Ministry of ICT
Iran Information Technology Organization
Domain, IP Address & Port Number |
---|
www.didimoon.com (31.7.73.77:443) |
Assessment Time & Date |
Nov. 12, 2024, 1:44 p.m. |
Assessment Duration |
Seconds 28 |
Is the certificate still valid? | YES | |
Certificate Issue Date | 2023-11-13 14:02 | |
Certificate Expiration Date | 2024-11-12 14:02 | |
Trust Chain Health | Healthy | |
Certificate Issuer | Certum Domain Validation CA SHA2 (Unizeto Technologies S.A. from PL) | |
Is the certificate valid for www.didimoon.com? | YES | |
|
SSLv2 | Your server does not support SSLv2 which is good since it is an insecure protocol. | |
|
SSLv3 | Your server does not support SSLv3 which is good since it is an insecure protocol. | |
|
TLS1 | Your server does not support TLS v1.0. | |
|
TLS1.1 | Your server does not support TLSv1.1. In presence of stronger protocols (i.e. TLS v1.2 and TLS v1.3), this would be considered a good configuration. | |
|
TLS1.2 | Your server supports TLSv1.2. Currently, this protocol is considered stable. But you'd better consider supporting TLS v1.3. | |
|
TLS1.3 | Your server supports TLS v1.3. Currently, this protocol is considered the most robust protocol available. | |
|
NULL | Your server does not support NULL ciphers. | |
|
aNULL | Your server does not support aNULL ciphers. | |
|
EXPORT | Your server does not support EXPORT ciphers. | |
|
LOW | Your server does not support LOW ciphers. | |
|
3DES_IDEA | Your server does not support 3DES ciphers. | |
|
AVERAGE | Your server does not support AVERAGE ciphers. | |
|
Strong | Your server support strong ciphers. | |
|
PFS Overview | Your server supports Perfect Forward Secrecy (PFS) | |
|
Ciphers that support PFS. | List of ciphers that support perfect forward secrecy (PFS). | ||
|
Analysis of ECDH Curves | Your server uses strong ECDHE keys for key exchange. | |
|
Analysis of the strength of Diffie-Hellman Keys | Your server uses strong Diffie-Hellman keys for key exchange. | |
|
Analyzing Heartbleed Vulnerability | Your connection is immune against heartbleed attack. | |
|
Analyzing CCS Vulnerability | Your connection is immune against CCS attack. | |
|
Analyzing Ticketbleed Vulnerability | An error occurred during this test. please report this problem. | ||
|
Analyzing ROBOT vulnerability | Your connection is immune to ROBOT attack. | |
|
Analyzing Secure Renegotiation | Your connection is immune against secure_renego attack. | ||
|
Analyzing Client-initiated Secure Connection | Your server is properly configured to support Secure Client Renegotiation. | |
|
Analyzing protection against CRIME Attack | Your connection is immune against CRIME_TLS attack. | |
|
Analyzing protection against poodle attacks | Your connection is immune against poodle_ssl attack. | |
|
Analyzing fallback_SCSV vulnerability | Your connection is immune against fallback_SCSV attack. | |
|
Analyzing SWEET32 Attack | Your connection is immune against SWEET32 attack. | |
|
Analyzing Protection Against Freak Attack | Your connection is immune against FREAK attack. | |
|
Analyzing protection against DROWN Attacks. | Your connection is immune against DROWN attack. | |
|
Analyzing existence of common primes in public/private encryption key pairs. | Your connection is vulnerable to LOGJAM-Common_Primes attack. | |
|
Analyzing protection against LOGJAM Attack | Your connection is immune against LOGJAM attack. | |
|
Analyzing BEAST vulnerability | Your connection is immune to BEAST attack. | |
|
Analyzing luck13 vulnerability | Your connection is immune to LUCKY13 attack. | |
|
Analyzing RC4 vulnerability | Your connection is immune against RC4 attack. | |
|
TLS1.2 | ||||||
|
TLS1.3 | |||
|
Client | Cipher Suite | Protocol |
---|---|---|
ANDROID-442 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | ANDROID-500 | TLSv1.2 | ECDHE-RSA-AES128-GCM-SHA256 | ANDROID-60 | TLSv1.2 | ECDHE-RSA-AES128-GCM-SHA256 | ANDROID-70 | TLSv1.2 | ECDHE-RSA-CHACHA20-POLY1305 | ANDROID-81 | TLSv1.2 | ECDHE-RSA-AES128-GCM-SHA256 | ANDROID-90 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | ANDROID-X | TLSv1.3 | TLS_AES_128_GCM_SHA256 | CHROME-74-WIN10 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | CHROME-79-WIN10 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | FIREFOX-66-WIN81 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | FIREFOX-71-WIN10 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | IE-6-XP | N/A | No Connection | IE-8-WIN7 | N/A | No Connection | IE-8-XP | N/A | No Connection | IE-11-WIN7 | TLSv1.2 | DHE-RSA-AES256-GCM-SHA384 | IE-11-WIN81 | TLSv1.2 | DHE-RSA-AES256-GCM-SHA384 | IE-11-WINPHONE81 | N/A | No Connection | IE-11-WIN10 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | EDGE-15-WIN10 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | EDGE-17-WIN10 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | OPERA-66-WIN10 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | SAFARI-9-IOS9 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | SAFARI-9-OSX1011 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | SAFARI-10-OSX1012 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | SAFARI-121-IOS-122 | TLSv1.3 | TLS_CHACHA20_POLY1305_SHA256 | SAFARI-130-OSX-10146 | TLSv1.3 | TLS_CHACHA20_POLY1305_SHA256 | APPLE-ATS-9-IOS9 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | JAVA-6U45 | N/A | No Connection | JAVA-7U25 | N/A | No Connection | JAVA-8U161 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | JAVA1102 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | JAVA1201 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | OPENSSL-102E | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | OPENSSL-110L | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | OPENSSL-111D | TLSv1.3 | TLS_AES_256_GCM_SHA384 | THUNDERBIRD-68-3-1 | TLSv1.3 | TLS_AES_128_GCM_SHA256 |
|