Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Authentication
- Server Key and Certificate #1
- Subject www.auckland.ac.nz
- Fingerprint SHA1: a41fb1b66370ad2346b5dc1f85075ced2c73cb0d
- Pin SHA256: EH5y/Qm+zqz1Gt//rmoE1ZWbFSc8zdp3qdqtx+9TIW0=
- Common names www.auckland.ac.nz
- Alternative names www.auckland.ac.nz auckland.ac.nz
- Valid from Tue, 31 Mar 2015 08:04:15 UTC
- Valid until Sat, 31 Mar 2018 08:04:01 UTC (expires in 1 year and 8 months)
- Key RSA 2048 bits (e 65537)
- Weak key (Debian) No
- Issuer QuoVadis Global SSL ICA G2
- AIA: http://trust.quovadisglobal.com/qvsslg2.crt
- Signature algorithm SHA256withRSA
- Extended Validation No
- Certificate Transparency No
- OCSP Must Staple No
- Revocation information CRL, OCSP
- CRL: http://crl.quovadisglobal.com/qvsslg2.crl
- OCSP: http://ocsp.quovadisglobal.com
- Revocation status Good (not revoked)
- Trusted Yes
- Additional Certificates (if supplied)
- Certificates provided 3 (4146 bytes)
- Chain issues Contains anchor
- #2
- Subject QuoVadis Global SSL ICA G2
- Fingerprint SHA1: 6036330e1643a0cee19c8af780e0f3e8f59ca1a3
- Pin SHA256: tYkfFN27P1GUjH5ME128BCg302dL2iwOYhz5wwFJb50=
- Valid until Thu, 01 Jun 2023 13:35:05 UTC (expires in 6 years and 10 months)
- Key RSA 2048 bits (e 65537)
- Issuer QuoVadis Root CA 2
- Signature algorithm SHA256withRSA
- #3
- Subject QuoVadis Root CA 2 In trust store
- Fingerprint SHA1: ca3afbcf1240364b44b216208880483919937cf7
- Pin SHA256: j9ESw8g3DxR9XM06fYZeuN1UB4O6xp/GAIjjdD/zM3g=
- Valid until Mon, 24 Nov 2031 18:23:33 UTC (expires in 15 years and 3 months)
- Key RSA 4096 bits (e 65537)
- Issuer QuoVadis Root CA 2 Self-signed
- Signature algorithm SHA1withRSA Weak, but no impact on root certificate
- Certification Paths
- Path #1: Trusted
- 1 Sent by server www.auckland.ac.nz
- Fingerprint SHA1: a41fb1b66370ad2346b5dc1f85075ced2c73cb0d
- Pin SHA256: EH5y/Qm+zqz1Gt//rmoE1ZWbFSc8zdp3qdqtx+9TIW0=
- RSA 2048 bits (e 65537) / SHA256withRSA
- 2 Sent by server QuoVadis Global SSL ICA G2
- Fingerprint SHA1: 6036330e1643a0cee19c8af780e0f3e8f59ca1a3
- Pin SHA256: tYkfFN27P1GUjH5ME128BCg302dL2iwOYhz5wwFJb50=
- RSA 2048 bits (e 65537) / SHA256withRSA
- 3 Sent by server
- In trust store QuoVadis Root CA 2 Self-signed
- Fingerprint SHA1: ca3afbcf1240364b44b216208880483919937cf7
- Pin SHA256: j9ESw8g3DxR9XM06fYZeuN1UB4O6xp/GAIjjdD/zM3g=
- RSA 4096 bits (e 65537) / SHA1withRSA
- Weak or insecure signature, but no impact on root certificate
- Configuration
- Protocols
- TLS 1.2 Yes
- TLS 1.1 Yes
- TLS 1.0 Yes
- SSL 3 No
- SSL 2 No
- Cipher Suites (SSL 3+ suites in server-preferred order; deprecated and SSL 2 suites at the end)
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) ECDH secp256r1 (eq. 3072 bits RSA) FS 256
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) ECDH secp256r1 (eq. 3072 bits RSA) FS 128
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (0xc012) ECDH secp256r1 (eq. 3072 bits RSA) FS 112
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028) ECDH secp256r1 (eq. 3072 bits RSA) FS 256
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) ECDH secp256r1 (eq. 3072 bits RSA) FS 256
- TLS_RSA_WITH_AES_256_CBC_SHA256 (0x3d) 256
- TLS_RSA_WITH_AES_256_CBC_SHA (0x35) 256
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027) ECDH secp256r1 (eq. 3072 bits RSA) FS 128
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) ECDH secp256r1 (eq. 3072 bits RSA) FS 128
- TLS_RSA_WITH_AES_128_CBC_SHA256 (0x3c) 128
- TLS_RSA_WITH_AES_128_CBC_SHA (0x2f) 128
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa) 112
- Handshake Simulation
- Android 2.3.7 No SNI 2 RSA 2048 (SHA256) TLS 1.0 TLS_RSA_WITH_AES_128_CBC_SHA No FS
- Android 4.0.4 RSA 2048 (SHA256) TLS 1.0 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDH secp256r1 FS
- Android 4.1.1 RSA 2048 (SHA256) TLS 1.0 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDH secp256r1 FS
- Android 4.2.2 RSA 2048 (SHA256) TLS 1.0 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDH secp256r1 FS
- Android 4.3 RSA 2048 (SHA256) TLS 1.0 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDH secp256r1 FS
- Android 4.4.2 RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
- Android 5.0.0 RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS
- Android 6.0 RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS
- Baidu Jan 2015 RSA 2048 (SHA256) TLS 1.0 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDH secp256r1 FS
- BingPreview Jan 2015 RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
- Chrome 51 / Win 7 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
- Firefox 31.3.0 ESR / Win 7 RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS
- Firefox 46 / Win 7 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS
- Firefox 47 / Win 7 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS
- Googlebot Feb 2015 RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS
- IE 6 / XP No FS 1 No SNI 2 Server sent fatal alert: handshake_failure
- IE 7 / Vista RSA 2048 (SHA256) TLS 1.0 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS
- IE 8 / XP No FS 1 No SNI 2 RSA 2048 (SHA256) TLS 1.0 TLS_RSA_WITH_3DES_EDE_CBC_SHA
- IE 8-10 / Win 7 R RSA 2048 (SHA256) TLS 1.0 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS
- IE 11 / Win 7 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS
- IE 11 / Win 8.1 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS
- IE 10 / Win Phone 8.0 RSA 2048 (SHA256) TLS 1.0 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS
- IE 11 / Win Phone 8.1 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS
- IE 11 / Win Phone 8.1 Update R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS
- IE 11 / Win 10 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
- Edge 13 / Win 10 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
- Edge 13 / Win Phone 10 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
- Java 6u45 No SNI 2 RSA 2048 (SHA256) TLS 1.0 TLS_RSA_WITH_AES_128_CBC_SHA No FS
- Java 7u25 RSA 2048 (SHA256) TLS 1.0 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDH secp256r1 FS
- Java 8u31 RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS
- OpenSSL 0.9.8y RSA 2048 (SHA256) TLS 1.0 TLS_RSA_WITH_AES_256_CBC_SHA No FS
- OpenSSL 1.0.1l R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
- OpenSSL 1.0.2e R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
- Safari 5.1.9 / OS X 10.6.8 RSA 2048 (SHA256) TLS 1.0 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDH secp256r1 FS
- Safari 6 / iOS 6.0.1 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDH secp256r1 FS
- Safari 6.0.4 / OS X 10.8.4 R RSA 2048 (SHA256) TLS 1.0 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDH secp256r1 FS
- Safari 7 / iOS 7.1 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDH secp256r1 FS
- Safari 7 / OS X 10.9 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDH secp256r1 FS
- Safari 8 / iOS 8.4 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDH secp256r1 FS
- Safari 8 / OS X 10.10 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDH secp256r1 FS
- Safari 9 / iOS 9 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
- Safari 9 / OS X 10.11 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
- Apple ATS 9 / iOS 9 R RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
- Yahoo Slurp Jan 2015 RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
- YandexBot Jan 2015 RSA 2048 (SHA256) TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
- (1) Clients that do not support Forward Secrecy (FS) are excluded when determining support for it.
- (2) No support for virtual SSL hosting (SNI). Connects to the default site if the server uses SNI.
- (3) Only first connection attempt simulated. Browsers sometimes retry with a lower protocol version.
- (R) Denotes a reference browser or client, with which we expect better effective security.
- (All) We use defaults, but some platforms do not use their best protocols and features (e.g., Java 6 & 7, older IE).
- Protocol Details
- DROWN (experimental) No, server keys and hostname not seen elsewhere with SSLv2
- (1) For a better understanding of this test, please read this longer explanation
- (2) Key usage data kindly provided by the Censys network search engine; original DROWN test here
- (3) Censys data is only indicative of possible key and certificate reuse; possibly out-of-date and not complete
- Secure Renegotiation Supported
- Secure Client-Initiated Renegotiation Yes
- Insecure Client-Initiated Renegotiation No
- BEAST attack Not mitigated server-side (more info) TLS 1.0: 0xc012
- POODLE (SSLv3) No, SSL 3 not supported (more info)
- POODLE (TLS) No (more info)
- Downgrade attack prevention Yes, TLS_FALLBACK_SCSV supported (more info)
- SSL/TLS compression No
- RC4 No
- Heartbeat (extension) No
- Heartbleed (vulnerability) No (more info)
- OpenSSL CCS vuln. (CVE-2014-0224) No (more info)
- OpenSSL Padding Oracle vuln.
- (CVE-2016-2107) No (more info)
- Forward Secrecy With modern browsers (more info)
- ALPN No
- NPN No
- Session resumption (caching) Yes
- Session resumption (tickets) No
- OCSP stapling No
- Strict Transport Security (HSTS) Yes
- max-age=31536000
- HSTS Preloading Not in: Chrome Edge Firefox IE Tor
- Public Key Pinning (HPKP) No
- Public Key Pinning Report-Only No
- Long handshake intolerance No
- TLS extension intolerance No
- TLS version intolerance No
- Incorrect SNI alerts No
- Uses common DH primes No, DHE suites not supported
- DH public server param (Ys) reuse No, DHE suites not supported
- SSL 2 handshake compatibility Yes
- Miscellaneous
- Test date Wed, 27 Jul 2016 20:29:59 UTC
- Test duration 117.219 seconds
- HTTP status code 200
- HTTP server signature Apache/2.2.15 (Red Hat)
- Server hostname www.auckland.ac.nz
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement