Last active
September 10, 2024 03:48
-
-
Save bahace/85ef0d34d5813925c8c5d77656aa2d74 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
SSL Labs logoHome Projects Qualys Free Trial Contact | |
You are here: Home > Projects > SSL Server Test > jellyfin.<DNS>.duckdns.org > <IP ADDRESS> | |
SSL Report: jellyfin.<DNS>.duckdns.org (<IP ADDRESS>) | |
Summary | |
Overall Rating | |
A | |
020406080100 | |
Certificate | |
Protocol Support | |
Key Exchange | |
Cipher Strength | |
Visit our documentation page for more information, configuration guides, and books. Known issues are documented here. | |
This site works only in browsers with SNI support. | |
Certificate #1: EC 384 bits (SHA384withECDSA) | |
Server Key and Certificate #1 | |
Subject jellyfin.<DNS>.duckdns.org | |
Fingerprint SHA256: 0c4b7eb806c378cb3735a92bfdc472fc4410d714e1d56298cd5fd153747a97b4 | |
Pin SHA256: OFxrNNrlwJTKlTGIrrSk3/JzAkx97cIT8nCLqIC0d3s= | |
Common names jellyfin.<DNS>.duckdns.org | |
Alternative names jellyfin.<DNS>.duckdns.org | |
Serial Number 039327379930aff9f9b232ed1ebcbe870a47 | |
Valid from Sun, 08 Sep 2024 21:16:37 UTC | |
Valid until Sat, 07 Dec 2024 21:16:36 UTC (expires in 2 months and 27 days) | |
Key EC 384 bits | |
Weak key (Debian) No | |
Issuer E6 | |
AIA: http://e6.i.lencr.org/ | |
Signature algorithm SHA384withECDSA | |
Extended Validation No | |
Certificate Transparency Yes (certificate) | |
OCSP Must Staple No | |
Revocation information OCSP | |
OCSP: http://e6.o.lencr.org | |
Revocation status Good (not revoked) | |
DNS CAA No (more info) | |
Trusted Yes | |
Mozilla Apple Android Java Windows | |
Additional Certificates (if supplied) | |
Certificates provided 2 (2068 bytes) | |
Chain issues None | |
#2 | |
Subject E6 | |
Fingerprint SHA256: 76e9e288aafc0e37f4390cbf946aad997d5c1c901b3ce513d3d8fadbabe2ab85 | |
Pin SHA256: 0Bbh/jEZSKymTy3kTOhsmlHKBB32EDu1KojrP3YfV9c= | |
Valid until Fri, 12 Mar 2027 23:59:59 UTC (expires in 2 years and 6 months) | |
Key EC 384 bits | |
Issuer ISRG Root X1 | |
Signature algorithm SHA256withRSA | |
Hide Certification PathsCertification Paths | |
MozillaAppleAndroidJavaWindows | |
Path #1: Trusted | |
1 Sent by server jellyfin.<DNS>.duckdns.org | |
Fingerprint SHA256: 0c4b7eb806c378cb3735a92bfdc472fc4410d714e1d56298cd5fd153747a97b4 | |
Pin SHA256: OFxrNNrlwJTKlTGIrrSk3/JzAkx97cIT8nCLqIC0d3s= | |
EC 384 bits / SHA384withECDSA | |
2 Sent by server E6 | |
Fingerprint SHA256: 76e9e288aafc0e37f4390cbf946aad997d5c1c901b3ce513d3d8fadbabe2ab85 | |
Pin SHA256: 0Bbh/jEZSKymTy3kTOhsmlHKBB32EDu1KojrP3YfV9c= | |
EC 384 bits / SHA256withRSA | |
3 In trust store ISRG Root X1 Self-signed | |
Fingerprint SHA256: 96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6 | |
Pin SHA256: C5+lpZ7tcVwmwQIMcRtPbsQtWLABXhQzejna0wHFr8M= | |
RSA 4096 bits (e 65537) / SHA256withRSA | |
Configuration | |
Protocols | |
TLS 1.3 No | |
TLS 1.2 Yes | |
TLS 1.1 No | |
TLS 1.0 No | |
SSL 3 No | |
SSL 2 No | |
Cipher Suites | |
# TLS 1.2 (server has no preference) | |
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b) ECDH secp521r1 (eq. 15360 bits RSA) FS 128 | |
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c) ECDH secp521r1 (eq. 15360 bits RSA) FS 256 | |
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca9) ECDH secp521r1 (eq. 15360 bits RSA) FS 256 | |
Handshake Simulation | |
Android 4.4.2 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS | |
Android 5.0.0 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp521r1 FS | |
Android 6.0 EC 384 (SHA384) TLS 1.2 > http/1.1 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS | |
Android 7.0 EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS | |
Android 8.0 EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS | |
Android 8.1 EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS | |
Android 9.0 EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS | |
BingPreview Jan 2015 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS | |
Chrome 49 / XP SP3 Server sent fatal alert: handshake_failure | |
Chrome 69 / Win 7 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS | |
Chrome 70 / Win 10 EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS | |
Chrome 80 / Win 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS | |
Firefox 31.3.0 ESR / Win 7 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS | |
Firefox 47 / Win 7 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS | |
Firefox 49 / XP SP3 EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS | |
Firefox 62 / Win 7 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS | |
Firefox 73 / Win 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS | |
Googlebot Feb 2018 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS | |
IE 11 / Win 7 R EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
IE 11 / Win 8.1 R EC 384 (SHA384) TLS 1.2 > http/1.1 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
IE 11 / Win Phone 8.1 R EC 384 (SHA384) TLS 1.2 > http/1.1 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS | |
IE 11 / Win Phone 8.1 Update R EC 384 (SHA384) TLS 1.2 > http/1.1 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
IE 11 / Win 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
Edge 15 / Win 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS | |
Edge 16 / Win 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS | |
Edge 18 / Win 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS | |
Edge 13 / Win Phone 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
Java 8u161 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
Java 11.0.3 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
Java 12.0.1 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
OpenSSL 1.0.1l R EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS | |
OpenSSL 1.0.2s R EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
OpenSSL 1.1.0k R EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS | |
OpenSSL 1.1.1c R EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS | |
Safari 6 / iOS 6.0.1 Server sent fatal alert: handshake_failure | |
Safari 7 / iOS 7.1 R Server sent fatal alert: handshake_failure | |
Safari 7 / OS X 10.9 R Server sent fatal alert: handshake_failure | |
Safari 8 / iOS 8.4 R Server sent fatal alert: handshake_failure | |
Safari 8 / OS X 10.10 R Server sent fatal alert: handshake_failure | |
Safari 9 / iOS 9 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
Safari 9 / OS X 10.11 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
Safari 10 / iOS 10 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
Safari 10 / OS X 10.12 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
Safari 12.1.2 / MacOS 10.14.6 Beta R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS | |
Safari 12.1.1 / iOS 12.3.1 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS | |
Apple ATS 9 / iOS 9 R EC 384 (SHA384) TLS 1.2 > h2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS | |
Yahoo Slurp Jan 2015 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp384r1 FS | |
YandexBot Jan 2015 EC 384 (SHA384) TLS 1.2 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS | |
# Not simulated clients (Protocol mismatch) | |
Click here to expand | |
(1) Clients that do not support Forward Secrecy (FS) are excluded when determining support for it. | |
(2) No support for virtual SSL hosting (SNI). Connects to the default site if the server uses SNI. | |
(3) Only first connection attempt simulated. Browsers sometimes retry with a lower protocol version. | |
(R) Denotes a reference browser or client, with which we expect better effective security. | |
(All) We use defaults, but some platforms do not use their best protocols and features (e.g., Java 6 & 7, older IE). | |
(All) Certificate trust is not checked in handshake simulation, we only perform TLS handshake. | |
Protocol Details | |
Secure Renegotiation Supported | |
Secure Client-Initiated Renegotiation No | |
Insecure Client-Initiated Renegotiation No | |
BEAST attack Mitigated server-side (more info) | |
POODLE (SSLv3) No, SSL 3 not supported (more info) | |
POODLE (TLS) No (more info) | |
Zombie POODLE No (more info) | |
GOLDENDOODLE No (more info) | |
OpenSSL 0-Length No (more info) | |
Sleeping POODLE No (more info) | |
Downgrade attack prevention Unknown (requires support for at least two protocols, excl. SSL2) | |
SSL/TLS compression No | |
RC4 No | |
Heartbeat (extension) No | |
Heartbleed (vulnerability) No (more info) | |
Ticketbleed (vulnerability) No (more info) | |
OpenSSL CCS vuln. (CVE-2014-0224) No (more info) | |
OpenSSL Padding Oracle vuln. | |
(CVE-2016-2107) No (more info) | |
ROBOT (vulnerability) No (more info) | |
Forward Secrecy Yes (with most browsers) ROBUST (more info) | |
ALPN Yes h2 http/1.1 | |
NPN No | |
Session resumption (caching) Yes | |
Session resumption (tickets) Yes | |
OCSP stapling No | |
Strict Transport Security (HSTS) No | |
HSTS Preloading Not in: Chrome Edge Firefox IE | |
Public Key Pinning (HPKP) No (more info) | |
Public Key Pinning Report-Only No | |
Public Key Pinning (Static) No (more info) | |
Long handshake intolerance No | |
TLS extension intolerance No | |
TLS version intolerance No | |
Incorrect SNI alerts No | |
Uses common DH primes No, DHE suites not supported | |
DH public server param (Ys) reuse No, DHE suites not supported | |
ECDH public server param reuse No | |
Supported Named Groups secp256r1, secp384r1 (Server has no preference) | |
SSL 2 handshake compatibility No | |
HTTP Requests | |
1 https://jellyfin.<DNS>.duckdns.org/ (HTTP/1.1 302 Found) | |
2 https://jellyfin.<DNS>.duckdns.org/web/ (HTTP/1.1 200 OK) | |
Miscellaneous | |
Test date Tue, 10 Sep 2024 03:41:31 UTC | |
Test duration 59.36 seconds | |
HTTP status code 200 | |
HTTP server signature openresty | |
Server hostname syn-070-121-197-009.res.spectrum.com | |
SSL Report v2.3.0 | |
Copyright © 2009-2024 Qualys, Inc. All Rights Reserved. Privacy Policy. Terms and Conditions | |
Try Qualys for free! Experience the award-winning Qualys Cloud Platform and the entire collection of Qualys Cloud Apps, including certificate security solutions. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment