Choose a standard

These results have been calculated using the following standard:

Export

B
is the overall score for
clientondersteuningplus.nl

Crypto on this site is safe for legacy use, but is not up to date with the NIST standard.

Note: The overall score is calculated based on the lowest score achieved by any of the machines scanned.

Machines Scanned

B
clientondersteuningplus.nl 185.37.70.68 2022-09-29 01:35:59 UTC
You must be logged in to monitor hosts.
-
localhost.clientondersteuningplus.nl 127.0.0.1 excluded
You must be logged in to monitor hosts.
-
pop.clientondersteuningplus.nl 5.157.84.75 2022-09-29 01:35:59 UTC
You must be logged in to monitor hosts.
down arrow

Crypto Services Discovered

Below we list all of the machines detected. For each machine, we list the cryptographic services found. For each service, we give the reasons behind the grading. To see the full details of the cryptography offered by a service, click on "show details".

clientondersteuningplus.nl

IP address 185.37.70.68
Last scan 2022-09-29 01:35:59 UTC
TLS FTP (port 21)
Rules applicable 4
B
A
A!
B
C
D
F
3 0 1 0 0 0
TLS HTTP (port 443)
Rules applicable 4
B
A
A!
B
C
D
F
3 0 1 0 0 0
TLS SMTP (port 465)
Rules applicable 4
B
A
A!
B
C
D
F
3 0 1 0 0 0
TLS SMTP (port 587)
Rules applicable 4
B
A
A!
B
C
D
F
3 0 1 0 0 0

TLS (port 21 – FTP)

Show scan details
Versions TLS 1.2
Ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
Cipher order Server
Compression
  • NULL TLS 1.2
Certificate key RSA 2048-bit test this key
Hash algorithm SHA-256
Diffie-Hellman
  • Group (custom, 2048-bit): 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
  • Generator: 0x2
Certificate start date 2022-09-25 07:19:56 UTC
Certificate expiration date 2022-12-24 07:19:55 UTC
Certificate serial number 341805982373311042085963512550290363325480
Certificate issuer CN=R3,O=Let's Encrypt,C=US
Certificate subject CN=server097.yourhosting.nl
Certificate SANs
  • server097.yourhosting.nl
B
Warnings
Diffie-Hellman group size
Trigger The server uses a 2048-bit Diffie-Hellman group.
Context

Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy.

NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).

A
Passed
Certificate RSA key length
Trigger The server uses a 2048-bit RSA key.
Context

NIST recommends a length of at least 1024 bits for legacy applications, 2048 bits for near term applications and 15360 bits for long term applications (NIST SP 800-57, Part 1, Rev. 3).

Support for DES cipher
Trigger The server doesn't support any cipher suites containing the DES cipher.
Context

DES is a cipher with an effective key length of 56 bits, which is considered unsuitable by NIST even for legacy use (NIST SP 800-57, Part 1, Rev. 3).

Security of hash function for certificate signature digest
Trigger The hash used for the certificate is SHA-256.
Context

NIST considers SHA-512 as the only hash algorithm providing security for long-term use. Algorithms SHA-256 and SHA-384 are acceptable for near-term use and SHA-1 should not be used (NIST SP 800-57, Part 1, Rev. 3).

TLS (port 443 – HTTP)

Show scan details
Versions TLS 1.2
Ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
Cipher order Server
Compression
  • NULL TLS 1.2
Certificate key RSA 2048-bit test this key
Hash algorithm SHA-256
Diffie-Hellman
  • Group (custom, 2048-bit): 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
  • Generator: 0x2
Certificate start date 2022-08-17 09:19:39 UTC
Certificate expiration date 2022-11-15 09:19:38 UTC
Certificate serial number 391538175643328381921106527045337086788635
Certificate issuer CN=R3,O=Let's Encrypt,C=US
Certificate subject CN=clientondersteuningplus.nl
Certificate SANs
  • clientondersteuningplus.nl
  • www.clientondersteuningplus.nl
B
Warnings
Diffie-Hellman group size
Trigger The server uses a 2048-bit Diffie-Hellman group.
Context

Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy.

NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).

A
Passed
Certificate RSA key length
Trigger The server uses a 2048-bit RSA key.
Context

NIST recommends a length of at least 1024 bits for legacy applications, 2048 bits for near term applications and 15360 bits for long term applications (NIST SP 800-57, Part 1, Rev. 3).

Support for DES cipher
Trigger The server doesn't support any cipher suites containing the DES cipher.
Context

DES is a cipher with an effective key length of 56 bits, which is considered unsuitable by NIST even for legacy use (NIST SP 800-57, Part 1, Rev. 3).

Security of hash function for certificate signature digest
Trigger The hash used for the certificate is SHA-256.
Context

NIST considers SHA-512 as the only hash algorithm providing security for long-term use. Algorithms SHA-256 and SHA-384 are acceptable for near-term use and SHA-1 should not be used (NIST SP 800-57, Part 1, Rev. 3).

TLS (port 465 – SMTP)

Show scan details
Versions TLS 1.2
Ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
Cipher order Client
Compression
  • NULL TLS 1.2
Certificate key RSA 2048-bit test this key
Hash algorithm SHA-256
Diffie-Hellman
  • Group (custom, 2048-bit): 0xe27b2cd5c91f4abc877173aa6c5a968ae793003c2a16af4cdd7b30433409c3eabb6d8192a40cf75465d8db33de04ea22c8251f20d67fc699fc50306a887636d8e2142cde39f5b128da68a0d285c823759b8dd5c4bf7f09ed9af5e5b0ab03cd8ddfc8fe2434a28f7e7af188ef9ce3f89a457c335f99aa9234690c66461df17181ecb075fa51b9c8e713f8fbf68984191fd4f78f26d6aaacb37a6f82d3850359a4583bab20edf23923d8edafd54565d87d7be524ec743e0b412124c53d9b6ad26db1f8e390e0e0dc8a8c8642ebfee31e306c67dd7e39ef3ef12f9f3489834671029f59eeb2362231c392129a1c176c351f680ad6f9f79dd940d724b47dcaae9b63
  • Generator: 0x2
Certificate start date 2022-09-25 07:19:56 UTC
Certificate expiration date 2022-12-24 07:19:55 UTC
Certificate serial number 341805982373311042085963512550290363325480
Certificate issuer CN=R3,O=Let's Encrypt,C=US
Certificate subject CN=server097.yourhosting.nl
Certificate SANs
  • server097.yourhosting.nl
B
Warnings
Diffie-Hellman group size
Trigger The server uses a 2048-bit Diffie-Hellman group.
Context

Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy.

NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).

A
Passed
Certificate RSA key length
Trigger The server uses a 2048-bit RSA key.
Context

NIST recommends a length of at least 1024 bits for legacy applications, 2048 bits for near term applications and 15360 bits for long term applications (NIST SP 800-57, Part 1, Rev. 3).

Support for DES cipher
Trigger The server doesn't support any cipher suites containing the DES cipher.
Context

DES is a cipher with an effective key length of 56 bits, which is considered unsuitable by NIST even for legacy use (NIST SP 800-57, Part 1, Rev. 3).

Security of hash function for certificate signature digest
Trigger The hash used for the certificate is SHA-256.
Context

NIST considers SHA-512 as the only hash algorithm providing security for long-term use. Algorithms SHA-256 and SHA-384 are acceptable for near-term use and SHA-1 should not be used (NIST SP 800-57, Part 1, Rev. 3).

TLS (port 587 – SMTP)

Show scan details
Versions TLS 1.2
Ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
Cipher order Client
Compression
  • NULL TLS 1.2
Certificate key RSA 2048-bit test this key
Hash algorithm SHA-256
Diffie-Hellman
  • Group (custom, 2048-bit): 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
  • Generator: 0x2
Certificate start date 2022-09-25 07:19:56 UTC
Certificate expiration date 2022-12-24 07:19:55 UTC
Certificate serial number 341805982373311042085963512550290363325480
Certificate issuer CN=R3,O=Let's Encrypt,C=US
Certificate subject CN=server097.yourhosting.nl
Certificate SANs
  • server097.yourhosting.nl
B
Warnings
Diffie-Hellman group size
Trigger The server uses a 2048-bit Diffie-Hellman group.
Context

Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy.

NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).

A
Passed
Certificate RSA key length
Trigger The server uses a 2048-bit RSA key.
Context

NIST recommends a length of at least 1024 bits for legacy applications, 2048 bits for near term applications and 15360 bits for long term applications (NIST SP 800-57, Part 1, Rev. 3).

Support for DES cipher
Trigger The server doesn't support any cipher suites containing the DES cipher.
Context

DES is a cipher with an effective key length of 56 bits, which is considered unsuitable by NIST even for legacy use (NIST SP 800-57, Part 1, Rev. 3).

Security of hash function for certificate signature digest
Trigger The hash used for the certificate is SHA-256.
Context

NIST considers SHA-512 as the only hash algorithm providing security for long-term use. Algorithms SHA-256 and SHA-384 are acceptable for near-term use and SHA-1 should not be used (NIST SP 800-57, Part 1, Rev. 3).

localhost.clientondersteuningplus.nl

IP address 127.0.0.1
Last scan excluded

This machine is excluded.

pop.clientondersteuningplus.nl

IP address 5.157.84.75
Last scan 2022-09-29 01:35:59 UTC

No service that could be analyzed detected on this machine.