backinthesaddle.cf

Score 88/100

Web site information

Website image backinthesaddle.cf
IP Address
Font Scripts
Font Awesome
Web Servers
LiteSpeed
CMS
WordPress
JavaScript Frameworks
jQuery
Programming Languages
PHP

SEO data

title
My Blog – My WordPress Blog
viewport
width=device-width, initial-scale=1
robots
max-image-preview:large
generator
WordPress 5.8.3

Lighthouse

Performance
98/100
Accessibility
91/100
Best Practices
92/100
SEO
89/100
PWA
30/100

Protocols

SSLv2
not offered
SSLv3
not offered
TLS 1.0
not offered
TLS 1.1
not offered
TLS 1.2
offered
TLS 1.3
offered with final
ALPN HTTP2
h2
ALPN
spdy/3.1http/1.1spdy/2spdy/3

Vulnerabilities

heartbleed
not vulnerable, no heartbeat extension
CCS
not vulnerable
ticketbleed
not vulnerable
ROBOT
not vulnerable, no RSA key transport cipher
SSL renegotiation
supported
SSL client renegotiation
not vulnerable
CRIME TLS
not vulnerable
BREACH
potentially VULNERABLE, br gzip HTTP compression detected - only supplied '/' tested
POODLE SSL
not vulnerable, no SSLv3
fallback SCSV
no protocol below TLS 1.2 offered
SWEET32
not vulnerable
FREAK
not vulnerable
DROWN
not vulnerable on this host and port
DROWN hint
no RSA certificate, can't be used with SSLv2 elsewhere
LOGJAM
not vulnerable, no DH EXPORT ciphers,
LOGJAM-common primes
no DH key with <= TLS 1.2
BEAST
not vulnerable, no SSL3 or TLS1
LUCKY13
not vulnerable
winshock
not vulnerable
RC4
not vulnerable

Header Responses

Status code
200 OK ('/')
Clock skew
0 seconds from localtime
HTTP headerTime
1642198468
HSTS
not offered
HPKP
No support for HTTP Public Key Pinning
security headers
--

Server Defaults

TLS extensions
'renegotiation info/#65281' 'EC point formats/#11' 'session ticket/#35' 'key share/#51' 'supported versions/#43' 'extended master secret/#23' 'application layer protocol negotiation/#16' 'compress_certificate/#27'
TLS session ticket
valid for 7200 seconds only (<daily)
SSL sessionID support
yes
Session Ticket Resumption
supported
Session ID Resumption
supported
TLS timestamp
off by -3 seconds from your localtime
certificate compression
0002/Brotli
clientAuth
none
cert numbers
1
Signature algorithm
SHA256 with RSA
Key size
EC 384 bits (curve P-384)
Key usage
Digital Signature
Extended key usage
TLS Web Server Authentication, TLS Web Client Authentication
Serial number
03E9D27F8D7AB5B434ED1B4A192408A524C5
cert serialNumberLen
18
Fingerprint SHA1
A31357FC2D05649AB67AD2466162F5606672E3B3
Fingerprint SHA256
BAED59961A678ADD45EB1D82BAFD74064E6A692B4A5B4846C563211B80681DD6
Certificate details
-----BEGIN CERTIFICATE----- MIIElTCCA32gAwIBAgISA+nSf416tbQ07RtKGSQIpSTFMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAxMDEwMDI3NTdaFw0yMjA0MDEwMDI3NTZaMB8xHTAbBgNVBAMM FCouYmFja2ludGhlc2FkZGxlLmNmMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE2gZw /MJTteRdgeAZ6S/eSnIy6nGNRwaYYgkjFeC1h2rX2JAt1N1f7G968O7x1P34OCHL 6Ot6bVSJCGAsluYS9Nl/yuQy03QBKkmRMpOTHNq1RgmzAIerZVvmhm/7VgYGo4IC ZDCCAmAwDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF BQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBS+TgQbe+bxw3iMsASno+yAXGZw czAfBgNVHSMEGDAWgBQULrMXt1hWy65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJ MEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcw AoYWaHR0cDovL3IzLmkubGVuY3Iub3JnLzAzBgNVHREELDAqghQqLmJhY2tpbnRo ZXNhZGRsZS5jZoISYmFja2ludGhlc2FkZGxlLmNmMEwGA1UdIARFMEMwCAYGZ4EM AQIBMDcGCysGAQQBgt8TAQEBMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly9jcHMubGV0 c2VuY3J5cHQub3JnMIIBBQYKKwYBBAHWeQIEAgSB9gSB8wDxAHYAQcjKsd8iRkoQ xqE6CUKHXk4xixsD6+tLx2jwkGKWBvYAAAF+E0AjYwAABAMARzBFAiEArzuNoWq0 x2OlinMvBYm/WNLSLhctBHVjZE2uWSwsRAYCIDbwJ5j0eVsXxw5rx5A9zvAAo+wm /KKDOQ2HceM9IiH/AHcARqVV63X6kSAwtaKJafTzfREsQXS+/Um4havy/HD+bUcA AAF+E0AjgwAABAMASDBGAiEArEOXvT7f3e2Xa4s0Wk/zJnkoiU5tBzUqusTSQDVI KSwCIQC7l+eof9DFz90sE9fHsZkyL9gespiMLwICd44DVcqbxjANBgkqhkiG9w0B AQsFAAOCAQEAoICSwh7qnp9zZR/AhKfoaHwWvSIl5YTVFbv9/duqJngrD6gm89HM Ka25VoLJEYwnhIBLo63d1X+jXb84fXA3UhV1LgtuMe9sCRBgCHbatNrSenRJ7C5z MZ7eMd8XonMc01yq2UkHZ8UyxOeVXj/wKUgsFvK+WLogzT7dN99j57A/gLnBj4PC Ql3A4Xf2yoQYKnWywLys+0+fwpphikeK/qcqFlOjTL++MDPdsJ7OExxgXVlpH6Z4 NsX1qHvJvNns9CF+e8XGGlYAV7lbrEZ+TTSTkk1HQcJzq6hH8QI+6vSRZF843Ra7 ewenRVdZsizaEdksow7glb1xFbnc8DJ1JA== -----END CERTIFICATE-----
Common names
*.backinthesaddle.cf
Service Name Indication
da300.is.cc
SubjectAlternative Name
*.backinthesaddle.cf backinthesaddle.cf
Certificate trusted
Ok via SAN (SNI mandatory)
Certificate chain trusted
Some certificate trust checks failed -> Microsoft (chain incomplete) Linux (chain incomplete) , OK -> Mozilla Apple
Is certificate Extended Validation
no
cert expirationStatus
76 >= 30 days
Valid from
2022-01-01 00:27
Valid until
2022-04-01 00:27
cert extlifeSpan
certificate has no extended life time according to browser forum
cert eTLS
not present
cert crlDistributionPoints
--
Online Certificate Status Protocol URL
http://r3.o.lencr.org
OCSP stapling
not offered
cert mustStapleExtension
--
DNS CAArecord
--
certificate transparency
yes (certificate extension)
Chain
2
certs list ordering problem
no
Certificate authority issuers
R3 (Let's Encrypt from US)
intermediate cert
-----BEGIN CERTIFICATE----- MIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw WhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg RW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP R5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx sxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm NHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg Z3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG /kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC AYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB Af8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA FHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw AoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw Oi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB gt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W PTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl ikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz CkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm lJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4 avAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2 yJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O yK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids hCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+ HlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv MldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX nLRbwHOoq7hHwg== -----END CERTIFICATE-----
intermediate cert fingerprintSHA256
67ADD1166B020AE61B8F5FC96813C04C2AA589960796865572A3C7E737613DFD
intermediate cert notBefore
2020-09-04 00:00
intermediate cert notAfter
2025-09-15 16:00
intermediate cert expiration
ok > 40 days
intermediate cert chain
R3 <-- ISRG Root X1
intermediate cert badOCSP
intermediate certificate(s) is/are ok

Server Preferences

order
server -- TLS 1.3 client determined
Which protocol negotiated
Default protocol TLS1.3
negotiated
TLS13-AES-256-GCM-SHA384, 253 bit ECDH (X25519)
order TLSv1 2
ECDHE-ECDSA-AES128-GCM-SHA256

Ciphers

Browser Simulations

Android 2.3.7
No connection
Android 4.1.1
No connection
Android 4.3
No connection
Android 4.4.2
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 5.0.0
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 6.0
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 7.0
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Chrome 51
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Chrome 57
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Firefox 47
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Firefox 53
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows XP Internet Explorer 6
No connection
Windows Vista Internet Explorer 7
No connection
Windows XP Internet Explorer 8
No connection
Windows 7 Internet Explorer 8
No connection
Windows 7 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 8.1 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 8.1 update Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 10 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 10 Edge 13
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Phone 10 Edge 13
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 7 Opera 17
No connection
MacOSX 10.6.8 Safari 5.1.9
No connection
iOS 7 Safari 7
No connection
MacOSX 10.11 Safari 9
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
MacOSX 10.12 Safari 10
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
iOS 9 App Transport Security 9
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 7 Tor 7.0.9
No connection
Java 6 update 45
No connection
Java 7 update 25
No connection
Java 8 update 31
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
OpenSSL 1.1.1
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
OpenSSL 1.0.2e
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256