web.whatsapp.com, [2a03:2880:f277:1cd:face:b00c:0:167]:443
TLS Test Results from February 24 2025 19:06:19 UTC. Scan took 102 seconds.
Summary
| Finding | Severity | Result |
|---|---|---|
| Expiration Status | HIGH | expires < 30 days (8) |
| Valid Not After | HIGH | 2025-03-04 23:59 |
| OCSP Revoked | WARN | |
| TLS 1.2 | OK | offered |
| TLS 1.3 | OK | offered with draft 28, draft 26, draft 23, final |
| Perfect Forward Secrecy | OK | offered |
| Common Name (CN) | OK | *.whatsapp.net |
| Subject Alternative Name (SAN) | INFO |
|
| CA Issuers | INFO | DigiCert SHA2 High Assurance Server CA (DigiCert Inc from US) |
Protocols
| Version | Status |
|---|---|
| SSL v2 | not offered |
| SSL v3 | not offered |
| TLS 1.0 | offered (deprecated) |
| TLS 1.1 | offered (deprecated) |
| TLS 1.2 | offered |
| TLS 1.3 | offered with draft 28, draft 26, draft 23, final |
| ALPN HTTP2 | h2 |
| ALPN / HTTP2 | http/1.1h2-fb |
Cipher Categories
| Category | Status |
|---|---|
| NULL ciphers (no encryption) | not offered |
| Anonymous NULL Ciphers (no authentication) | not offered |
| Export ciphers (excluding ADH+NULL) | not offered |
| LOW: 64 Bit + DES, RC[2,4] (excluding export) | not offered |
| Triple DES Ciphers / IDEA | offered |
| Obsolete CBC ciphers (AES, ARIA etc.) | offered |
| Strong encryption (AEAD ciphers) | offered |
Perfect Forward Secrecy
| Category | Status |
|---|---|
| Perfect Forward Secrecy | offered |
| PFS Ciphers |
|
| PFS ECDHE Curves |
|
Server Preferences
| Category | Finding |
|---|---|
| Cipher Order | server -- TLS 1.3 client determined |
| Protocol Negotiated | Default protocol TLS1.3 |
| Cipher Negotiated | TLS_CHACHA20_POLY1305_SHA256, 253 bit ECDH (X25519) |
| Cipher Order TLS v1.0 | ECDHE-ECDSA-AES128-SHA |
| Cipher Order TLS v1.1 | ECDHE-ECDSA-AES128-SHA |
| Cipher Order TLS v1.2 | ECDHE-ECDSA-AES128-GCM-SHA256 |
Server Defaults
| Category | Finding |
|---|---|
| TLS Extensions |
|
| TLS Session Ticket | no -- no lifetime advertised |
| SSL Session-ID Support | yes |
| Session Resumption Ticket | not supported |
| Session Resumption ID | supported |
| TLS Timestamp | random |
| Number of Certificates | 2 |
Certificate #1
| Category | Finding |
|---|---|
| Signature Algorithm | SHA256 with RSA |
| Key Size | RSA 2048 bits |
| Key Usage | Digital Signature, Key Encipherment |
| Extended Key Usage | TLS Web Server Authentication, TLS Web Client Authentication |
| Serial Number | 09BF4EA716100A2C1DC099A4100DF1A4 |
| SHA1 Fingerprint | 6E73134E3E57B5D244C71E399618C0AE61B022DF |
| SHA256 Fingerprint | 5C6CF0FBB5FE974DE88F8DF7E7CE88F18E7439D7BD9CC0E42E111FE829400BF6 |
| X.509 Certificate | Download web.whatsapp.com_443_6E73134E.pem |
| Common Name (CN) | *.whatsapp.net |
| Common Name w/o SNI | *.whatsapp.net |
| Subject Alternative Name (SAN) |
|
| CA Issuers | DigiCert SHA2 High Assurance Server CA (DigiCert Inc from US) |
| Certificate Trust | Ok via SAN wildcard (same w/o SNI) |
| Chain Of Trust | passed. |
| Extended-Validation Policies | no |
| ETS (prev. "eTLS") | not present |
| Expiration Status | expires < 30 days (8) |
| Valid Not Before | 2024-12-04 00:00 |
| Valid Not After | 2025-03-04 23:59 |
| Validity Period | No finding |
| Certificate Count Server | 2 |
| Certs List Ordering Problem | no |
| Leaked Key (pwnedkeys) | not checked |
| CRL Revoked | not revoked |
| CRL Distribution Points |
|
| OCSP Revoked | |
| OCSP URL | http://ocsp.digicert.com |
| OCSP Stapling | not offered |
| OCSP Must Staple Extension | -- |
| DNS CAA Record | issue=digicert.com; |
| Certificate Transparency | yes (certificate extension) |
Certificate #2
| Category | Finding |
|---|---|
| Signature Algorithm | SHA256 with RSA |
| Key Size | EC 256 bits |
| Key Usage | Digital Signature, Key Agreement |
| Extended Key Usage | TLS Web Server Authentication, TLS Web Client Authentication |
| Serial Number | 01614A45286D5B55FF78A6919E79BE32 |
| SHA1 Fingerprint | D7DA394C0A451B5F5AC5C13DC27CD5F75D07761D |
| SHA256 Fingerprint | 902C68798140131484435D7B4F48DE5F81205F55E1CA99EC1468220F893129EB |
| X.509 Certificate | Download web.whatsapp.com_443_D7DA394C.pem |
| Common Name (CN) | *.whatsapp.net |
| Common Name w/o SNI | *.whatsapp.net |
| Subject Alternative Name (SAN) |
|
| CA Issuers | DigiCert SHA2 High Assurance Server CA (DigiCert Inc from US) |
| Certificate Trust | Ok via SAN wildcard (same w/o SNI) |
| Chain Of Trust | passed. |
| Extended-Validation Policies | no |
| ETS (prev. "eTLS") | not present |
| Expiration Status | expires < 30 days (8) |
| Valid Not Before | 2024-12-04 00:00 |
| Valid Not After | 2025-03-04 23:59 |
| Validity Period | No finding |
| Certificate Count Server | 2 |
| Certs List Ordering Problem | no |
| Leaked Key (pwnedkeys) | not checked |
| CRL Revoked | not revoked |
| CRL Distribution Points |
|
| OCSP Revoked | |
| OCSP URL | http://ocsp.digicert.com |
| OCSP Stapling | not offered |
| OCSP Must Staple Extension | -- |
| DNS CAA Record | issue=digicert.com; |
| Certificate Transparency | yes (certificate extension) |
HTTP response
| Category | Finding |
|---|---|
| HTTP Status Code | 200 OK ('/') |
| HTTP Clock Skew | 0 seconds from localtime |
| HSTS Expiration Time | 730 days (=63072000 seconds) > 15552000 seconds |
| HSTS Subdomains | includes subdomains |
| HSTS Preload | domain IS marked for preloading |
| Server Banner | No Server banner line in header, interesting! |
| Banner Application | No application banner found |
| Cookie Count | 1 at '/' |
| Secure Cookie | All (1) at '/' marked as secure |
| HTTP-only Cookie | All (1) at '/' marked as HttpOnly |
| Reverse Proxy Banner | -- |
Vulnerabilities
| Category | Finding |
|---|---|
| Heartbleed | not vulnerable, no heartbeat extension |
| CCS | not vulnerable |
| Ticketbleed | no session ticket extension |
| ROBOT | not vulnerable |
| Secure Renegotiation | supported |
| Secure Client Renegotiation | not vulnerable |
| CRIME TLS | not vulnerable |
| BREACH | potentially VULNERABLE, br HTTP compression detected - only supplied '/' tested |
| POODLE SSL | not vulnerable, no SSLv3 |
| Fallback SCSV | supported |
| SWEET32 | uses 64 bit block ciphers |
| FREAK | not vulnerable |
| DROWN | not vulnerable on this host and port |
| DROWN Hint | Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see censys.io |
| LOGJAM | not vulnerable, no DH EXPORT ciphers, |
| LOGJAM Common Primes | no DH key with <= TLS 1.2 |
| BEAST CBC TLS1 |
|
| BEAST | VULNERABLE -- but also supports higher protocols TLSv1.1 TLSv1.2 (likely mitigated) |
| LUCKY13 | potentially vulnerable, uses TLS CBC ciphers |
| RC4 | not vulnerable |
Ciphers
| Name | Key Exchange | Encryption | Key Length | IANA ID |
|---|---|---|---|---|
| ECDHE-RSA-AES256-GCM-SHA384 | ECDH 256 | AESGCM | 256 | xc030 |
| ECDHE-ECDSA-AES256-GCM-SHA384 | ECDH 256 | AESGCM | 256 | xc02c |
| ECDHE-RSA-AES256-SHA | ECDH 256 | AES | 256 | xc014 |
| ECDHE-ECDSA-AES256-SHA | ECDH 256 | AES | 256 | xc00a |
| AES256-GCM-SHA384 | RSA | AESGCM | 256 | x9d |
| AES256-SHA | RSA | AES | 256 | x35 |
| ECDHE-RSA-AES128-GCM-SHA256 | ECDH 256 | AESGCM | 128 | xc02f |
| ECDHE-ECDSA-AES128-GCM-SHA256 | ECDH 256 | AESGCM | 128 | xc02b |
| ECDHE-RSA-AES128-SHA | ECDH 256 | AES | 128 | xc013 |
| ECDHE-ECDSA-AES128-SHA | ECDH 256 | AES | 128 | xc009 |
| AES128-GCM-SHA256 | RSA | AESGCM | 128 | x9c |
| AES128-SHA | RSA | AES | 128 | x2f |
| ECDHE-RSA-DES-CBC3-SHA | ECDH 256 | 3DES | 168 | xc012 |
| ECDHE-ECDSA-DES-CBC3-SHA | ECDH 256 | 3DES | 168 | xc008 |
| DES-CBC3-SHA | RSA | 3DES | 168 | x0a |
Client Simulation
| Category | Connection via |
|---|---|
| Android 4.4.2 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| Android 5.0 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| Android 6.0 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| Android 7.0 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| Android 8.1 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| Android 9.0 | TLSv1.3 TLS_AES_128_GCM_SHA256 |
| Android X | TLSv1.3 TLS_AES_128_GCM_SHA256 |
| Chrome 74 Windows 10 | TLSv1.3 TLS_AES_128_GCM_SHA256 |
| Chrome 79 Windows 10 | TLSv1.3 TLS_AES_128_GCM_SHA256 |
| Firefox 66 Windows 8.1/10 | TLSv1.3 TLS_AES_128_GCM_SHA256 |
| Firefox 71 Windows 10 | TLSv1.3 TLS_AES_128_GCM_SHA256 |
| IE 6 Windows XP | No connection |
| IE 8 Windows 7 | TLSv1.0 ECDHE-ECDSA-AES128-SHA |
| IE 8 Windows XP | TLSv1.0 DES-CBC3-SHA |
| IE 11 Windows 7 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| IE 11 Windows 8.1 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| IE 11 Windows Phone 8.1 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| IE 11 Windows 10 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| Edge 15 Windows 10 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| Edge 17 Windows 10 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| Opera 66 Windows 10 | TLSv1.3 TLS_AES_128_GCM_SHA256 |
| Safari 9 IOS9 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| Safari 9 OSX 10.11 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| Safari 10 OSX 10.12 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| Safari 12.1 iOS 12.2 | TLSv1.3 TLS_CHACHA20_POLY1305_SHA256 |
| Safari 13.0 OSX 10.14.6 | TLSv1.3 TLS_CHACHA20_POLY1305_SHA256 |
| Apple ATS 9 IOS9 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| Java 6u45 | TLSv1.0 AES128-SHA |
| Java 7u25 | TLSv1.0 ECDHE-ECDSA-AES128-SHA |
| Java 8u161 | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| Java 11.0.2 (OpenJDK) | TLSv1.3 TLS_AES_128_GCM_SHA256 |
| Java 12.0.1 (OpenJDK) | TLSv1.3 TLS_AES_128_GCM_SHA256 |
| OpenSSL 1.02e | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| OpenSSL 1.10l (Debian) | TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 |
| OpenSSL 1.11d (Debian) | TLSv1.3 TLS_CHACHA20_POLY1305_SHA256 |
| Thunderbird 68.3 | TLSv1.3 TLS_AES_128_GCM_SHA256 |