Report for virtualmin.com produced at 2024-04-24 13:52:48 UTC using the NIST standard.
For more information on coverage, go to discovery.cryptosense.com/faq. If you have any suggestions for improving this report, please send us an email at discovery@cryptosense.com.
Crypto on this site is outdated and might not provide enough security.
Note: The overall score is calculated based on the lowest score achieved by any of the machines scanned.
-
|
virtualmin.com | 198.154.100.99 | 2024-04-23 14:51:14 UTC |
-
|
jamie.cloud.virtualmin.com | 108.60.199.109 | 2024-04-23 14:51:14 UTC |
-
|
ns.cloud.virtualmin.com | 108.60.199.108 | 2024-04-23 14:51:14 UTC |
-
|
ns2.cloud.virtualmin.com | 108.60.199.116 | 2024-04-23 14:51:14 UTC |
-
|
docs.virtualmin.com | 198.154.100.100 | 2024-04-23 14:51:14 UTC |
-
|
ftp.virtualmin.com | 108.60.199.107 | 2024-04-23 14:51:14 UTC |
C
|
software.virtualmin.com | 149.28.242.101 | 2024-04-23 14:51:15 UTC |
-
|
software2.virtualmin.com | 163.172.162.254 | 2024-04-23 14:51:15 UTC |
-
|
srv1.virtualmin.com | 108.60.199.106 | 2024-04-23 14:51:15 UTC |
In the next pages, we list all of the machines detected. For each machine, we list the cryptographic services found. For each service, we give the reasons behind the grading and, if applicable, instructions on how to fix it.
IP address | 198.154.100.99 |
---|---|
Last scan | 2024-04-23 14:51:14 UTC |
No service that could be analyzed detected on this machine.
IP address | 108.60.199.109 |
---|---|
Last scan | 2024-04-23 14:51:14 UTC |
No service that could be analyzed detected on this machine.
IP address | 108.60.199.108 |
---|---|
Last scan | 2024-04-23 14:51:14 UTC |
No service that could be analyzed detected on this machine.
IP address | 108.60.199.116 |
---|---|
Last scan | 2024-04-23 14:51:14 UTC |
No service that could be analyzed detected on this machine.
IP address | 198.154.100.100 |
---|---|
Last scan | 2024-04-23 14:51:14 UTC |
No service that could be analyzed detected on this machine.
IP address | 108.60.199.107 |
---|---|
Last scan | 2024-04-23 14:51:14 UTC |
No service that could be analyzed detected on this machine.
IP address | 149.28.242.101 |
---|---|
Last scan | 2024-04-23 14:51:15 UTC |
Versions | TLS 1.0, TLS 1.1, TLS 1.2 |
---|---|
Fallback SCSV | Supported |
Ciphers |
|
Cipher order | Client |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2018-07-27 06:18:54 UTC |
Certificate expiration date | 2018-08-26 06:18:54 UTC |
Certificate serial number | 10016193776172319625 |
Certificate issuer | CN=software3.virtualmin.com ,O=Self-signed for software3.virtualmin.com ,L=NA,ST=NA,C=NA |
Certificate subject | CN=software3.virtualmin.com ,O=Self-signed for software3.virtualmin.com ,L=NA,ST=NA,C=NA |
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
Version string | SSH-2.0-OpenSSH_7.4 |
|||||||||
---|---|---|---|---|---|---|---|---|---|---|
Encryption algorithms |
|
|||||||||
Compression algorithms |
|
|||||||||
MAC algorithms |
|
|||||||||
Server host key algorithms |
|
|||||||||
Key exchange algorithms |
|
|||||||||
Server keys |
|
Trigger | The server supports the "diffie-hellman-group1-sha1" algorithm. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3). The "diffie-hellman-group1-sha1" key exchange algorithm uses the commonly-shared and 1024-bit Oakley Group 2 (RFC 4253). |
Versions | TLS 1.2 |
---|---|
Ciphers |
|
Cipher order | Client |
Compression |
|
Certificate key | RSA 2048-bit test this key |
Hash algorithm | SHA-256 |
Diffie-Hellman |
|
Certificate start date | 2023-09-12 16:51:07 UTC |
Certificate expiration date | 2023-12-11 16:51:06 UTC |
Certificate serial number | 279503508235384226986805774441936220599460 |
Certificate issuer | CN=R3,O=Let's Encrypt,C=US |
Certificate subject | CN=software2.virtualmin.com |
Certificate SANs |
|
Trigger | The server uses a 2048-bit Diffie-Hellman group. |
---|---|
Context |
Diffie-Hellman is mainly used so that two machines can compute a shared secret and so benefit from forward secrecy. NIST recommends a group size of at least 1024 bits for legacy applications, 3072 bits for near term applications and 15360 for long term applications (NIST SP 800-57, Part 1, Rev. 3). |
IP address | 163.172.162.254 |
---|---|
Last scan | 2024-04-23 14:51:15 UTC |
No service that could be analyzed detected on this machine.
IP address | 108.60.199.106 |
---|---|
Last scan | 2024-04-23 14:51:15 UTC |
No service that could be analyzed detected on this machine.