protocol TLS1.3
negotiated
TLS_AES_256_GCM_SHA384, 253 bit ECDH (X25519) (limited sense as client will pick)
order
at (limited sense as client will pick)
order
at (limited sense as client will pick)
order
at (limited sense as client will pick)
order
at (limited sense as client will pick)
order TLSv1.2
ECDHE-ECDSA-AES256-GCM-SHA384 at TLSv1.2 (limited sense as client will pick)
order TLSv1.3
TLS_AES_128_GCM_SHA256 at TLSv1.3 (limited sense as client will pick)
Perfect Forward Secrecy
PFS
offered
PFS s
ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384
PFS ECDHE curves
prime256v1
Ciphers
ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 521 AESGCM 256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
(0xc02c)
ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 521 AESGCM 128 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
(0xc02b)
Browser Simulations
Android 4.4.2
TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384
Android 5.0.0
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 6.0
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 7.0
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
clientsimulation-android 81
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
clientsimulation-android 90
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-android X
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-chrome 74 win10
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-chrome 79 win10
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-firefox 66 win81
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-firefox 71 win10
TLSv1.3 TLS_AES_128_GCM_SHA256
Windows XP Internet Explorer 6
No connection
Windows 7 Internet Explorer 8
No connection
Windows XP Internet Explorer 8
No connection
Windows 7 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384
Windows 8.1 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384
clientsimulation-ie 11 winphone81
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 10 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384
clientsimulation-edge 15 win10
TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384
clientsimulation-edge 17 win10
TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384
clientsimulation-opera 66 win10
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-safari 9 ios9
TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384
MacOSX 10.11 Safari 9
TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384
MacOSX 10.12 Safari 10
TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384
clientsimulation-safari 121 ios 122
TLSv1.3 TLS_CHACHA20_POLY1305_SHA256
clientsimulation-safari 130 osx 10146
TLSv1.3 TLS_CHACHA20_POLY1305_SHA256
iOS 9 App Transport Security 9
TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384
Java 6 update 45
No connection
Java 7 update 25
No connection
clientsimulation-java 8u161
TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384
clientsimulation-java1102
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-java1201
TLSv1.3 TLS_AES_128_GCM_SHA256
OpenSSL 1.0.2e
TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384
clientsimulation-openssl 110l
TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384
clientsimulation-openssl 111d
TLSv1.3 TLS_AES_256_GCM_SHA384
clientsimulation-thunderbird 68 3 1
TLSv1.3 TLS_AES_128_GCM_SHA256