Your server supports 3DES ciphers which is considered an insecure cipher. Your server does not support LOW ciphers. This test is passed if the server does not support EXPORT ciphers. Have been lifted and there is little point in supporting the "EXPORT" cipher suites. Systems, rules which were quite strict before 2000. ![]() These suites were defined to comply with the US export rules on cryptographic (say, a basic home PC - symmetric encryption relying on 40-bit keys). They are encrypted,īut only with keys small enough to be cracked with even amateur hardware The cipher suites with "EXPORT" are, by design, weak. Your server does not support EXPORT ciphers. Your server does not support aNULL ciphers.įor a certificate to be trusted and valid it should not be expired. This test is passed if the certification is not expired. The cipher suites with a "NULL" do not offer data encryption, only integrity check. Your server does not support NULL ciphers. TLS1.3 is going to be the stable secure protocol in the near future and it is recommended that every server shift to this protocol. But you'd better consider supporting TLS v1.3.Ĭurrently, TLS1.2 is a stable and secure protocol to go with before TLS1.3 is officially announced as the only accepted protocol. Currently, this protocol is considered stable. But, similar to TLS1.1 it supports weak cipher suits that are not proper for modern use. TLS1.1 does not have known major vulnerabilities. You are advised to start supporting more advanced protocols. This protocol is now consideredĪ weak protocol. Starting June 30, 2018, websites will need to stop supporting TLS 1.0 to remain PCI compliant. Additionally, TLSv.10 supports weak cipher suits which further makes it an insecure protocol. This protocol is vulnerable against attacks such as BEAST and POODLE. TLS1.0 is an almost two-decade old protocol. This test checks if the server supports SSLv3 or not. You are advised to disable support for this protocol. This protocol is now considered as a weak protocol. SSLv3 is a broken, hence, unsafe protocol and must not be used. ![]() ![]() Your server does not support SSLv3 which is good since it is an insecure protocol. ![]() SSLv2 is a broken, hence, unsafe protocol and must not be used. This test checks if the server supports SSLv2 or not. Your server does not support SSLv2 which is good since it is an insecure protocol.
0 Comments
Leave a Reply. |