gijunkaway.us

Score 91/100

Web site information

Website image gijunkaway.us
Web Address
IP Address
Font Scripts
Google Font API
Web Servers
LiteSpeed
Programming Languages
PHP
CMS
WordPress
SEO
Yoast SEO
Web Frameworks
ZURB Foundation
JavaScript Frameworks
jQuery

SEO data

title
GI Junk Away - Junk Removal Service
viewport
width=device-width, initial-scale=1
description
Junk Removal for your home or business in Fallbrook, Temecula, Murrieta, Oceanside, Escondido and more! We'll remove & haul your Junk, Trash and Debris!
robots
max-snippet:-1, max-image-preview:large, max-video-preview:-1
twitter:card
summary_large_image
twitter:description
Welcome To Gi Junk Away San Diego’s Premier Veteran Owned Junk Removal & Light Demolition Company Why Choose GI Junk Removal GI Junk Removal & Hauling is your “All Inclusive” junk removal, service provider. When we say “All-Inclusive” we mean it. We will do everything from demolition, lifting, loading, hauling, disposal, clean-out, and even the … Home Read More »
twitter:title
Home - GI Junk Away
twitter:image
https://gijunkaway.us/wp-content/uploads/2019/07/gi.png
generator
WordPress 5.4.2
msapplication-TileImage
https://gijunkaway.us/wp-content/uploads/2019/07/gi.png

Web site external calls

fonts.googleapis.com
cdnjs.cloudflare.com
clickfrauddefender.com
www.googletagmanager.com
www.google-analytics.com
fonts.gstatic.com
cdn.userway.org
api.userway.org

Protocols

SSLv2
not offered
TLS 1.2
offered
TLS 1.3
not offered and downgraded to a weaker protocol
ALPN HTTP2
h2
ALPN
spdy/3.1http/1.1spdy/2spdy/3

Vulnerabilities

heartbleed
not vulnerable, no heartbeat extension
CCS
not vulnerable
ticketbleed
not vulnerable
ROBOT
not vulnerable, no RSA key transport cipher
SSL renegotiation
not vulnerable
SSL client renegotiation
not vulnerable
CRIME TLS
not vulnerable
BREACH
potentially VULNERABLE, uses gzip HTTP compression - only supplied '/' tested
POODLE SSL
not vulnerable
fallback SCSV
no protocol below TLS 1.2 offered
SWEET32
not vulnerable
FREAK
not vulnerable
DROWN
not vulnerable to DROWN on this host and port
DROWN
Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://censys.io/ipv4?q=22D9C42C5526BAF22867CA321E9D0278AFE5B52EE5A641E8622B7DD17D5E0E25
LOGJAM
not vulnerable, no DH EXPORT ciphers,
LOGJAM-common primes
no DH key
BEAST
not vulnerable, no SSL3 or TLS1
LUCKY13
not vulnerable
RC4
not vulnerable

Header Responses

Status code
200 OK ('/')
Clock skew
0 seconds from localtime
HSTS
not offered
HPKP
No support for HTTP Public Key Pinning
security headers
--

Server Defaults

TLS extensions
'renegotiation info/#65281' 'EC point formats/#11' 'session ticket/#35' 'status request/#5' 'extended master secret/#23' 'application layer protocol negotiation/#16'
TLS session ticket
valid for 7200 seconds only (<daily)
SSL sessionID support
yes
Session Ticket Resumption
supported
Session ID Resumption
not supported
TLS timestamp
off by -5 seconds from your localtime
Signature algorithm
SHA256 with RSA
Key size
2048 bits
Key usage
Digital Signature, Key Encipherment
Extended key usage
cert_ext_keyusage
Serial number
930BE12584A925739141F788202B4578
Fingerprint SHA1
46A0ECF0C5BD6D7924686C02D4130E93C4D6922C
Fingerprint SHA256
22D9C42C5526BAF22867CA321E9D0278AFE5B52EE5A641E8622B7DD17D5E0E25
Certificate details
-----BEGIN CERTIFICATE----- MIIGdzCCBV+gAwIBAgIRAJML4SWEqSVzkUH3iCArRXgwDQYJKoZIhvcNAQELBQAw cjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlRYMRAwDgYDVQQHEwdIb3VzdG9uMRUw EwYDVQQKEwxjUGFuZWwsIEluYy4xLTArBgNVBAMTJGNQYW5lbCwgSW5jLiBDZXJ0 aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0yMTExMTMwMDAwMDBaFw0yMjAyMTEyMzU5 NTlaMBgxFjAUBgNVBAMTDWdpanVua2F3YXkudXMwggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDJCOAGhXKBwLu5rlj4cRy9CUzfsLChNfVkil2W5mhOdIVT Y6CF+iW0qFUlIyQWJbQ6LcWmyCiX+9Ofj+T81/CYSfV9o3XFvNI5C93u7qz+51WY X0tfEEJU+RCPc7n0ZNfbip5OOf9jo/NWX5ssbxCKIfDWb8BPthRedJ97J6K9BcBP C6xsObb+CNeBHPMeJKBRG6G6DVKM3BLxopOk+PG5FvVJTFlkHopD7uakCzx41LKx c7LKz1PD2LTS5FCX4DrceMq+97uWeXFd744v29Y3lrWT6ygpvLtrmz920FK+blPY PZocIaiGLyxLau01TtfVfvPO/6tRoGXqHKMYp3WpAgMBAAGjggNgMIIDXDAfBgNV HSMEGDAWgBR+A1plQWunfgrhuJ0I6h2OHWrHZTAdBgNVHQ4EFgQUjzpL++ay5p6a 9J4JXReISE4inXcwDgYDVR0PAQH/BAQDAgWgMAwGA1UdEwEB/wQCMAAwHQYDVR0l BBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMEkGA1UdIARCMEAwNAYLKwYBBAGyMQEC AjQwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwCAYGZ4EM AQIBMEwGA1UdHwRFMEMwQaA/oD2GO2h0dHA6Ly9jcmwuY29tb2RvY2EuY29tL2NQ YW5lbEluY0NlcnRpZmljYXRpb25BdXRob3JpdHkuY3JsMH0GCCsGAQUFBwEBBHEw bzBHBggrBgEFBQcwAoY7aHR0cDovL2NydC5jb21vZG9jYS5jb20vY1BhbmVsSW5j Q2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcnQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9v Y3NwLmNvbW9kb2NhLmNvbTCCAQYGCisGAQQB1nkCBAIEgfcEgfQA8gB3AEalVet1 +pEgMLWiiWn0830RLEF0vv1JuIWr8vxw/m1HAAABfRfDipUAAAQDAEgwRgIhAMcD XQFHzTc03xJEv1+0jVssC+dGz90gcJzstBm7X0a5AiEA5tmjZZQv+ZkEjygWXGYG HYshpBEeTm/XKQrueyl1wJoAdwDfpV6raIJPH2yt7rhfTj5a6s2iEqRqXo47EsAg RFwqcwAAAX0Xw4pUAAAEAwBIMEYCIQCkkwm4c1zJl3MwjcShnjQgah9nj2+1EprE Cse9H+b1EAIhAJsJCBm3WSWEknv6Ko8aOZZQb/qryhY3giZbaPDAI97yMIG6BgNV HREEgbIwga+CDWdpanVua2F3YXkudXOCFGNwYW5lbC5naWp1bmthd2F5LnVzghlj cGNhbGVuZGFycy5naWp1bmthd2F5LnVzghhjcGNvbnRhY3RzLmdpanVua2F3YXku dXOCEm1haWwuZ2lqdW5rYXdheS51c4IVd2ViZGlzay5naWp1bmthd2F5LnVzghV3 ZWJtYWlsLmdpanVua2F3YXkudXOCEXd3dy5naWp1bmthd2F5LnVzMA0GCSqGSIb3 DQEBCwUAA4IBAQBvzJvMEB6r4wbZvEb/j0GfQWnjLVTJepLwI9gFjacezytlJy3q Wm6sYCzIgqZxCqco4yMAvEjN2UjTTUcSVJdPbifzqT3Ha0+V92L4fbp0eo4EvuT+ QsEf2VpLE9oiYigRZ6IXfGx7KzmF/zreW+2lLoIew3s6nc85vgZIZY23bqiOapWr yOtcS21ATmdwj57+qT9auJN4IwKsNvG1mp7oYUocxXYL6Ue4K1vJmYPDWTpOUEW6 NxAFD2ezi/uPS11t7eyd2SWhinRvMPZ8f8G8i+mHx27kZeKWNKOYG2Alwm3q94e2 FULdWwiLVEiTPPq5mKyR4vrHsW0FYzYlq3U4 -----END CERTIFICATE-----
Common names
gijunkaway.us
Service Name Indication
southwestserver.wordpresswebhost.com
SubjectAlternative Name
gijunkaway.us cpanel.gijunkaway.us cpcalendars.gijunkaway.us cpcontacts.gijunkaway.us mail.gijunkaway.us webdisk.gijunkaway.us webmail.gijunkaway.us www.gijunkaway.us
Certificate authority issuers
cPanel, Inc. Certification Authority (cPanel, Inc. from US)
Certificate trusted
Ok via SAN and CN (SNI mandatory)
Certificate chain trusted
passed.
Is certificate Extended Validation
no
Days before expiry
68 >= 60 days
Valid from
2021-11-13 01:00
Valid until
2022-02-12 00:59
Chain
3
CRL distribution points
http://crl.comodoca.com/cPanelIncCertificationAuthority.crl
Online Certificate Status Protocol URL
http://ocsp.comodoca.com
OCSP stapling
offered
cert mustStapleExtension
--
DNS CAArecord
--
certificate transparency
yes (certificate extension)

Server Preferences

order
server
Which protocol negotiated
Default protocol TLS1.2
negotiated
ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
order TLSv1 2
ECDHE-RSA-AES128-GCM-SHA256

Perfect Forward Secrecy

PFS
offered
PFS s
ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384
ECDHE curves
prime256v1 secp384r1

Ciphers

ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
(0xc030)
ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
(0xc02f)

Browser Simulations

Android 2.3.7
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 4.1.1
No connection
Android 4.3
No connection
Android 4.4.2
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 5.0.0
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 6.0
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 7.0
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows Chrome 51
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows Chrome 57
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows Firefox 47
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows Firefox 53
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows XP Internet Explorer 6
No connection
Windows Vista Internet Explorer 7
No connection
Windows XP Internet Explorer 8
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows 7 Internet Explorer 8
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows 7 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows 8.1 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows 8.1 update Internet Explorer 11
No connection
Windows 10 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows 10 Edge 13
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows Phone 10 Edge 13
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows 7 Opera 17
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
MacOSX 10.6.8 Safari 5.1.9
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
iOS 7 Safari 7
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
MacOSX 10.11 Safari 9
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
MacOSX 10.12 Safari 10
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
iOS 9 App Transport Security 9
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows 7 Tor 7.0.9
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Java 6 update 45
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Java 7 update 25
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Java 8 update 31
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
OpenSSL 1.1.1
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
OpenSSL 1.0.2e
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256