Skip to content

Instantly share code, notes, and snippets.

@bahace
Last active September 10, 2024 03:48
Show Gist options
  • Save bahace/85ef0d34d5813925c8c5d77656aa2d74 to your computer and use it in GitHub Desktop.
Save bahace/85ef0d34d5813925c8c5d77656aa2d74 to your computer and use it in GitHub Desktop.
SSL Labs logoHome Projects Qualys Free Trial Contact
You are here: Home > Projects > SSL Server Test > jellyfin.<DNS>.duckdns.org > <IP ADDRESS>
SSL Report: jellyfin.<DNS>.duckdns.org (<IP ADDRESS>)
Summary
Overall Rating
A
020406080100
Certificate
Protocol Support
Key Exchange
Cipher Strength
Visit our documentation page for more information, configuration guides, and books. Known issues are documented here.
This site works only in browsers with SNI support.
Certificate #1: EC 384 bits (SHA384withECDSA)
Server Key and Certificate #1
Subject jellyfin.<DNS>.duckdns.org
Fingerprint SHA256: 0c4b7eb806c378cb3735a92bfdc472fc4410d714e1d56298cd5fd153747a97b4
Pin SHA256: OFxrNNrlwJTKlTGIrrSk3/JzAkx97cIT8nCLqIC0d3s=
Common names jellyfin.<DNS>.duckdns.org
Alternative names jellyfin.<DNS>.duckdns.org
Serial Number 039327379930aff9f9b232ed1ebcbe870a47
Valid from Sun, 08 Sep 2024 21:16:37 UTC
Valid until Sat, 07 Dec 2024 21:16:36 UTC (expires in 2 months and 27 days)
Key EC 384 bits
Weak key (Debian) No
Issuer E6
AIA: http://e6.i.lencr.org/
Signature algorithm SHA384withECDSA
Extended Validation No
Certificate Transparency Yes (certificate)
OCSP Must Staple No
Revocation information OCSP
OCSP: http://e6.o.lencr.org
Revocation status Good (not revoked)
DNS CAA No (more info)
Trusted Yes
Mozilla Apple Android Java Windows
Additional Certificates (if supplied)
Certificates provided 2 (2068 bytes)
Chain issues None
#2
Subject E6
Fingerprint SHA256: 76e9e288aafc0e37f4390cbf946aad997d5c1c901b3ce513d3d8fadbabe2ab85
Pin SHA256: 0Bbh/jEZSKymTy3kTOhsmlHKBB32EDu1KojrP3YfV9c=
Valid until Fri, 12 Mar 2027 23:59:59 UTC (expires in 2 years and 6 months)
Key EC 384 bits
Issuer ISRG Root X1
Signature algorithm SHA256withRSA
Hide Certification PathsCertification Paths
MozillaAppleAndroidJavaWindows
Path #1: Trusted
1 Sent by server jellyfin.<DNS>.duckdns.org
Fingerprint SHA256: 0c4b7eb806c378cb3735a92bfdc472fc4410d714e1d56298cd5fd153747a97b4
Pin SHA256: OFxrNNrlwJTKlTGIrrSk3/JzAkx97cIT8nCLqIC0d3s=
EC 384 bits / SHA384withECDSA
2 Sent by server E6
Fingerprint SHA256: 76e9e288aafc0e37f4390cbf946aad997d5c1c901b3ce513d3d8fadbabe2ab85
Pin SHA256: 0Bbh/jEZSKymTy3kTOhsmlHKBB32EDu1KojrP3YfV9c=
EC 384 bits / SHA256withRSA
3 In trust store ISRG Root X1 Self-signed
Fingerprint SHA256: 96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
Pin SHA256: C5+lpZ7tcVwmwQIMcRtPbsQtWLABXhQzejna0wHFr8M=
RSA 4096 bits (e 65537) / SHA256withRSA
Configuration
Protocols
TLS 1.3 No
TLS 1.2 Yes
TLS 1.1 No
TLS 1.0 No
SSL 3 No
SSL 2 No
Cipher Suites
# TLS 1.2 (server has no preference)
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b) ECDH secp521r1 (eq. 15360 bits RSA) FS 128
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c) ECDH secp521r1 (eq. 15360 bits RSA) FS 256
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca9) ECDH secp521r1 (eq. 15360 bits RSA) FS 256
Handshake Simulation
Android 4.4.2 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS
Android 5.0.0 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp521r1 FS
Android 6.0 EC 384 (SHA384) TLS 1.2 > http/1.1 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS
Android 7.0 EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS
Android 8.0 EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS
Android 8.1 EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS
Android 9.0 EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS
BingPreview Jan 2015 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS
Chrome 49 / XP SP3 Server sent fatal alert: handshake_failure
Chrome 69 / Win 7 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS
Chrome 70 / Win 10 EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS
Chrome 80 / Win 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS
Firefox 31.3.0 ESR / Win 7 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS
Firefox 47 / Win 7 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS
Firefox 49 / XP SP3 EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS
Firefox 62 / Win 7 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS
Firefox 73 / Win 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS
Googlebot Feb 2018 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS
IE 11 / Win 7 R EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
IE 11 / Win 8.1 R EC 384 (SHA384) TLS 1.2 > http/1.1 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
IE 11 / Win Phone 8.1 R EC 384 (SHA384) TLS 1.2 > http/1.1 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS
IE 11 / Win Phone 8.1 Update R EC 384 (SHA384) TLS 1.2 > http/1.1 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
IE 11 / Win 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
Edge 15 / Win 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS
Edge 16 / Win 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS
Edge 18 / Win 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS
Edge 13 / Win Phone 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
Java 8u161 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
Java 11.0.3 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
Java 12.0.1 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
OpenSSL 1.0.1l R EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS
OpenSSL 1.0.2s R EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
OpenSSL 1.1.0k R EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS
OpenSSL 1.1.1c R EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS
Safari 6 / iOS 6.0.1 Server sent fatal alert: handshake_failure
Safari 7 / iOS 7.1 R Server sent fatal alert: handshake_failure
Safari 7 / OS X 10.9 R Server sent fatal alert: handshake_failure
Safari 8 / iOS 8.4 R Server sent fatal alert: handshake_failure
Safari 8 / OS X 10.10 R Server sent fatal alert: handshake_failure
Safari 9 / iOS 9 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
Safari 9 / OS X 10.11 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
Safari 10 / iOS 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
Safari 10 / OS X 10.12 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
Safari 12.1.2 / MacOS 10.14.6 Beta R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS
Safari 12.1.1 / iOS 12.3.1 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS
Apple ATS 9 / iOS 9 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
Yahoo Slurp Jan 2015 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp384r1 FS
YandexBot Jan 2015 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS
# Not simulated clients (Protocol mismatch)
Click here to expand
(1) Clients that do not support Forward Secrecy (FS) are excluded when determining support for it.
(2) No support for virtual SSL hosting (SNI). Connects to the default site if the server uses SNI.
(3) Only first connection attempt simulated. Browsers sometimes retry with a lower protocol version.
(R) Denotes a reference browser or client, with which we expect better effective security.
(All) We use defaults, but some platforms do not use their best protocols and features (e.g., Java 6 & 7, older IE).
(All) Certificate trust is not checked in handshake simulation, we only perform TLS handshake.
Protocol Details
Secure Renegotiation Supported
Secure Client-Initiated Renegotiation No
Insecure Client-Initiated Renegotiation No
BEAST attack Mitigated server-side (more info)
POODLE (SSLv3) No, SSL 3 not supported (more info)
POODLE (TLS) No (more info)
Zombie POODLE No (more info)
GOLDENDOODLE No (more info)
OpenSSL 0-Length No (more info)
Sleeping POODLE No (more info)
Downgrade attack prevention Unknown (requires support for at least two protocols, excl. SSL2)
SSL/TLS compression No
RC4 No
Heartbeat (extension) No
Heartbleed (vulnerability) No (more info)
Ticketbleed (vulnerability) No (more info)
OpenSSL CCS vuln. (CVE-2014-0224) No (more info)
OpenSSL Padding Oracle vuln.
(CVE-2016-2107) No (more info)
ROBOT (vulnerability) No (more info)
Forward Secrecy Yes (with most browsers) ROBUST (more info)
ALPN Yes h2 http/1.1
NPN No
Session resumption (caching) Yes
Session resumption (tickets) Yes
OCSP stapling No
Strict Transport Security (HSTS) No
HSTS Preloading Not in: Chrome Edge Firefox IE
Public Key Pinning (HPKP) No (more info)
Public Key Pinning Report-Only No
Public Key Pinning (Static) No (more info)
Long handshake intolerance No
TLS extension intolerance No
TLS version intolerance No
Incorrect SNI alerts No
Uses common DH primes No, DHE suites not supported
DH public server param (Ys) reuse No, DHE suites not supported
ECDH public server param reuse No
Supported Named Groups secp256r1, secp384r1 (Server has no preference)
SSL 2 handshake compatibility No
HTTP Requests
1 https://jellyfin.<DNS>.duckdns.org/ (HTTP/1.1 302 Found)
2 https://jellyfin.<DNS>.duckdns.org/web/ (HTTP/1.1 200 OK)
Miscellaneous
Test date Tue, 10 Sep 2024 03:41:31 UTC
Test duration 59.36 seconds
HTTP status code 200
HTTP server signature openresty
Server hostname syn-070-121-197-009.res.spectrum.com
SSL Report v2.3.0
Copyright © 2009-2024 Qualys, Inc. All Rights Reserved. Privacy Policy. Terms and Conditions
Try Qualys for free! Experience the award-winning Qualys Cloud Platform and the entire collection of Qualys Cloud Apps, including certificate security solutions.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment