rw2021.rsu.lv

Score 85/100

Web site information

Website image rw2021.rsu.lv
Web Address
IP Address
Web Servers
Apache
CMS
Drupal
Font Scripts
Font Awesome
Operating Systems
Ubuntu
Video Players
YouTube
JavaScript Frameworks
jQuery
Programming Languages
PHP

SEO data

title
RSU RESEARCH WEEK 2021
description
Integration of Innovative Knowledge and Research in Daily PracticeRīga Stradiņš University invites you to participate in Research Week 2021 (RW2021) – a multidisciplinary biannual event comprised of a range of international research conferences on medicine, social sciences, public health issues and university teaching and learning designed to explore how excellent and relevant research is delivered at the University and beyond.
abstract
Integration of Innovative Knowledge and Research in Daily PracticeRīga Stradiņš University invites you to participate in Research Week 2021 (RW2021) – a multidisciplinary biannual event comprised of a range of international research conferences on medicine, social sciences, public health issues and university teaching and learning designed to explore how excellent and relevant research is delivered at the University and beyond.
Generator
Drupal 8 (https://www.drupal.org)
MobileOptimized
width
HandheldFriendly
true
viewport
width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no

Web site external calls

fonts.googleapis.com
www.youtube.com
cdn.jsdelivr.net
www.googletagmanager.com
connect.facebook.net
www.google-analytics.com
www.googleadservices.com
www.facebook.com
fonts.gstatic.com
googleads.g.doubleclick.net
www.google.com
www.google.de
static.doubleclick.net
yt3.ggpht.com
i.ytimg.com
www.gstatic.com

Protocols

SSLv2
not offered
SSLv3
not offered
TLS 1.0
offered
TLS 1.1
offered
TLS 1.2
offered
TLS 1.3
offered with final
ALPN
http/1.1

Vulnerabilities

heartbleed
not vulnerable, no heartbeat extension
CCS
not vulnerable
ticketbleed
not vulnerable
ROBOT
not vulnerable
SSL renegotiation
not vulnerable
SSL client renegotiation
not vulnerable
CRIME TLS
not vulnerable
BREACH
potentially VULNERABLE, uses gzip HTTP compression - only supplied '/' tested
POODLE SSL
not vulnerable
fallback SCSV
supported
SWEET32
not vulnerable
FREAK
not vulnerable
DROWN
not vulnerable to DROWN on this host and port
DROWN
Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://censys.io/ipv4?q=AF80D9CDEABA88503FDA1902296CD4A1C698AF684476C0E65ACE3C8DC3965DAF
LOGJAM-common primes
'RFC3526/Oakley Group 14'
LOGJAM
not vulnerable, no DH EXPORT ciphers,
BEAST
VULNERABLE -- but also supports higher protocols TLSv1.1 TLSv1.2 (likely mitigated)
LUCKY13
potentially vulnerable, uses TLS CBC ciphers
RC4
not vulnerable

Header Responses

Status code
200 OK ('/')
Clock skew
0 seconds from localtime
HSTS
not offered
HPKP
No support for HTTP Public Key Pinning
X-Frame-Options
SAMEORIGIN
X-Content-Type-Options
nosniff
X-UA-Compatible
X-UA-Compatible: IE=edge

Server Defaults

TLS extensions
'renegotiation info/#65281' 'server name/#0' 'EC point formats/#11' 'session ticket/#35' 'supported versions/#43' 'key share/#51' 'supported_groups/#10' 'max fragment length/#1' 'application layer protocol negotiation/#16' 'encrypt-then-mac/#22' 'extended master secret/#23'
TLS session ticket
valid for 300 seconds only (<daily)
SSL sessionID support
yes
Session Ticket Resumption
supported
Session ID Resumption
supported
TLS timestamp
random
Signature algorithm
SHA256 with RSA
Key size
2048 bits
Key usage
Digital Signature, Key Encipherment
Extended key usage
cert_ext_keyusage
Serial number
041A1D1E6932B7CAE0EC20ADBEB2FB4D7156
Fingerprint SHA1
9C4A8CD50DF7CF4126A6CB64B8D4765A37E33087
Fingerprint SHA256
AF80D9CDEABA88503FDA1902296CD4A1C698AF684476C0E65ACE3C8DC3965DAF
Certificate details
-----BEGIN CERTIFICATE----- MIIFHzCCBAegAwIBAgISBBodHmkyt8rg7CCtvrL7TXFWMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMTA5MTkwMTM4NDdaFw0yMTEyMTgwMTM4NDZaMBgxFjAUBgNVBAMT DXJ3MjAyMS5yc3UubHYwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDB 2ua0vOXfWYXtBUKr0LkglLSbs8rh2gn9SXU1ETSRuDsVuJEejTy1CYpzgJ1AIwf0 dylNixiAxfBjS/qqN7Pv3UehlmTjF/PuwKHtTGlbA18rCBGpHVXxXM0BxF+jvkqW xCcHWDBQ0yID/SqyUWXyE34G4833NhGQ89KVnQeJq+RDnfX2jExr+pfx94ltNKGb c1iciTuhKMFEhrWxvx9tRjKHwkxam2PgI4U9XygKaCLEUS4bHMPhu/HG4tKWibb5 TA1a3LDTrwdjnyL+s5E1ag7pj4QCBSfIv4UIRpu6W/LAuw4w4yDc/oVH0UWX557P zNQQgZFdS5HxYDwNW/5DAgMBAAGjggJHMIICQzAOBgNVHQ8BAf8EBAMCBaAwHQYD VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O BBYEFBJlNXNZmJg4HwXVc2HYXQT2xO7XMB8GA1UdIwQYMBaAFBQusxe3WFbLrlAJ QOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL3Iz Lm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5vcmcv MBgGA1UdEQQRMA+CDXJ3MjAyMS5yc3UubHYwTAYDVR0gBEUwQzAIBgZngQwBAgEw NwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5sZXRzZW5j cnlwdC5vcmcwggEDBgorBgEEAdZ5AgQCBIH0BIHxAO8AdgBElGUusO7Or8RAB9io /ijA2uaCvtjLMbU/0zOWtbaBqAAAAXv7650MAAAEAwBHMEUCIQCnT8eDA3vRkXYk JDwnGsoFuPBx1vBYJ0pqlKxfIMLSqwIgLlTHlQpeh1DoWf8272CB4eIxszwE7qC+ 5Et/SDIifDQAdQD2XJQv0XcwIhRUGAgwlFaO400TGTO/3wwvIAvMTvFk4wAAAXv7 65znAAAEAwBGMEQCIFkzsh3+rlDi9Pveglsg3OXo8sw3EonguogJHEewutSeAiBV OxaznWp0+DhrTDDRPqKJckPz2YOMbinlC260kAHb6TANBgkqhkiG9w0BAQsFAAOC AQEAZWHINsqGxYJQxK6WcudQ3IHC5VxFJfF4oiNpzUvA/qQDneZwHVZyMdbA+ljd 8MnIoBcPCI8Nc+tY8s8s8AKzb2iWLJB8xLfQzbBW9QnFkD9Bnc3Jzz7e8LWeAzbd IQzIt7SBrLLWb7+TI/hkAtITT1E6RTGQRqnq85BrGjTog8Y3uYKXB4lpjkFWJjYz uB51kRPbGkFwrRpW0gEyzAT4GHnsOTlDDhNL8ZS3aIFhPRAbrWOXPhoMW2OXTbB6 t2xesKrGLW330Au8NAhx5oIRKFMzeudfVj+sbKdZSmUoCmyVTFVX5RxrTQTnKXRE hTe8EZg4dwQ3HRaHU4DJ0cPgwg== -----END CERTIFICATE-----
Common names
rw2021.rsu.lv
Service Name Indication
isa.rsu.lv
SubjectAlternative Name
rw2021.rsu.lv
Certificate authority issuers
R3 (Let's Encrypt from US)
Certificate trusted
Ok via SAN and CN (SNI mandatory)
Certificate chain trusted
failed (expired).
Is certificate Extended Validation
no
Days before expiry
64 >= 60 days
Valid from
2021-09-19 03:38
Valid until
2021-12-18 02:38
Chain
3
CRL distribution points
--
Online Certificate Status Protocol URL
http://r3.o.lencr.org
OCSP stapling
not offered
cert mustStapleExtension
--
DNS CAArecord
issue=comodoca.com, issue=letsencrypt.org, issue=sectigo.com, issue=trustwave.com
certificate transparency
yes (certificate extension)

Server Preferences

order
server
Which protocol negotiated
Default protocol TLS1.3
negotiated
TLS13-AES-256-GCM-SHA384, 253 bit ECDH (X25519)
order TLSv1
ECDHE-RSA-AES128-SHA
order TLSv1 1
ECDHE-RSA-AES128-SHA
order TLSv1 2
ECDHE-RSA-AES128-GCM-SHA256

Perfect Forward Secrecy

PFS
offered
PFS s
DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA
ECDHE curves
prime256v1 secp384r1 secp521r1

Ciphers

ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
(0xc030)
ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
(0xc028)
ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
(0xc014)
DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
(0x9f)
DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
(0x6b)
DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
(0x39)
AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
(0x9d)
AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
(0x3d)
AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
(0x35)
ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
(0xc02f)
ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
(0xc027)
ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
(0xc013)
DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
(0x9e)
DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
(0x67)
DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
(0x33)
AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
(0x9c)
AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256
(0x3c)
AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
(0x2f)

Browser Simulations

Android 2.3.7
TLSv1.0 DHE-RSA-AES128-SHA
Android 4.1.1
TLSv1.0 ECDHE-RSA-AES128-SHA
Android 4.3
TLSv1.0 ECDHE-RSA-AES128-SHA
Android 4.4.2
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 5.0.0
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 6.0
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 7.0
TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305
Windows Chrome 51
TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305
Windows Chrome 57
TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305
Windows Firefox 47
TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305
Windows Firefox 53
TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305
Windows XP Internet Explorer 6
No connection
Windows Vista Internet Explorer 7
TLSv1.0 ECDHE-RSA-AES128-SHA
Windows XP Internet Explorer 8
No connection
Windows 7 Internet Explorer 8
TLSv1.0 ECDHE-RSA-AES128-SHA
Windows 7 Internet Explorer 11
TLSv1.2 DHE-RSA-AES128-GCM-SHA256
Windows 8.1 Internet Explorer 11
TLSv1.2 DHE-RSA-AES128-GCM-SHA256
Windows 8.1 update Internet Explorer 11
TLSv1.2 DHE-RSA-AES128-GCM-SHA256
Windows 10 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows 10 Edge 13
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows Phone 10 Edge 13
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows 7 Opera 17
TLSv1.2 ECDHE-RSA-AES128-SHA256
MacOSX 10.6.8 Safari 5.1.9
TLSv1.0 ECDHE-RSA-AES128-SHA
iOS 7 Safari 7
TLSv1.2 ECDHE-RSA-AES128-SHA256
MacOSX 10.11 Safari 9
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
MacOSX 10.12 Safari 10
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
iOS 9 App Transport Security 9
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows 7 Tor 7.0.9
TLSv1.0 ECDHE-RSA-AES128-SHA
Java 6 update 45
No connection
Java 7 update 25
TLSv1.0 ECDHE-RSA-AES128-SHA
Java 8 update 31
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
OpenSSL 1.1.1
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
OpenSSL 1.0.2e
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256