web.whatsapp.com, [2a03:2880:f277:1cd:face:b00c:0:167]:443

TLS Test Results from February 24 2025 19:06:19 UTC. Scan took 102 seconds.

Summary

Finding Severity Result
Expiration Status HIGH expires < 30 days (8)
Valid Not After HIGH 2025-03-04 23:59
OCSP Revoked WARN
TLS 1.2 OK offered
TLS 1.3 OK offered with draft 28, draft 26, draft 23, final
Perfect Forward Secrecy OK offered
Common Name (CN) OK *.whatsapp.net
Subject Alternative Name (SAN) INFO
  • *.whatsapp.net
  • *.cdn.whatsapp.net
  • *.snr.whatsapp.net
  • *.whatsapp.com
  • wa.me
  • whatsapp.com
  • whatsapp.net
CA Issuers INFO DigiCert SHA2 High Assurance Server CA (DigiCert Inc from US)

Protocols

Version Status
SSL v2 not offered
SSL v3 not offered
TLS 1.0 offered (deprecated)
TLS 1.1 offered (deprecated)
TLS 1.2 offered
TLS 1.3 offered with draft 28, draft 26, draft 23, final
ALPN HTTP2 h2
ALPN / HTTP2 http/1.1h2-fb

Cipher Categories

Category Status
NULL ciphers (no encryption) not offered
Anonymous NULL Ciphers (no authentication) not offered
Export ciphers (excluding ADH+NULL) not offered
LOW: 64 Bit + DES, RC[2,4] (excluding export) not offered
Triple DES Ciphers / IDEA offered
Obsolete CBC ciphers (AES, ARIA etc.) offered
Strong encryption (AEAD ciphers) offered

Perfect Forward Secrecy

Category Status
Perfect Forward Secrecy offered
PFS Ciphers
  • ECDHE-ECDSA-AES128-GCM-SHA256
  • ECDHE-ECDSA-AES128-SHA
  • ECDHE-ECDSA-AES256-GCM-SHA384
  • ECDHE-ECDSA-AES256-SHA
  • ECDHE-RSA-AES128-GCM-SHA256
  • ECDHE-RSA-AES128-SHA
  • ECDHE-RSA-AES256-GCM-SHA384
  • ECDHE-RSA-AES256-SHA
PFS ECDHE Curves
  • prime256v1

Server Preferences

Category Finding
Cipher Order server -- TLS 1.3 client determined
Protocol Negotiated Default protocol TLS1.3
Cipher Negotiated TLS_CHACHA20_POLY1305_SHA256, 253 bit ECDH (X25519)
Cipher Order TLS v1.0 ECDHE-ECDSA-AES128-SHA
Cipher Order TLS v1.1 ECDHE-ECDSA-AES128-SHA
Cipher Order TLS v1.2 ECDHE-ECDSA-AES128-GCM-SHA256

Server Defaults

Category Finding
TLS Extensions
  • renegotiation info/#65281
  • EC point formats/#11
  • supported versions/#43
  • key share/#51
  • max fragment length/#1
  • application layer protocol negotiation/#16
  • encrypt-then-mac/#22
  • extended master secret/#23
TLS Session Ticket no -- no lifetime advertised
SSL Session-ID Support yes
Session Resumption Ticket not supported
Session Resumption ID supported
TLS Timestamp random
Number of Certificates 2

Certificate #1

Category Finding
Signature Algorithm SHA256 with RSA
Key Size RSA 2048 bits
Key Usage Digital Signature, Key Encipherment
Extended Key Usage TLS Web Server Authentication, TLS Web Client Authentication
Serial Number 09BF4EA716100A2C1DC099A4100DF1A4
SHA1 Fingerprint 6E73134E3E57B5D244C71E399618C0AE61B022DF
SHA256 Fingerprint 5C6CF0FBB5FE974DE88F8DF7E7CE88F18E7439D7BD9CC0E42E111FE829400BF6
X.509 Certificate Download web.whatsapp.com_443_6E73134E.pem
Common Name (CN) *.whatsapp.net
Common Name w/o SNI *.whatsapp.net
Subject Alternative Name (SAN)
  • *.whatsapp.net
  • *.cdn.whatsapp.net
  • *.snr.whatsapp.net
  • *.whatsapp.com
  • wa.me
  • whatsapp.com
  • whatsapp.net
CA Issuers DigiCert SHA2 High Assurance Server CA (DigiCert Inc from US)
Certificate Trust Ok via SAN wildcard (same w/o SNI)
Chain Of Trust passed.
Extended-Validation Policies no
ETS (prev. "eTLS") not present
Expiration Status expires < 30 days (8)
Valid Not Before 2024-12-04 00:00
Valid Not After 2025-03-04 23:59
Validity Period No finding
Certificate Count Server 2
Certs List Ordering Problem no
Leaked Key (pwnedkeys) not checked
CRL Revoked not revoked
CRL Distribution Points
  • http://crl3.digicert.com/sha2-ha-server-g6.crl
  • http://crl4.digicert.com/sha2-ha-server-g6.crl
OCSP Revoked
OCSP URL http://ocsp.digicert.com
OCSP Stapling not offered
OCSP Must Staple Extension --
DNS CAA Record issue=digicert.com;
Certificate Transparency yes (certificate extension)

Certificate #2

Category Finding
Signature Algorithm SHA256 with RSA
Key Size EC 256 bits
Key Usage Digital Signature, Key Agreement
Extended Key Usage TLS Web Server Authentication, TLS Web Client Authentication
Serial Number 01614A45286D5B55FF78A6919E79BE32
SHA1 Fingerprint D7DA394C0A451B5F5AC5C13DC27CD5F75D07761D
SHA256 Fingerprint 902C68798140131484435D7B4F48DE5F81205F55E1CA99EC1468220F893129EB
X.509 Certificate Download web.whatsapp.com_443_D7DA394C.pem
Common Name (CN) *.whatsapp.net
Common Name w/o SNI *.whatsapp.net
Subject Alternative Name (SAN)
  • *.whatsapp.net
  • *.cdn.whatsapp.net
  • *.snr.whatsapp.net
  • *.whatsapp.com
  • wa.me
  • whatsapp.com
  • whatsapp.net
CA Issuers DigiCert SHA2 High Assurance Server CA (DigiCert Inc from US)
Certificate Trust Ok via SAN wildcard (same w/o SNI)
Chain Of Trust passed.
Extended-Validation Policies no
ETS (prev. "eTLS") not present
Expiration Status expires < 30 days (8)
Valid Not Before 2024-12-04 00:00
Valid Not After 2025-03-04 23:59
Validity Period No finding
Certificate Count Server 2
Certs List Ordering Problem no
Leaked Key (pwnedkeys) not checked
CRL Revoked not revoked
CRL Distribution Points
  • http://crl3.digicert.com/sha2-ha-server-g6.crl
  • http://crl4.digicert.com/sha2-ha-server-g6.crl
OCSP Revoked
OCSP URL http://ocsp.digicert.com
OCSP Stapling not offered
OCSP Must Staple Extension --
DNS CAA Record issue=digicert.com;
Certificate Transparency yes (certificate extension)

HTTP response

Category Finding
HTTP Status Code 200 OK ('/')
HTTP Clock Skew 0 seconds from localtime
HSTS Expiration Time 730 days (=63072000 seconds) > 15552000 seconds
HSTS Subdomains includes subdomains
HSTS Preload domain IS marked for preloading
Server Banner
Banner Application
Cookie Count
Secure Cookie
HTTP-only Cookie
Reverse Proxy Banner

Vulnerabilities

Category Finding
Heartbleed not vulnerable, no heartbeat extension
CCS not vulnerable
Ticketbleed no session ticket extension
ROBOT not vulnerable
Secure Renegotiation supported
Secure Client Renegotiation not vulnerable
CRIME TLS not vulnerable
BREACH potentially VULNERABLE, br HTTP compression detected - only supplied '/' tested
POODLE SSL not vulnerable, no SSLv3
Fallback SCSV supported
SWEET32 uses 64 bit block ciphers
FREAK not vulnerable
DROWN not vulnerable on this host and port
DROWN Hint Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see censys.io
LOGJAM not vulnerable, no DH EXPORT ciphers,
LOGJAM Common Primes no DH key with <= TLS 1.2
BEAST CBC TLS1
  • ECDHE-ECDSA-AES128-SHA
  • ECDHE-ECDSA-AES256-SHA
  • ECDHE-RSA-AES128-SHA
  • ECDHE-RSA-AES256-SHA
  • AES128-SHA
  • AES256-SHA
  • ECDHE-ECDSA-DES-CBC3-SHA
  • ECDHE-RSA-DES-CBC3-SHA
  • DES-CBC3-SHA
BEAST VULNERABLE -- but also supports higher protocols TLSv1.1 TLSv1.2 (likely mitigated)
LUCKY13 potentially vulnerable, uses TLS CBC ciphers
RC4 not vulnerable

Ciphers

Name Key Exchange Encryption Key Length IANA ID
ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 xc030
ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 xc02c
ECDHE-RSA-AES256-SHA ECDH 256 AES 256 xc014
ECDHE-ECDSA-AES256-SHA ECDH 256 AES 256 xc00a
AES256-GCM-SHA384 RSA AESGCM 256 x9d
AES256-SHA RSA AES 256 x35
ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 xc02f
ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 xc02b
ECDHE-RSA-AES128-SHA ECDH 256 AES 128 xc013
ECDHE-ECDSA-AES128-SHA ECDH 256 AES 128 xc009
AES128-GCM-SHA256 RSA AESGCM 128 x9c
AES128-SHA RSA AES 128 x2f
ECDHE-RSA-DES-CBC3-SHA ECDH 256 3DES 168 xc012
ECDHE-ECDSA-DES-CBC3-SHA ECDH 256 3DES 168 xc008
DES-CBC3-SHA RSA 3DES 168 x0a

Client Simulation

Category Connection via
Android 4.4.2 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 5.0 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 6.0 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 7.0 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 9.0 TLSv1.3 TLS_AES_128_GCM_SHA256
Android X TLSv1.3 TLS_AES_128_GCM_SHA256
Chrome 74 Windows 10 TLSv1.3 TLS_AES_128_GCM_SHA256
Chrome 79 Windows 10 TLSv1.3 TLS_AES_128_GCM_SHA256
Firefox 66 Windows 8.1/10 TLSv1.3 TLS_AES_128_GCM_SHA256
Firefox 71 Windows 10 TLSv1.3 TLS_AES_128_GCM_SHA256
IE 6 Windows XP No connection
IE 8 Windows 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA
IE 8 Windows XP TLSv1.0 DES-CBC3-SHA
IE 11 Windows 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
IE 11 Windows 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
IE 11 Windows Phone 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
IE 11 Windows 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Edge 15 Windows 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Edge 17 Windows 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Opera 66 Windows 10 TLSv1.3 TLS_AES_128_GCM_SHA256
Safari 9 IOS9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Safari 9 OSX 10.11 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Safari 10 OSX 10.12 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Safari 12.1 iOS 12.2 TLSv1.3 TLS_CHACHA20_POLY1305_SHA256
Safari 13.0 OSX 10.14.6 TLSv1.3 TLS_CHACHA20_POLY1305_SHA256
Apple ATS 9 IOS9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Java 6u45 TLSv1.0 AES128-SHA
Java 7u25 TLSv1.0 ECDHE-ECDSA-AES128-SHA
Java 8u161 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Java 11.0.2 (OpenJDK) TLSv1.3 TLS_AES_128_GCM_SHA256
Java 12.0.1 (OpenJDK) TLSv1.3 TLS_AES_128_GCM_SHA256
OpenSSL 1.02e TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
OpenSSL 1.10l (Debian) TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
OpenSSL 1.11d (Debian) TLSv1.3 TLS_CHACHA20_POLY1305_SHA256
Thunderbird 68.3 TLSv1.3 TLS_AES_128_GCM_SHA256