Ministry of ICT
Iran Information Technology Organization
| Domain, IP Address & Port Number |
|---|
| webapp.irimo.ir (185.212.51.210:443) |
| Assessment Time & Date |
| Oct. 6, 2025, 9:55 a.m. |
| Assessment Duration |
| Seconds 44 |
| Is the certificate still valid? | NO | |
| Certificate Issue Date | 2024-06-09 19:13 | |
| Certificate Expiration Date | 2034-06-07 19:13 | |
| Trust Chain Health | Incomplete Chain! | |
| Certificate Issuer | localhost (CentOS Web Panel from HR) | |
| Is the certificate valid for webapp.irimo.ir? | NO | |
|
||
| HTTP Status Code | 200 OK ('/') |
| Strict Transport Security (HSTS) | not offered |
| Public Key Pinning (HPKP) | No support for HTTP Public Key Pinning |
| Server Banner | Apache/2.4.62 (Unix) OpenSSL/1.1.1k |
| Banner Application | No application banner found |
| SSLv2 | Your server does not support SSLv2 which is good since it is an insecure protocol. | |
|
||
| SSLv3 | Your server does not support SSLv3 which is good since it is an insecure protocol. | |
|
||
| TLS1 | Your server does not support TLS v1.0. | |
|
||
| TLS1.1 | Your server does not support TLSv1.1. In presence of stronger protocols (i.e. TLS v1.2 and TLS v1.3), this would be considered a good configuration. | |
|
||
| TLS1.2 | Your server supports TLSv1.2. Currently, this protocol is considered stable. But you'd better consider supporting TLS v1.3. | |
|
||
| TLS1.3 | Your server supports TLS v1.3. Currently, this protocol is considered the most robust protocol available. | |
|
||
| NULL | Your server does not support NULL ciphers. | |
|
||
| aNULL | Your server does not support aNULL ciphers. | |
|
||
| EXPORT | Your server does not support EXPORT ciphers. | |
|
||
| LOW | Your server does not support LOW ciphers. | |
|
||
| 3DES_IDEA | Your server does not support 3DES ciphers. | |
|
||
| AVERAGE | Your server does not support AVERAGE ciphers. | |
|
||
| Strong | Your server support strong ciphers. | |
|
||
| PFS Overview | Your server supports Perfect Forward Secrecy (PFS) | |
|
||
| Ciphers that support PFS. | List of ciphers that support perfect forward secrecy (PFS). | ||
|
|||
| Analysis of ECDH Curves | Your server uses strong ECDHE keys for key exchange. | |
|
||
| Analyzing Heartbleed Vulnerability | Your connection is immune against heartbleed attack. | |
|
||
| Analyzing CCS Vulnerability | Your connection is immune against CCS attack. | |
|
||
| Analyzing Ticketbleed Vulnerability | Your connection is immune against ticketbleed attack. | |
|
||
| Analyzing ROBOT vulnerability | Your connection is immune to ROBOT attack. | |
|
||
| Analyzing Secure Renegotiation | Your connection is immune against secure_renego attack. | ||
|
|||
| Analyzing Client-initiated Secure Connection | Your server is properly configured to support Secure Client Renegotiation. | |
|
||
| Analyzing protection against CRIME Attack | Your connection is immune against CRIME_TLS attack. | |
|
||
| Analyzing protection against poodle attacks | Your connection is immune against poodle_ssl attack. | |
|
||
| Analyzing fallback_SCSV vulnerability | Your connection is immune against fallback_SCSV attack. | |
|
||
| Analyzing SWEET32 Attack | Your connection is immune against SWEET32 attack. | |
|
||
| Analyzing Protection Against Freak Attack | Your connection is immune against FREAK attack. | |
|
||
| Analyzing protection against DROWN Attacks. | Your connection is immune against DROWN attack. | |
|
||
| Analyzing protection against LOGJAM Attack | Your connection is immune against LOGJAM attack. | |
|
||
| Analyzing existence of common primes in public/private encryption key pairs. | Your connection is immune to LOGJAM-Common_Primes attack. | |
|
||
| Analyzing BEAST vulnerability | Your connection is immune to BEAST attack. | |
|
||
| Analyzing luck13 vulnerability | Your connection is vulnerable to LUCKY13 attack. | ||
|
|||
| Analyzing RC4 vulnerability | Your connection is immune against RC4 attack. | |
|
||
| TLSv1.2 | |||||||||||
|
| TLSv1.3 | ||||
|
| Client | Cipher Suite | Protocol |
|---|---|---|
| ANDROID-442 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | ANDROID-500 | TLSv1.2 | ECDHE-RSA-AES128-GCM-SHA256 | ANDROID-60 | TLSv1.2 | ECDHE-RSA-AES128-GCM-SHA256 | ANDROID-70 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | ANDROID-81 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | ANDROID-90 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | ANDROID-X | TLSv1.3 | TLS_AES_256_GCM_SHA384 | CHROME-74-WIN10 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | CHROME-79-WIN10 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | FIREFOX-66-WIN81 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | FIREFOX-71-WIN10 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | IE-6-XP | N/A | No Connection | IE-8-WIN7 | N/A | No Connection | IE-8-XP | N/A | No Connection | IE-11-WIN7 | TLSv1.2 | ECDHE-RSA-AES256-SHA384 | IE-11-WIN81 | TLSv1.2 | ECDHE-RSA-AES256-SHA384 | IE-11-WINPHONE81 | TLSv1.2 | ECDHE-RSA-AES128-SHA256 | IE-11-WIN10 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | EDGE-15-WIN10 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | EDGE-17-WIN10 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | OPERA-66-WIN10 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | SAFARI-9-IOS9 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | SAFARI-9-OSX1011 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | SAFARI-10-OSX1012 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | SAFARI-121-IOS-122 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | SAFARI-130-OSX-10146 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | APPLE-ATS-9-IOS9 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | JAVA-6U45 | N/A | No Connection | JAVA-7U25 | N/A | No Connection | JAVA-8U161 | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | JAVA1102 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | JAVA1201 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | OPENSSL-102E | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | OPENSSL-110L | TLSv1.2 | ECDHE-RSA-AES256-GCM-SHA384 | OPENSSL-111D | TLSv1.3 | TLS_AES_256_GCM_SHA384 | THUNDERBIRD-68-3-1 | TLSv1.3 | TLS_AES_256_GCM_SHA384 |
|
|
||