Crypto on this site is safe for legacy use, but is not up to date with the NIST standard.
Note: The overall score is calculated based on the lowest score achieved by any of the machines scanned.
B
|
clientondersteuningplus.nl | 185.37.70.68 | 2024-04-25 07:58:27 UTC | ||
-
|
localhost.clientondersteuningplus.nl | 127.0.0.1 | excluded | ||
-
|
pop.clientondersteuningplus.nl | 5.157.84.75 | 2024-04-25 07:58:27 UTC |
Below we list all of the machines detected. For each machine, we list the cryptographic services found. For each service, we give the reasons behind the grading. To see the full details of the cryptography offered by a service, click on "show details".
IP address | 185.37.70.68 |
---|---|
Last scan | 2024-04-25 07:58:27 UTC |
Versions | TLS 1.2 |
---|---|
Ciphers |
|
Cipher order | Server |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2024-03-18 08:19:18 UTC |
Certificate expiration date | 2024-06-16 08:19:17 UTC |
Certificate serial number | 329490661022516498043036547854503392761526 |
Certificate issuer | CN=R3,O=Let's Encrypt,C=US |
Certificate subject | CN=server097.yourhosting.nl |
Certificate SANs |
|
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
Trigger | The server uses a 2048-bit RSA key. |
---|---|
Context |
NIST recommends a length of at least 1024 bits for legacy applications, 2048 bits for near term applications and 15360 bits for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
Trigger | The server doesn't support any cipher suites containing the DES cipher. |
---|---|
Context |
DES is a cipher with an effective key length of 56 bits, which is considered unsuitable by NIST even for legacy use (NIST SP 800-57, Part 1, Rev. 3). |
Trigger | The hash used for the certificate is SHA-256. |
---|---|
Context |
NIST considers SHA-512 as the only hash algorithm providing security for long-term use. Algorithms SHA-256 and SHA-384 are acceptable for near-term use and SHA-1 should not be used (NIST SP 800-57, Part 1, Rev. 3). |
Versions | TLS 1.2 |
---|---|
Ciphers |
|
Cipher order | Server |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2023-08-12 08:20:05 UTC |
Certificate expiration date | 2023-11-10 08:20:04 UTC |
Certificate serial number | 422911942242554335527633784046993075147667 |
Certificate issuer | CN=R3,O=Let's Encrypt,C=US |
Certificate subject | CN=clientondersteuningplus.nl |
Certificate SANs |
|
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
Trigger | The server uses a 2048-bit RSA key. |
---|---|
Context |
NIST recommends a length of at least 1024 bits for legacy applications, 2048 bits for near term applications and 15360 bits for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
Trigger | The server doesn't support any cipher suites containing the DES cipher. |
---|---|
Context |
DES is a cipher with an effective key length of 56 bits, which is considered unsuitable by NIST even for legacy use (NIST SP 800-57, Part 1, Rev. 3). |
Trigger | The hash used for the certificate is SHA-256. |
---|---|
Context |
NIST considers SHA-512 as the only hash algorithm providing security for long-term use. Algorithms SHA-256 and SHA-384 are acceptable for near-term use and SHA-1 should not be used (NIST SP 800-57, Part 1, Rev. 3). |
Versions | TLS 1.2 |
---|---|
Ciphers |
|
Cipher order | Client |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2024-03-18 08:19:18 UTC |
Certificate expiration date | 2024-06-16 08:19:17 UTC |
Certificate serial number | 329490661022516498043036547854503392761526 |
Certificate issuer | CN=R3,O=Let's Encrypt,C=US |
Certificate subject | CN=server097.yourhosting.nl |
Certificate SANs |
|
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
Trigger | The server uses a 2048-bit RSA key. |
---|---|
Context |
NIST recommends a length of at least 1024 bits for legacy applications, 2048 bits for near term applications and 15360 bits for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
Trigger | The server doesn't support any cipher suites containing the DES cipher. |
---|---|
Context |
DES is a cipher with an effective key length of 56 bits, which is considered unsuitable by NIST even for legacy use (NIST SP 800-57, Part 1, Rev. 3). |
Trigger | The hash used for the certificate is SHA-256. |
---|---|
Context |
NIST considers SHA-512 as the only hash algorithm providing security for long-term use. Algorithms SHA-256 and SHA-384 are acceptable for near-term use and SHA-1 should not be used (NIST SP 800-57, Part 1, Rev. 3). |
Versions | TLS 1.2 |
---|---|
Ciphers |
|
Cipher order | Client |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2024-03-18 08:19:18 UTC |
Certificate expiration date | 2024-06-16 08:19:17 UTC |
Certificate serial number | 329490661022516498043036547854503392761526 |
Certificate issuer | CN=R3,O=Let's Encrypt,C=US |
Certificate subject | CN=server097.yourhosting.nl |
Certificate SANs |
|
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
Trigger | The server uses a 2048-bit RSA key. |
---|---|
Context |
NIST recommends a length of at least 1024 bits for legacy applications, 2048 bits for near term applications and 15360 bits for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
Trigger | The server doesn't support any cipher suites containing the DES cipher. |
---|---|
Context |
DES is a cipher with an effective key length of 56 bits, which is considered unsuitable by NIST even for legacy use (NIST SP 800-57, Part 1, Rev. 3). |
Trigger | The hash used for the certificate is SHA-256. |
---|---|
Context |
NIST considers SHA-512 as the only hash algorithm providing security for long-term use. Algorithms SHA-256 and SHA-384 are acceptable for near-term use and SHA-1 should not be used (NIST SP 800-57, Part 1, Rev. 3). |
IP address | 127.0.0.1 |
---|---|
Last scan | excluded |
This machine is excluded.
IP address | 5.157.84.75 |
---|---|
Last scan | 2024-04-25 07:58:27 UTC |
No service that could be analyzed detected on this machine.