Crypto on this site is safe for legacy use, but is not up to date with the ECRYPT standard.
Note: The overall score is calculated based on the lowest score achieved by any of the machines scanned.
B
|
gsc-game.com | 5.9.10.49 | 2024-04-25 14:01:12 UTC | ||
B
|
mail.gsc-game.com | 5.9.10.59 | 2024-04-25 14:01:12 UTC |
Below we list all of the machines detected. For each machine, we list the cryptographic services found. For each service, we give the reasons behind the grading. To see the full details of the cryptography offered by a service, click on "show details".
IP address | 5.9.10.49 |
---|---|
Last scan | 2024-04-25 14:01:12 UTC |
Versions | TLS 1.0, TLS 1.1, TLS 1.2 |
---|---|
Fallback SCSV | Supported |
Ciphers |
|
Cipher order | Client |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2023-12-06 00:00:00 UTC |
Certificate expiration date | 2024-12-22 23:59:59 UTC |
Certificate serial number | 178602405364846433479848078677005379024 |
Certificate issuer | CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB |
Certificate subject | CN=mail.gsc-game.com |
Certificate SANs |
|
Trigger | The server uses a 2048-bit RSA key. |
---|---|
Context |
ECRYPT recommends a length of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 bits for long term applications (ECRYPT 2016 report). |
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. ECRYPT recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the DES cipher. |
---|---|
Context |
DES is a cipher with an effective key length of 56 bits, too weak by ECRYPT even for legacy applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the RC4 cipher. |
---|---|
Context |
ECRYPT discourages the use of RC4 for both legacy and future applications (ECRYPT 2016 report). In TLS, cipher suites using RC4 have been deprecated as of February 2015 (RFC 7465). |
Trigger | The hash used for the certificate is SHA-256. |
---|---|
Context |
ECRYPT considers SHA-2, SHA-3 and Whirlpool (with at least 256 bits of output) to be the only acceptable choices for future applications. SHA-1, RIPEMD-160, SHA-224 and SHA3-224 are acceptable for legacy applications. MD5 and RIPEMD-128 are considered to weak for any application (ECRYPT 2016 report). |
Versions | TLS 1.1, TLS 1.2 |
---|---|
Fallback SCSV | Supported |
Ciphers |
|
Cipher order | Server |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2022-04-28 00:00:00 UTC |
Certificate expiration date | 2023-04-30 23:59:59 UTC |
Certificate serial number | 17061850174481118340281812675480892070 |
Certificate issuer | CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB |
Certificate subject | CN=gsc-game.com |
Certificate SANs |
|
Trigger | The server uses a 2048-bit RSA key. |
---|---|
Context |
ECRYPT recommends a length of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 bits for long term applications (ECRYPT 2016 report). |
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. ECRYPT recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the DES cipher. |
---|---|
Context |
DES is a cipher with an effective key length of 56 bits, too weak by ECRYPT even for legacy applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the RC4 cipher. |
---|---|
Context |
ECRYPT discourages the use of RC4 for both legacy and future applications (ECRYPT 2016 report). In TLS, cipher suites using RC4 have been deprecated as of February 2015 (RFC 7465). |
Trigger | The hash used for the certificate is SHA-256. |
---|---|
Context |
ECRYPT considers SHA-2, SHA-3 and Whirlpool (with at least 256 bits of output) to be the only acceptable choices for future applications. SHA-1, RIPEMD-160, SHA-224 and SHA3-224 are acceptable for legacy applications. MD5 and RIPEMD-128 are considered to weak for any application (ECRYPT 2016 report). |
Versions | TLS 1.2 |
---|---|
Ciphers |
|
Cipher order | Client |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2023-12-06 00:00:00 UTC |
Certificate expiration date | 2024-12-22 23:59:59 UTC |
Certificate serial number | 178602405364846433479848078677005379024 |
Certificate issuer | CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB |
Certificate subject | CN=mail.gsc-game.com |
Certificate SANs |
|
Trigger | The server uses a 2048-bit RSA key. |
---|---|
Context |
ECRYPT recommends a length of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 bits for long term applications (ECRYPT 2016 report). |
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. ECRYPT recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the DES cipher. |
---|---|
Context |
DES is a cipher with an effective key length of 56 bits, too weak by ECRYPT even for legacy applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the RC4 cipher. |
---|---|
Context |
ECRYPT discourages the use of RC4 for both legacy and future applications (ECRYPT 2016 report). In TLS, cipher suites using RC4 have been deprecated as of February 2015 (RFC 7465). |
Trigger | The hash used for the certificate is SHA-256. |
---|---|
Context |
ECRYPT considers SHA-2, SHA-3 and Whirlpool (with at least 256 bits of output) to be the only acceptable choices for future applications. SHA-1, RIPEMD-160, SHA-224 and SHA3-224 are acceptable for legacy applications. MD5 and RIPEMD-128 are considered to weak for any application (ECRYPT 2016 report). |
Versions | TLS 1.2 |
---|---|
Ciphers |
|
Cipher order | Client |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2023-12-06 00:00:00 UTC |
Certificate expiration date | 2024-12-22 23:59:59 UTC |
Certificate serial number | 178602405364846433479848078677005379024 |
Certificate issuer | CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB |
Certificate subject | CN=mail.gsc-game.com |
Certificate SANs |
|
Trigger | The server uses a 2048-bit RSA key. |
---|---|
Context |
ECRYPT recommends a length of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 bits for long term applications (ECRYPT 2016 report). |
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. ECRYPT recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the DES cipher. |
---|---|
Context |
DES is a cipher with an effective key length of 56 bits, too weak by ECRYPT even for legacy applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the RC4 cipher. |
---|---|
Context |
ECRYPT discourages the use of RC4 for both legacy and future applications (ECRYPT 2016 report). In TLS, cipher suites using RC4 have been deprecated as of February 2015 (RFC 7465). |
Trigger | The hash used for the certificate is SHA-256. |
---|---|
Context |
ECRYPT considers SHA-2, SHA-3 and Whirlpool (with at least 256 bits of output) to be the only acceptable choices for future applications. SHA-1, RIPEMD-160, SHA-224 and SHA3-224 are acceptable for legacy applications. MD5 and RIPEMD-128 are considered to weak for any application (ECRYPT 2016 report). |
IP address | 5.9.10.59 |
---|---|
Last scan | 2024-04-25 14:01:12 UTC |
Versions | TLS 1.0, TLS 1.1, TLS 1.2 |
---|---|
Fallback SCSV | Supported |
Ciphers |
|
Cipher order | Client |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2023-12-06 00:00:00 UTC |
Certificate expiration date | 2024-12-22 23:59:59 UTC |
Certificate serial number | 178602405364846433479848078677005379024 |
Certificate issuer | CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB |
Certificate subject | CN=mail.gsc-game.com |
Certificate SANs |
|
Trigger | The server uses a 2048-bit RSA key. |
---|---|
Context |
ECRYPT recommends a length of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 bits for long term applications (ECRYPT 2016 report). |
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. ECRYPT recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the DES cipher. |
---|---|
Context |
DES is a cipher with an effective key length of 56 bits, too weak by ECRYPT even for legacy applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the RC4 cipher. |
---|---|
Context |
ECRYPT discourages the use of RC4 for both legacy and future applications (ECRYPT 2016 report). In TLS, cipher suites using RC4 have been deprecated as of February 2015 (RFC 7465). |
Trigger | The hash used for the certificate is SHA-256. |
---|---|
Context |
ECRYPT considers SHA-2, SHA-3 and Whirlpool (with at least 256 bits of output) to be the only acceptable choices for future applications. SHA-1, RIPEMD-160, SHA-224 and SHA3-224 are acceptable for legacy applications. MD5 and RIPEMD-128 are considered to weak for any application (ECRYPT 2016 report). |
Versions | TLS 1.2 |
---|---|
Ciphers |
|
Cipher order | Client |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2023-12-06 00:00:00 UTC |
Certificate expiration date | 2024-12-22 23:59:59 UTC |
Certificate serial number | 178602405364846433479848078677005379024 |
Certificate issuer | CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB |
Certificate subject | CN=mail.gsc-game.com |
Certificate SANs |
|
Trigger | The server uses a 2048-bit RSA key. |
---|---|
Context |
ECRYPT recommends a length of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 bits for long term applications (ECRYPT 2016 report). |
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. ECRYPT recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the DES cipher. |
---|---|
Context |
DES is a cipher with an effective key length of 56 bits, too weak by ECRYPT even for legacy applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the RC4 cipher. |
---|---|
Context |
ECRYPT discourages the use of RC4 for both legacy and future applications (ECRYPT 2016 report). In TLS, cipher suites using RC4 have been deprecated as of February 2015 (RFC 7465). |
Trigger | The hash used for the certificate is SHA-256. |
---|---|
Context |
ECRYPT considers SHA-2, SHA-3 and Whirlpool (with at least 256 bits of output) to be the only acceptable choices for future applications. SHA-1, RIPEMD-160, SHA-224 and SHA3-224 are acceptable for legacy applications. MD5 and RIPEMD-128 are considered to weak for any application (ECRYPT 2016 report). |
Versions | TLS 1.2 |
---|---|
Ciphers |
|
Cipher order | Client |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2023-12-06 00:00:00 UTC |
Certificate expiration date | 2024-12-22 23:59:59 UTC |
Certificate serial number | 178602405364846433479848078677005379024 |
Certificate issuer | CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB |
Certificate subject | CN=mail.gsc-game.com |
Certificate SANs |
|
Trigger | The server uses a 2048-bit RSA key. |
---|---|
Context |
ECRYPT recommends a length of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 bits for long term applications (ECRYPT 2016 report). |
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. ECRYPT recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the DES cipher. |
---|---|
Context |
DES is a cipher with an effective key length of 56 bits, too weak by ECRYPT even for legacy applications (ECRYPT 2016 report). |
Trigger | The server doesn't support any cipher suites containing the RC4 cipher. |
---|---|
Context |
ECRYPT discourages the use of RC4 for both legacy and future applications (ECRYPT 2016 report). In TLS, cipher suites using RC4 have been deprecated as of February 2015 (RFC 7465). |
Trigger | The hash used for the certificate is SHA-256. |
---|---|
Context |
ECRYPT considers SHA-2, SHA-3 and Whirlpool (with at least 256 bits of output) to be the only acceptable choices for future applications. SHA-1, RIPEMD-160, SHA-224 and SHA3-224 are acceptable for legacy applications. MD5 and RIPEMD-128 are considered to weak for any application (ECRYPT 2016 report). |