Prefer cipher suites with authenticated encryption (AE) attribute.
If your application or requirements specifically call for the use of a message authentication code[135][136][137][138] that does not provide authenticated encryption[74] prefer block cipher mode of operation[82][83][84][85][86] (eg: counter with CBC-MAC[32][33][34], Galois/Counter Mode[46][47][48][49] or message authentication code[135][136][137][138] (eg: Poly1305[458][459]) that proved authenticated encryption over the ones which does not provide it.
Prefer cipher suites with greater key size of AES (eg: perfer AES-256 over AES-128).
Remove the cipher suite from the list of cipher suites supported by your server.
Always prefer cipher suites with FS property over the non-FS ones.
If your application or requirements specifically call for the use of a message authentication code[135][136][137][138] that does not provide authenticated encryption[74] prefer block cipher mode of operation[82][83][84][85][86] (eg: counter with CBC-MAC[32][33][34], Galois/Counter Mode[46][47][48][49] or message authentication code[135][136][137][138] (eg: Poly1305[458][459]) that proved authenticated encryption over the ones which does not provide it. In case of a hashed message authentication code[139][140][141][142][143][144][145] prefer message authentication code[135][136][137][138] based on Secure Hash Algorithm 2[212][213][214] over the ones based on Secure Hash Algorithm 1[202][203][204].
If your application or requirements specifically call for the use of a message authentication code[135][136][137][138] that does not provide authenticated encryption[74] prefer block cipher mode of operation[82][83][84][85][86] (eg: counter with CBC-MAC[32][33][34], Galois/Counter Mode[46][47][48][49] or message authentication code[135][136][137][138] (eg: Poly1305[458][459]) that proved authenticated encryption over the ones which does not provide it. In case of a hashed message authentication code[139][140][141][142][143][144][145] prefer message authentication code[135][136][137][138] based on Secure Hash Algorithm 2[212][213][214] over the ones based on Secure Hash Algorithm 1[202][203][204].
Remove any intermediate or backward compatible cipher suite to make possible preferring client's cipher suite order without any security consideration.
Grade | Order | Cipher suite name | Findings |
---|---|---|---|
A+
|
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
|
|
A+
|
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
|
|
A+
|
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
|
|
A+
|
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
|
|
A+
|
|
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
|
|
A+
|
|
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
|
Grade | Order | Cipher suite name | Findings |
---|---|---|---|
A+
|
|
TLS_AES_128_GCM_SHA256
|
|
A+
|
|
TLS_AES_256_GCM_SHA384
|
|
A
|
|
TLS_CHACHA20_POLY1305_SHA256
|
Add at least one elliptic curve to the list of elliptic curves supported by your server designed by independent researchers and prefer them as server configuration makes it possible.
Add at least one quantum-safe elliptic curve to the list of elliptic curves supported by your server and prefer them as server configuration makes it possible.
Add at least one elliptic curve to the list of elliptic curves supported by your server designed by independent researchers and prefer them as server configuration makes it possible.
Grade | Name | Code | Key Size | Trusted Design | Post Quantum Safe | Findings |
---|---|---|---|---|---|---|
A
|
Curve25519
|
0x001D
|
256
|
Yes
|
No
|
|
A
|
Curve448
|
0x001E
|
448
|
Yes
|
No
|
|
A
|
secp521r1
|
0x0019
|
521
|
No
|
No
|
|
A
|
secp384r1
|
0x0018
|
384
|
No
|
No
|
|
A
|
prime256v1
|
0x0017
|
256
|
No
|
No
|
Ensure that one of the values of the subject alternative names extension of the certificate provided by your server matches to the domain name. Consider the fact that old client (eg: browsers released before 2003) may not support[505] the subject alternative names extension.
Ensure the common name part of the subject field of the certificate provided by your server matches to the domain name.
Always chose certificate authority[88][89][90]s which support Online Certificate Status Protocol (OCSP)[522][523][524][525][526]. Prefer server implementations which support Online Certificate Status Protocol (OCSP) stapling[527][528][529][530][531] or use a proxy application make up for this shortcomings.
Take into consideration the advantages of a domain-validated certificate[536] (eg: completely automated certificate renewal[516][517] process, possibly short validation period[518][519][520][521]) over minor user experience improvement of an extended validation in certain client applications and the risk of a potential service outage caused by the manual certificate renewal[541][542].
Restore the certificate, provided by your server, to the latest one, if it is available and its validity period has not ended yet, or initiate renewal[516][517] process if its validity period has ended yet. If there no available certificate create a completely new one and get is signed with a certificate authority.
Always provide certificate by your server to use signature algorithms with hash functions that are strong just like SHA-2 signature algorithms.
Grade | Enabled Protocol | Findings |
---|---|---|
A+
|
TLS 1.3
|
|
A+
|
TLS 1.2
|