Report for clientondersteuningplus.nl produced at 2023-03-24 10:18:09 UTC using the NIST standard.
For more information on coverage, go to discovery.cryptosense.com/faq. If you have any suggestions for improving this report, please send us an email at discovery@cryptosense.com.
Crypto on this site is safe for legacy use, but is not up to date with the NIST standard.
Note: The overall score is calculated based on the lowest score achieved by any of the machines scanned.
B
|
clientondersteuningplus.nl | 185.37.70.68 | 2023-03-24 09:16:30 UTC |
-
|
localhost.clientondersteuningplus.nl | 127.0.0.1 | excluded |
-
|
pop.clientondersteuningplus.nl | 5.157.84.75 | 2023-03-24 09:16:30 UTC |
In the next pages, we list all of the machines detected. For each machine, we list the cryptographic services found. For each service, we give the reasons behind the grading and, if applicable, instructions on how to fix it.
IP address | 185.37.70.68 |
---|---|
Last scan | 2023-03-24 09:16:30 UTC |
Versions | TLS 1.2 |
---|---|
Ciphers |
|
Cipher order | Server |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2023-01-23 07:19:52 UTC |
Certificate expiration date | 2023-04-23 07:19:51 UTC |
Certificate serial number | 264366351351156481945398639105837848593324 |
Certificate issuer | CN=R3,O=Let's Encrypt,C=US |
Certificate subject | CN=server097.yourhosting.nl |
Certificate SANs |
|
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
Versions | TLS 1.2 |
---|---|
Ciphers |
|
Cipher order | Server |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2023-02-13 08:19:38 UTC |
Certificate expiration date | 2023-05-14 08:19:37 UTC |
Certificate serial number | 305863876524005035082983644644251009619857 |
Certificate issuer | CN=R3,O=Let's Encrypt,C=US |
Certificate subject | CN=clientondersteuningplus.nl |
Certificate SANs |
|
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
Versions | TLS 1.2 |
---|---|
Ciphers |
|
Cipher order | Client |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2023-01-23 07:19:52 UTC |
Certificate expiration date | 2023-04-23 07:19:51 UTC |
Certificate serial number | 264366351351156481945398639105837848593324 |
Certificate issuer | CN=R3,O=Let's Encrypt,C=US |
Certificate subject | CN=server097.yourhosting.nl |
Certificate SANs |
|
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
Versions | TLS 1.2 |
---|---|
Ciphers |
|
Cipher order | Client |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2023-01-23 07:19:52 UTC |
Certificate expiration date | 2023-04-23 07:19:51 UTC |
Certificate serial number | 264366351351156481945398639105837848593324 |
Certificate issuer | CN=R3,O=Let's Encrypt,C=US |
Certificate subject | CN=server097.yourhosting.nl |
Certificate SANs |
|
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
IP address | 127.0.0.1 |
---|---|
Last scan | excluded |
This machine is excluded.
IP address | 5.157.84.75 |
---|---|
Last scan | 2023-03-24 09:16:30 UTC |
No service that could be analyzed detected on this machine.