Crypto Service Audit by Cryptosense

Report for gsc-game.com produced at 2024-04-20 07:20:54 UTC using the NIST standard.

For more information on coverage, go to discovery.cryptosense.com/faq. If you have any suggestions for improving this report, please send us an email at discovery@cryptosense.com.

B
is the overall score for
gsc-game.com

Crypto on this site is safe for legacy use, but is not up to date with the NIST standard.

Note: The overall score is calculated based on the lowest score achieved by any of the machines scanned.

Machines Scanned

B
gsc-game.com 5.9.10.49 2024-04-19 11:54:10 UTC
B
mail.gsc-game.com 5.9.10.59 2024-04-19 11:54:10 UTC

Crypto Services Discovered

In the next pages, we list all of the machines detected. For each machine, we list the cryptographic services found. For each service, we give the reasons behind the grading and, if applicable, instructions on how to fix it.

gsc-game.com

IP address 5.9.10.49
Last scan 2024-04-19 11:54:10 UTC
TLS SMTP (port 25)
Rules applicable 4
B
A
A!
B
C
D
F
3 0 1 0 0 0
TLS HTTP (port 443)
Rules applicable 4
B
A
A!
B
C
D
F
3 0 1 0 0 0
TLS SMTP (port 465)
Rules applicable 4
B
A
A!
B
C
D
F
3 0 1 0 0 0
TLS SMTP (port 587)
Rules applicable 4
B
A
A!
B
C
D
F
3 0 1 0 0 0

TLS (port 25 – SMTP)

Scan details
Versions TLS 1.0, TLS 1.1, TLS 1.2
Fallback SCSV Supported
Ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS 1.0, TLS 1.1, TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS 1.0, TLS 1.1, TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS 1.0, TLS 1.1, TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS 1.0, TLS 1.1, TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_CBC_SHA TLS 1.0, TLS 1.1, TLS 1.2
  • TLS_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_CBC_SHA TLS 1.0, TLS 1.1, TLS 1.2
  • TLS_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
Cipher order Client
Compression
  • NULL TLS 1.0, TLS 1.1, TLS 1.2
Certificate key RSA 2048-bit test this key
Hash algorithm SHA-256
Diffie-Hellman
  • Group (custom, 2048-bit): 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
  • Generator: 0x2
Certificate start date 2023-12-06 00:00:00 UTC
Certificate expiration date 2024-12-22 23:59:59 UTC
Certificate serial number 178602405364846433479848078677005379024
Certificate issuer CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
Certificate subject CN=mail.gsc-game.com
Certificate SANs
  • mail.gsc-game.com
  • www.mail.gsc-game.com
B
Warnings
Diffie-Hellman group size
Trigger The server uses a 2048-bit Diffie-Hellman group.
Context

Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy.

NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).

TLS (port 443 – HTTP)

Scan details
Versions TLS 1.1, TLS 1.2
Fallback SCSV Supported
Ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CCM TLS 1.2
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CCM TLS 1.2
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS 1.1, TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS 1.1, TLS 1.2
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA TLS 1.1, TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS 1.1, TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS 1.1, TLS 1.2
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1, TLS 1.2
  • TLS_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_RSA_WITH_AES_256_CCM_8 TLS 1.2
  • TLS_RSA_WITH_AES_256_CCM TLS 1.2
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_CCM_8 TLS 1.2
  • TLS_RSA_WITH_AES_128_CCM TLS 1.2
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_CBC_SHA TLS 1.1, TLS 1.2
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA TLS 1.1, TLS 1.2
  • TLS_RSA_WITH_AES_128_CBC_SHA TLS 1.1, TLS 1.2
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1, TLS 1.2
Cipher order Server
Compression
  • NULL TLS 1.1, TLS 1.2
Certificate key RSA 2048-bit test this key
Hash algorithm SHA-256
Diffie-Hellman
  • Group (custom, 2048-bit): 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
  • Generator: 0x2
Certificate start date 2022-04-28 00:00:00 UTC
Certificate expiration date 2023-04-30 23:59:59 UTC
Certificate serial number 17061850174481118340281812675480892070
Certificate issuer CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
Certificate subject CN=gsc-game.com
Certificate SANs
  • gsc-game.com
  • www.gsc-game.com
B
Warnings
Diffie-Hellman group size
Trigger The server uses a 2048-bit Diffie-Hellman group.
Context

Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy.

NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).

TLS (port 465 – SMTP)

Scan details
Versions TLS 1.2
Ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CCM TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CCM TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_CCM TLS 1.2
  • TLS_RSA_WITH_AES_128_CCM_8 TLS 1.2
  • TLS_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_CCM TLS 1.2
  • TLS_RSA_WITH_AES_256_CCM_8 TLS 1.2
  • TLS_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 TLS 1.2
Cipher order Client
Compression
  • NULL TLS 1.2
Certificate key RSA 2048-bit test this key
Hash algorithm SHA-256
Diffie-Hellman
  • Group (custom, 2048-bit): 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
  • Generator: 0x2
Certificate start date 2023-12-06 00:00:00 UTC
Certificate expiration date 2024-12-22 23:59:59 UTC
Certificate serial number 178602405364846433479848078677005379024
Certificate issuer CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
Certificate subject CN=mail.gsc-game.com
Certificate SANs
  • mail.gsc-game.com
  • www.mail.gsc-game.com
B
Warnings
Diffie-Hellman group size
Trigger The server uses a 2048-bit Diffie-Hellman group.
Context

Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy.

NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).

TLS (port 587 – SMTP)

Scan details
Versions TLS 1.2
Ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CCM TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CCM TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_CCM TLS 1.2
  • TLS_RSA_WITH_AES_128_CCM_8 TLS 1.2
  • TLS_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_CCM TLS 1.2
  • TLS_RSA_WITH_AES_256_CCM_8 TLS 1.2
  • TLS_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 TLS 1.2
Cipher order Client
Compression
  • NULL TLS 1.2
Certificate key RSA 2048-bit test this key
Hash algorithm SHA-256
Diffie-Hellman
  • Group (custom, 2048-bit): 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
  • Generator: 0x2
Certificate start date 2023-12-06 00:00:00 UTC
Certificate expiration date 2024-12-22 23:59:59 UTC
Certificate serial number 178602405364846433479848078677005379024
Certificate issuer CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
Certificate subject CN=mail.gsc-game.com
Certificate SANs
  • mail.gsc-game.com
  • www.mail.gsc-game.com
B
Warnings
Diffie-Hellman group size
Trigger The server uses a 2048-bit Diffie-Hellman group.
Context

Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy.

NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).

mail.gsc-game.com

IP address 5.9.10.59
Last scan 2024-04-19 11:54:10 UTC
TLS SMTP (port 25)
Rules applicable 4
B
A
A!
B
C
D
F
3 0 1 0 0 0
TLS SMTP (port 465)
Rules applicable 4
B
A
A!
B
C
D
F
3 0 1 0 0 0
TLS SMTP (port 587)
Rules applicable 4
B
A
A!
B
C
D
F
3 0 1 0 0 0

TLS (port 25 – SMTP)

Scan details
Versions TLS 1.0, TLS 1.1, TLS 1.2
Fallback SCSV Supported
Ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS 1.0, TLS 1.1, TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS 1.0, TLS 1.1, TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS 1.0, TLS 1.1, TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS 1.0, TLS 1.1, TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_CBC_SHA TLS 1.0, TLS 1.1, TLS 1.2
  • TLS_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_CBC_SHA TLS 1.0, TLS 1.1, TLS 1.2
  • TLS_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
Cipher order Client
Compression
  • NULL TLS 1.0, TLS 1.1, TLS 1.2
Certificate key RSA 2048-bit test this key
Hash algorithm SHA-256
Diffie-Hellman
  • Group (custom, 2048-bit): 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
  • Generator: 0x2
Certificate start date 2023-12-06 00:00:00 UTC
Certificate expiration date 2024-12-22 23:59:59 UTC
Certificate serial number 178602405364846433479848078677005379024
Certificate issuer CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
Certificate subject CN=mail.gsc-game.com
Certificate SANs
  • mail.gsc-game.com
  • www.mail.gsc-game.com
B
Warnings
Diffie-Hellman group size
Trigger The server uses a 2048-bit Diffie-Hellman group.
Context

Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy.

NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).

TLS (port 465 – SMTP)

Scan details
Versions TLS 1.2
Ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CCM TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CCM TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_CCM TLS 1.2
  • TLS_RSA_WITH_AES_128_CCM_8 TLS 1.2
  • TLS_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_CCM TLS 1.2
  • TLS_RSA_WITH_AES_256_CCM_8 TLS 1.2
  • TLS_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 TLS 1.2
Cipher order Client
Compression
  • NULL TLS 1.2
Certificate key RSA 2048-bit test this key
Hash algorithm SHA-256
Diffie-Hellman
  • Group (custom, 2048-bit): 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
  • Generator: 0x2
Certificate start date 2023-12-06 00:00:00 UTC
Certificate expiration date 2024-12-22 23:59:59 UTC
Certificate serial number 178602405364846433479848078677005379024
Certificate issuer CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
Certificate subject CN=mail.gsc-game.com
Certificate SANs
  • mail.gsc-game.com
  • www.mail.gsc-game.com
B
Warnings
Diffie-Hellman group size
Trigger The server uses a 2048-bit Diffie-Hellman group.
Context

Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy.

NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).

TLS (port 587 – SMTP)

Scan details
Versions TLS 1.2
Ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CCM TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CCM TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 TLS 1.2
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 TLS 1.2
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 TLS 1.2
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_128_CCM TLS 1.2
  • TLS_RSA_WITH_AES_128_CCM_8 TLS 1.2
  • TLS_RSA_WITH_AES_128_GCM_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_AES_256_CCM TLS 1.2
  • TLS_RSA_WITH_AES_256_CCM_8 TLS 1.2
  • TLS_RSA_WITH_AES_256_GCM_SHA384 TLS 1.2
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.2
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 TLS 1.2
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS 1.2
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 TLS 1.2
Cipher order Client
Compression
  • NULL TLS 1.2
Certificate key RSA 2048-bit test this key
Hash algorithm SHA-256
Diffie-Hellman
  • Group (custom, 2048-bit): 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
  • Generator: 0x2
Certificate start date 2023-12-06 00:00:00 UTC
Certificate expiration date 2024-12-22 23:59:59 UTC
Certificate serial number 178602405364846433479848078677005379024
Certificate issuer CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
Certificate subject CN=mail.gsc-game.com
Certificate SANs
  • mail.gsc-game.com
  • www.mail.gsc-game.com
B
Warnings
Diffie-Hellman group size
Trigger The server uses a 2048-bit Diffie-Hellman group.
Context

Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy.

NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3).