C
weak
Protocol
https
Domain
websec.nu
Checked IP
45.148.17.47
Check Time
2025-08-28T20:46:59+02:00
Cache Time
2025-08-28T10:57:32+00:00

Protocol HTTPS (TLS)

Transport Layer Security (TLS) is a secure data transfer protocol that creates secure communication to leverage higher privacy. Widely used on the Internet, it is the successor of the ancient SSL. Several versions of the protocol are used in applications and services, TLS 1.3 is the most recent, but TLS 1.2 is very common too. Many protocols rely on TLS, for instance, the HTTPS (Hypertext Transfer Protocol Secure) is a security layer over the unencrypted HTTP, but several e-mail protocols (eg: IMAPS, SMTPS, POP3S) use as well to get a secure connection.
Cipher suites
A-
Highlighted findings
A-
Good TLS Cipher Suite Preference (server cipher suites are preferred unnecessarily)
Each cipher suite[189][190] supported by the server is considered secure, however it prefers its own cipher suite preference order client cipher suite preference order, which prevents the clients to choose their most preferred cipher suite, which may give them better performance (eg: ChaCha20/Poly1305 ChaCha20-Poly1305[328][329][330]) on mobile devices under the same conditions of security.
Set preference of client cipher suite order.
Checked facts
Detailed info
Key exchange
A
Highlighted findings
Congratulations! We could not find any potential issues regarding your server configuration.
Checked facts
Detailed info
Public keys
C
Highlighted findings
C
Weak Public Key Revocation Check (OCSP stapling not supported)
Server does not support revocation check mechanism Online Certificate Status Protocol (OCSP) stapling[527][528][529][530][531]. Revocation check mechanisms of X.509 public key[493][494][495][496][497] certificates have many flaws [518][519][520][521] and now, the only practically working and used vendor independent mechanisms is OCSP stapling.Without using a certificate revocation check mechanism a client applications (eg: browser, email client, ...), cannot determine whether X.509 public key the server provides still valid or it has already been revoked by the issuer of the certificate. Without this information it cannot be reliably proved that message caomes from the stated sender (its authenticity) or it has been changed, so connections could be open for a man-in-the-middle attack[61].
Always chose certificate authority[88][89][90]s which support Online Certificate Status Protocol (OCSP)[522][523][524][525][526]. Prefer server implementations which support Online Certificate Status Protocol (OCSP) stapling[527][528][529][530][531] or use a proxy application make up for this shortcomings.
Checked facts
Detailed info
Versions
A+
Highlighted findings
Congratulations! We could not find any potential issues regarding your server configuration.
Checked facts
Detailed info