is the overall score for
gsc-game.com
Crypto on this site is safe for legacy use, but is not up to date with the
NIST standard.
Note: The overall score is calculated based on the lowest score
achieved by any of the machines scanned.
Machines Scanned
In the next pages, we list all of the machines detected. For each machine, we list
the cryptographic services found. For each service, we give the reasons behind the
grading and, if applicable, instructions on how to fix it.
Versions |
TLS 1.0, TLS 1.1, TLS 1.2 |
Fallback SCSV |
Supported
|
Ciphers |
-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS 1.0, TLS 1.1, TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS 1.0, TLS 1.1, TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS 1.0, TLS 1.1, TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS 1.0, TLS 1.1, TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1.0, TLS 1.1, TLS 1.2
-
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_CBC_SHA
TLS 1.0, TLS 1.1, TLS 1.2
-
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
|
Cipher order |
Client
|
Compression |
-
NULL
TLS 1.0, TLS 1.1, TLS 1.2
|
Certificate key |
RSA 2048-bit
test this key
|
Hash algorithm |
SHA-256
|
Diffie-Hellman |
-
Group
(custom, 2048-bit):
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
-
Generator: 0x2
|
Certificate start date |
2023-12-06 00:00:00 UTC
|
Certificate expiration date |
2024-12-22 23:59:59 UTC
|
Certificate serial number |
178602405364846433479848078677005379024
|
Certificate issuer |
CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
|
Certificate subject |
CN=mail.gsc-game.com
|
Certificate SANs |
-
mail.gsc-game.com
-
www.mail.gsc-game.com
|
Trigger |
The server uses a 2048-bit Diffie-Hellman group.
|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so
benefit from forward secrecy.
NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits
for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).
|
Versions |
TLS 1.1, TLS 1.2 |
Fallback SCSV |
Supported
|
Ciphers |
-
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CCM_8
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CCM
TLS 1.2
-
TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CCM_8
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CCM
TLS 1.2
-
TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS 1.1, TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS 1.1, TLS 1.2
-
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
TLS 1.1, TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS 1.1, TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS 1.1, TLS 1.2
-
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1, TLS 1.2
-
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_RSA_WITH_AES_256_CCM_8
TLS 1.2
-
TLS_RSA_WITH_AES_256_CCM
TLS 1.2
-
TLS_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_CCM_8
TLS 1.2
-
TLS_RSA_WITH_AES_128_CCM
TLS 1.2
-
TLS_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_CBC_SHA
TLS 1.1, TLS 1.2
-
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
TLS 1.1, TLS 1.2
-
TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1.1, TLS 1.2
-
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1, TLS 1.2
|
Cipher order |
Server
|
Compression |
|
Certificate key |
RSA 2048-bit
test this key
|
Hash algorithm |
SHA-256
|
Diffie-Hellman |
-
Group
(custom, 2048-bit):
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
-
Generator: 0x2
|
Certificate start date |
2022-04-28 00:00:00 UTC
|
Certificate expiration date |
2023-04-30 23:59:59 UTC
|
Certificate serial number |
17061850174481118340281812675480892070
|
Certificate issuer |
CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
|
Certificate subject |
CN=gsc-game.com
|
Certificate SANs |
-
gsc-game.com
-
www.gsc-game.com
|
Trigger |
The server uses a 2048-bit Diffie-Hellman group.
|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so
benefit from forward secrecy.
NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits
for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).
|
Versions |
TLS 1.2 |
Ciphers |
-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CCM
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CCM_8
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CCM
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CCM_8
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_CCM
TLS 1.2
-
TLS_RSA_WITH_AES_128_CCM_8
TLS 1.2
-
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_CCM
TLS 1.2
-
TLS_RSA_WITH_AES_256_CCM_8
TLS 1.2
-
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
TLS 1.2
|
Cipher order |
Client
|
Compression |
|
Certificate key |
RSA 2048-bit
test this key
|
Hash algorithm |
SHA-256
|
Diffie-Hellman |
-
Group
(custom, 2048-bit):
0x91b45856881ed8fb6b995d5e2822a5b9204510b81c92e2d29e4b87d137dfa9b99fa18337e2516edaf3ccd8b867ccabc4050948202393cd00f6f6444e69c45f48aa6c3483515e15ca52a23ab055f3519bb816593af5728664e48362f5a4239a529f56a6438367be7eacfaec27fdfd190d90e228b5bd4e09edc49578036fb27b299a7a81826c85d7e6af1681a8c58407aeb77e912fddc70675d3d614fb1236b563cd70f5f3b342bc01b978727c2900762300fd50a9d140f8d29eee7fea24a5c9159f00fa5a75021cc8a3f271a555b95910b158ccd8b4b9db7322b4b09402db65721e02a85b65724e942b98b29261cd5d15b34943270af1bcdc2d760d5eae7548a3
-
Generator: 0x2
|
Certificate start date |
2023-12-06 00:00:00 UTC
|
Certificate expiration date |
2024-12-22 23:59:59 UTC
|
Certificate serial number |
178602405364846433479848078677005379024
|
Certificate issuer |
CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
|
Certificate subject |
CN=mail.gsc-game.com
|
Certificate SANs |
-
mail.gsc-game.com
-
www.mail.gsc-game.com
|
Trigger |
The server uses a 2048-bit Diffie-Hellman group.
|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so
benefit from forward secrecy.
NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits
for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).
|
Versions |
TLS 1.2 |
Ciphers |
-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CCM
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CCM_8
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CCM
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CCM_8
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_CCM
TLS 1.2
-
TLS_RSA_WITH_AES_128_CCM_8
TLS 1.2
-
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_CCM
TLS 1.2
-
TLS_RSA_WITH_AES_256_CCM_8
TLS 1.2
-
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
TLS 1.2
|
Cipher order |
Client
|
Compression |
|
Certificate key |
RSA 2048-bit
test this key
|
Hash algorithm |
SHA-256
|
Diffie-Hellman |
-
Group
(custom, 2048-bit):
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
-
Generator: 0x2
|
Certificate start date |
2023-12-06 00:00:00 UTC
|
Certificate expiration date |
2024-12-22 23:59:59 UTC
|
Certificate serial number |
178602405364846433479848078677005379024
|
Certificate issuer |
CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
|
Certificate subject |
CN=mail.gsc-game.com
|
Certificate SANs |
-
mail.gsc-game.com
-
www.mail.gsc-game.com
|
Trigger |
The server uses a 2048-bit Diffie-Hellman group.
|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so
benefit from forward secrecy.
NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits
for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).
|
Versions |
TLS 1.0, TLS 1.1, TLS 1.2 |
Fallback SCSV |
Supported
|
Ciphers |
-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS 1.0, TLS 1.1, TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS 1.0, TLS 1.1, TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS 1.0, TLS 1.1, TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS 1.0, TLS 1.1, TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1.0, TLS 1.1, TLS 1.2
-
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_CBC_SHA
TLS 1.0, TLS 1.1, TLS 1.2
-
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
|
Cipher order |
Client
|
Compression |
-
NULL
TLS 1.0, TLS 1.1, TLS 1.2
|
Certificate key |
RSA 2048-bit
test this key
|
Hash algorithm |
SHA-256
|
Diffie-Hellman |
-
Group
(custom, 2048-bit):
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
-
Generator: 0x2
|
Certificate start date |
2023-12-06 00:00:00 UTC
|
Certificate expiration date |
2024-12-22 23:59:59 UTC
|
Certificate serial number |
178602405364846433479848078677005379024
|
Certificate issuer |
CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
|
Certificate subject |
CN=mail.gsc-game.com
|
Certificate SANs |
-
mail.gsc-game.com
-
www.mail.gsc-game.com
|
Trigger |
The server uses a 2048-bit Diffie-Hellman group.
|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so
benefit from forward secrecy.
NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits
for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).
|
Versions |
TLS 1.2 |
Ciphers |
-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CCM
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CCM_8
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CCM
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CCM_8
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_CCM
TLS 1.2
-
TLS_RSA_WITH_AES_128_CCM_8
TLS 1.2
-
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_CCM
TLS 1.2
-
TLS_RSA_WITH_AES_256_CCM_8
TLS 1.2
-
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
TLS 1.2
|
Cipher order |
Client
|
Compression |
|
Certificate key |
RSA 2048-bit
test this key
|
Hash algorithm |
SHA-256
|
Diffie-Hellman |
-
Group
(custom, 2048-bit):
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
-
Generator: 0x2
|
Certificate start date |
2023-12-06 00:00:00 UTC
|
Certificate expiration date |
2024-12-22 23:59:59 UTC
|
Certificate serial number |
178602405364846433479848078677005379024
|
Certificate issuer |
CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
|
Certificate subject |
CN=mail.gsc-game.com
|
Certificate SANs |
-
mail.gsc-game.com
-
www.mail.gsc-game.com
|
Trigger |
The server uses a 2048-bit Diffie-Hellman group.
|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so
benefit from forward secrecy.
NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits
for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).
|
Versions |
TLS 1.2 |
Ciphers |
-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CCM
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_CCM_8
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CCM
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_CCM_8
TLS 1.2
-
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
TLS 1.2
-
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
TLS 1.2
-
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_128_CCM
TLS 1.2
-
TLS_RSA_WITH_AES_128_CCM_8
TLS 1.2
-
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_AES_256_CCM
TLS 1.2
-
TLS_RSA_WITH_AES_256_CCM_8
TLS 1.2
-
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS 1.2
-
TLS_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.2
-
TLS_RSA_WITH_ARIA_256_GCM_SHA384
TLS 1.2
-
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2
-
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
TLS 1.2
|
Cipher order |
Client
|
Compression |
|
Certificate key |
RSA 2048-bit
test this key
|
Hash algorithm |
SHA-256
|
Diffie-Hellman |
-
Group
(custom, 2048-bit):
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
-
Generator: 0x2
|
Certificate start date |
2023-12-06 00:00:00 UTC
|
Certificate expiration date |
2024-12-22 23:59:59 UTC
|
Certificate serial number |
178602405364846433479848078677005379024
|
Certificate issuer |
CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
|
Certificate subject |
CN=mail.gsc-game.com
|
Certificate SANs |
-
mail.gsc-game.com
-
www.mail.gsc-game.com
|
Trigger |
The server uses a 2048-bit Diffie-Hellman group.
|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so
benefit from forward secrecy.
NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits
for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).
|