Ministry of ICT
Iran Information Technology Organization
| Domain, IP Address & Port Number |
|---|
| sarinamed.org (195.28.168.74:443) |
| Assessment Time & Date |
| Jan. 2, 2026, 9:23 p.m. |
| Assessment Duration |
| Seconds 40 |
| Is the certificate still valid? | NO | |
| Certificate Issue Date | no | |
| Certificate Expiration Date | 43 >= 30 days | |
| Trust Chain Health | Healthy | |
| Certificate Issuer | E8 (Let's Encrypt from US) | |
| Is the certificate valid for sarinamed.org? | NO | |
|
||
| HTTP Status Code | 403 Forbidden ('/') |
| Strict Transport Security (HSTS) | 1767376403 |
| Public Key Pinning (HPKP) | not offered |
| Server Banner | No support for HTTP Public Key Pinning |
| Banner Application | nginx |
| SSLv2 | Your server does not support SSLv2 which is good since it is an insecure protocol. | |
|
||
| SSLv3 | Your server does not support SSLv3 which is good since it is an insecure protocol. | |
|
||
| TLS1 | Your server does not support TLS v1.0. | |
|
||
| TLS1.1 | Your server does not support TLSv1.1. In presence of stronger protocols (i.e. TLS v1.2 and TLS v1.3), this would be considered a good configuration. | |
|
||
| TLS1.2 | Your server supports TLSv1.2. Currently, this protocol is considered stable. But you'd better consider supporting TLS v1.3. | |
|
||
| TLS1.3 | Your server supports TLS v1.3. Currently, this protocol is considered the most robust protocol available. | |
|
||
| NULL | Your server does not support NULL ciphers. | |
|
||
| aNULL | Your server does not support aNULL ciphers. | |
|
||
| EXPORT | Your server does not support EXPORT ciphers. | |
|
||
| LOW | Your server does not support LOW ciphers. | |
|
||
| 3DES_IDEA | Your server does not support 3DES ciphers. | |
|
||
| Analysis of the strength of Diffie-Hellman Keys | Your server uses strong Diffie-Hellman keys for key exchange. | |
|
||
| Analyzing Heartbleed Vulnerability | Your connection is immune against heartbleed attack. | |
|
||
| Analyzing CCS Vulnerability | Your connection is immune against CCS attack. | |
|
||
| Analyzing Ticketbleed Vulnerability | Your connection is immune against ticketbleed attack. | |
|
||
| Analyzing ROBOT vulnerability | Your connection is immune to ROBOT attack. | |
|
||
| Analyzing Secure Renegotiation | Your connection is immune against secure_renego attack. | ||
|
|||
| Analyzing Client-initiated Secure Connection | Your server is properly configured to support Secure Client Renegotiation. | |
|
||
| Analyzing protection against CRIME Attack | Your connection is immune against CRIME_TLS attack. | |
|
||
| Analyzing protection against poodle attacks | Your connection is immune against poodle_ssl attack. | |
|
||
| Analyzing fallback_SCSV vulnerability | Your connection is immune against fallback_SCSV attack. | |
|
||
| Analyzing SWEET32 Attack | Your connection is immune against SWEET32 attack. | |
|
||
| Analyzing Protection Against Freak Attack | Your connection is immune against FREAK attack. | |
|
||
| Analyzing protection against DROWN Attacks. | Your connection is immune against DROWN attack. | |
|
||
| Analyzing protection against LOGJAM Attack | Your connection is immune against LOGJAM attack. | |
|
||
| Analyzing existence of common primes in public/private encryption key pairs. | Your connection is immune to LOGJAM-Common_Primes attack. | |
|
||
| Analyzing BEAST vulnerability | Your connection is immune to BEAST attack. | |
|
||
| Analyzing luck13 vulnerability | Your connection is immune to LUCKY13 attack. | |
|
||
| Analyzing RC4 vulnerability | Your connection is immune against RC4 attack. | |
|
||
| TLS1.2 |
|
|
| TLS1.3 |
|
|
| Client | Cipher Suite | Protocol |
|---|---|---|
| ANDROID-70 | N/A | No Connection | ANDROID-81 | TLSv1.2 | ECDHE-ECDSA-AES128-GCM-SHA256 | ANDROID-90 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | ANDROID-X | TLSv1.3 | TLS_AES_128_GCM_SHA256 | ANDROID-11-12 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | ANDROID-13-14 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | ANDROID-15 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | CHROME-101-WIN10 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | CHROMIUM-137-WIN11 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | FIREFOX-100-WIN10 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | FIREFOX-137-WIN11 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | IE-8-WIN7 | N/A | No Connection | IE-11-WIN7 | TLSv1.2 | ECDHE-ECDSA-AES256-GCM-SHA384 | IE-11-WIN81 | TLSv1.2 | ECDHE-ECDSA-AES256-GCM-SHA384 | IE-11-WINPHONE81 | TLSv1.2 | ECDHE-ECDSA-AES128-GCM-SHA256 | IE-11-WIN10 | TLSv1.2 | ECDHE-ECDSA-AES256-GCM-SHA384 | EDGE-15-WIN10 | TLSv1.2 | ECDHE-ECDSA-AES256-GCM-SHA384 | EDGE-101-WIN10-21H2 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | EDGE-133-WIN11-23H2 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | SAFARI-184-IOS-184 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | SAFARI-154-OSX-1231 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | SAFARI-184-OSX-154 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | JAVA-7U25 | N/A | No Connection | JAVA-80442 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | JAVA-1102 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | JAVA-1703 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | JAVA-2106 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | GO-1178 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | LIBRESSL-336 | TLSv1.3 | TLS_CHACHA20_POLY1305_SHA256 | OPENSSL-102E | TLSv1.2 | ECDHE-ECDSA-AES256-GCM-SHA384 | OPENSSL-111D | TLSv1.3 | TLS_AES_256_GCM_SHA384 | OPENSSL-315 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | OPENSSL-350 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | APPLE-MAIL-16-0 | TLSv1.2 | ECDHE-ECDSA-AES256-GCM-SHA384 | THUNDERBIRD-91-9 | TLSv1.3 | TLS_AES_128_GCM_SHA256 |
|
|
||