autonomic.zone, 78.47.170.185:443

TLS Test Results from September 01 2023 13:04:58 UTC. Scan took 66 seconds.

Summary

Finding Severity Result
Secure Renegotiation WARN OpenSSL handshake didn't succeed
OCSP Revoked WARN
TLS 1.2 OK offered
TLS 1.3 OK offered with final
Perfect Forward Secrecy OK offered
Common Name (CN) OK autonomic.zone
Subject Alternative Name (SAN) INFO
  • autonomic.zone
  • beta.autonomic.zone
  • www.autonomic.zone
  • www.beta.autonomic.zone
CA Issuers INFO R3 (Let's Encrypt from US)
Valid Not After OK 2023-11-02 12:11

Protocols

Version Status
SSL v2 not offered
SSL v3 not offered
TLS 1.0 not offered
TLS 1.1 not offered
TLS 1.2 offered
TLS 1.3 offered with final
ALPN HTTP2 h2
ALPN / HTTP2 http/1.1

Cipher Categories

Category Status
NULL ciphers (no encryption) not offered
Anonymous NULL Ciphers (no authentication) not offered
Export ciphers (excluding ADH+NULL) not offered
LOW: 64 Bit + DES, RC[2,4] (excluding export) not offered
Triple DES Ciphers / IDEA not offered
Obsolete CBC ciphers (AES, ARIA etc.) not offered
Strong encryption (AEAD ciphers) offered

Perfect Forward Secrecy

Category Status
Perfect Forward Secrecy offered
PFS Ciphers
  • ECDHE-RSA-AES256-GCM-SHA384
PFS ECDHE Curves
  • secp384r1
  • secp521r1

Server Preferences

Category Finding
Cipher Order server -- TLS 1.3 client determined
Protocol Negotiated Default protocol TLS1.3
Cipher Negotiated TLS_AES_128_GCM_SHA256, 521 bit ECDH (P-521)
Cipher Order TLS v1.2 ECDHE-RSA-AES256-GCM-SHA384

Server Defaults

Category Finding
TLS Extensions
  • session ticket/#35
  • renegotiation info/#65281
  • EC point formats/#11
  • supported versions/#43
  • key share/#51
  • application layer protocol negotiation/#16
TLS Session Ticket no -- no lifetime advertised
SSL Session-ID Support yes
Session Resumption Ticket not supported
Session Resumption ID not supported
TLS Timestamp random
Number of Certificates 1

Certificate

Category Finding
Signature Algorithm SHA256 with RSA
Key Size RSA 4096 bits
Key Usage
  • Digital Signature
  • Key Encipherment
Extended Key Usage
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Serial Number 048813DDEBB6C084AD7A1F5884D7B45EED00
SHA1 Fingerprint A57A877C2727E2602E4AB8BE2AD7892A6A95A25B
SHA256 Fingerprint 1BAC0D41E31E6BB2E4826394F7848AFA2C055EAD5C4336D29501737C922823AC
X.509 Certificate Download autonomic.zone_443_A57A877C.pem
Common Name (CN) autonomic.zone
Common Name w/o SNI request w/o SNI didn't succeed
Subject Alternative Name (SAN)
  • autonomic.zone
  • beta.autonomic.zone
  • www.autonomic.zone
  • www.beta.autonomic.zone
CA Issuers R3 (Let's Encrypt from US)
Certificate Trust Ok via SAN (SNI mandatory)
Chain Of Trust passed.
Extended-Validation Policies no
ETS (prev. "eTLS") not present
Expiration Status 61 >= 30 days
Valid Not Before 2023-08-04 12:11
Valid Not After 2023-11-02 12:11
Validity Period No finding
Certificate Count Server 3
Certs List Ordering Problem no
Leaked Key (pwnedkeys) not in database
CRL Distribution Points
  • --
OCSP Revoked
OCSP URL http://r3.o.lencr.org
OCSP Stapling not offered
OCSP Must Staple Extension --
DNS CAA Record
  • --
Certificate Transparency yes (certificate extension)

HTTP response

Category Finding
HTTP Status Code 200 OK ('/')
HTTP Clock Skew 0 seconds from localtime
HSTS not offered
Server Banner
Banner Application
Cookie Count
Security Headers --
Reverse Proxy Banner

Vulnerabilities

Category Finding
Heartbleed not vulnerable, no heartbeat extension
CCS not vulnerable
Ticketbleed not vulnerable
ROBOT not vulnerable, no RSA key transport cipher
Secure Renegotiation OpenSSL handshake didn't succeed
Secure Client Renegotiation not vulnerable
CRIME TLS not vulnerable
BREACH potentially VULNERABLE, gzip HTTP compression detected - only supplied '/' tested
POODLE SSL not vulnerable, no SSLv3
Fallback SCSV no protocol below TLS 1.2 offered
SWEET32 not vulnerable
FREAK not vulnerable
DROWN not vulnerable on this host and port
DROWN Hint Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see censys.io
LOGJAM not vulnerable, no DH EXPORT ciphers,
LOGJAM Common Primes no DH key with <= TLS 1.2
BEAST not vulnerable, no SSL3 or TLS1
LUCKY13 not vulnerable
RC4 not vulnerable

Ciphers

Name Key Exchange Encryption Key Length IANA ID
ECDHE-RSA-AES256-GCM-SHA384 ECDH 521 AESGCM 256 xc030

Client Simulation

Category Connection via
Android 4.4.2 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Android 5.0 No connection
Android 6.0 No connection
Android 7.0 No connection
Android 8.1 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Android 9.0 TLSv1.3 TLS_AES_128_GCM_SHA256
Android X TLSv1.3 TLS_AES_128_GCM_SHA256
Chrome 74 Windows 10 TLSv1.3 TLS_AES_128_GCM_SHA256
Chrome 79 Windows 10 TLSv1.3 TLS_AES_128_GCM_SHA256
Firefox 66 Windows 8.1/10 TLSv1.3 TLS_AES_128_GCM_SHA256
Firefox 71 Windows 10 TLSv1.3 TLS_AES_128_GCM_SHA256
IE 6 Windows XP No connection
IE 8 Windows 7 No connection
IE 8 Windows XP No connection
IE 11 Windows 7 No connection
IE 11 Windows 8.1 No connection
IE 11 Windows Phone 8.1 No connection
IE 11 Windows 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Edge 15 Windows 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Edge 17 Windows 10 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Opera 66 Windows 10 TLSv1.3 TLS_AES_128_GCM_SHA256
Safari 9 IOS9 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Safari 9 OSX 10.11 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Safari 10 OSX 10.12 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Safari 12.1 iOS 12.2 TLSv1.3 TLS_CHACHA20_POLY1305_SHA256
Safari 13.0 OSX 10.14.6 TLSv1.3 TLS_CHACHA20_POLY1305_SHA256
Apple ATS 9 IOS9 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Java 6u45 No connection
Java 7u25 No connection
Java 8u161 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Java 11.0.2 (OpenJDK) TLSv1.3 TLS_AES_128_GCM_SHA256
Java 12.0.1 (OpenJDK) TLSv1.3 TLS_AES_128_GCM_SHA256
OpenSSL 1.02e TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
OpenSSL 1.10l (Debian) TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
OpenSSL 1.11d (Debian) TLSv1.3 TLS_AES_128_GCM_SHA256
Thunderbird 68.3 TLSv1.3 TLS_AES_128_GCM_SHA256