cinsidemedia.com

Score 84/100

Web site information

Website image cinsidemedia.com
Web Address
IP Address
Web Servers
Apache
Font Scripts
Font Awesome
JavaScript Frameworks
Lo-dash
CMS
WordPress
SEO
Yoast SEO
Programming Languages
PHP

SEO data

title
C Inside Media | General Blog
viewport
width=device-width, initial-scale=1
robots
index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
twitter:card
summary_large_image
generator
WordPress 5.8.2
msapplication-TileImage
https://cinsidemedia.com/wp-content/uploads/2021/01/c-inside-media-F.png

Web site external calls

fonts.googleapis.com
fonts.gstatic.com

Protocols

SSLv2
not offered
SSLv3
not offered
TLS 1.0
not offered
TLS 1.1
is not offered
TLS 1.2
offered
TLS 1.3
offered with final
ALPN HTTP2
h2
ALPN
http/1.1

Vulnerabilities

heartbleed
not vulnerable, no heartbeat extension
CCS
not vulnerable
ticketbleed
not vulnerable
ROBOT
not vulnerable
SSL renegotiation
not vulnerable
SSL client renegotiation
not vulnerable
CRIME TLS
not vulnerable
BREACH
potentially VULNERABLE, uses gzip HTTP compression - only supplied '/' tested
POODLE SSL
not vulnerable
fallback SCSV
no protocol below TLS 1.2 offered
SWEET32
not vulnerable
FREAK
not vulnerable
DROWN
not vulnerable to DROWN on this host and port
DROWN
Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://censys.io/ipv4?q=8EC334EF45DC0FA55611792F040481BF852ED29E74BBAD82609A96B701577237
LOGJAM
not vulnerable, no DH EXPORT ciphers,
LOGJAM-common primes
no DH key
BEAST
not vulnerable, no SSL3 or TLS1
LUCKY13
potentially vulnerable, uses TLS CBC ciphers
RC4
not vulnerable

Header Responses

Status code
200 OK ('/')
Clock skew
-1 seconds from localtime
HSTS
not offered
HPKP
No support for HTTP Public Key Pinning
Upgrade
Upgrade: h2,h2c

Server Defaults

TLS extensions
'renegotiation info/#65281' 'server name/#0' 'EC point formats/#11' 'session ticket/#35' 'status request/#5' 'supported versions/#43' 'key share/#51' 'supported_groups/#10' 'max fragment length/#1' 'application layer protocol negotiation/#16' 'encrypt-then-mac/#22' 'extended master secret/#23'
TLS session ticket
valid for 300 seconds only (<daily)
SSL sessionID support
yes
Session Ticket Resumption
supported
Session ID Resumption
supported
TLS timestamp
random
Signature algorithm
SHA256 with RSA
Key size
2048 bits
Key usage
Digital Signature, Key Encipherment
Extended key usage
cert_ext_keyusage
Serial number
048F988C3A750969D9DE0316EA875494B0E2
Fingerprint SHA1
B4E5C51B79E7C27B725B10DD1BA60B1C771B39EC
Fingerprint SHA256
8EC334EF45DC0FA55611792F040481BF852ED29E74BBAD82609A96B701577237
Certificate details
-----BEGIN CERTIFICATE----- MIIFkjCCBHqgAwIBAgISBI+YjDp1CWnZ3gMW6odUlLDiMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMTExMjYwNTEyMTdaFw0yMjAyMjQwNTEyMTZaMBsxGTAXBgNVBAMT EGNpbnNpZGVtZWRpYS5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQC06QkK/qKoV5OMrfY7drP7CRigKeQAeD7uLC3bGe6WGHJhgDa6bzkHZIHKpVqS J0RiwEQLtzYJlz8c+CTpisIMOQ5G4PzHz/XwNOkgbzgQk/p+2Q6y8qNUjX0Sl3Yi DXNqPdUHRi6s2HyuZ2gGoUUh/570FZKb6hIBY+lMYltrTYt3tdulOn62Zhsu4nv/ kbNS1bS0HQXfKd2pvaYgRLGShcJdoYz9LLdbZFo8dOffu6PGXLWh4Ye77WeVobvB ql/QUdJNd95TFVRb1h8oqeRe9a7/Gcx/5qd+Cecax9iaT+Cx822IMfIOmk9tnr2h 5HvMGd/ArluqKEys2jhIktSVAgMBAAGjggK3MIICszAOBgNVHQ8BAf8EBAMCBaAw HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD VR0OBBYEFJT6R/8bxulWM8k2c9ee/9YJI9dDMB8GA1UdIwQYMBaAFBQusxe3WFbL rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v cmcvMIGGBgNVHREEfzB9ghBjaW5zaWRlbWVkaWEuY29tghtjaW5zaWRlbWVkaWEu ZW5ld3N3b3JsZC5uZXSCFW1haWwuY2luc2lkZW1lZGlhLmNvbYIUd3d3LmNpbnNp ZGVtZWRpYS5jb22CH3d3dy5jaW5zaWRlbWVkaWEuZW5ld3N3b3JsZC5uZXQwTAYD VR0gBEUwQzAIBgZngQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYa aHR0cDovL2Nwcy5sZXRzZW5jcnlwdC5vcmcwggEEBgorBgEEAdZ5AgQCBIH1BIHy APAAdwBGpVXrdfqRIDC1oolp9PN9ESxBdL79SbiFq/L8cP5tRwAAAX1a34W6AAAE AwBIMEYCIQDRcxAy0osyj+P3KolMT/TT2VSEBvsOj5vxMiVM8ZduEAIhANYu8LLa 5kdw/aLuGJNuhhwIuFfY8EKRvzZ8pWAlRooKAHUAQcjKsd8iRkoQxqE6CUKHXk4x ixsD6+tLx2jwkGKWBvYAAAF9Wt+HQQAABAMARjBEAiAiLkNNlmateWfNpK2Tv6VF SFxWu9SenBrZzXb4SIUEmAIgOIIgwiwaojLwX9G6qyhmUWZcZp7A3Dfs0xRpwpEE 7ocwDQYJKoZIhvcNAQELBQADggEBAJgDdFD5fBRo2kgWTXIqMAhjjKfZUtpc3jOl Wf5vGHSqQL2w7ZGpyalzlvqeS6RzJpjfdwFIDq3x+/4Q4MmgctGfdkA2u9R7cGLE 1AbPXuwKuraB6O3mpqNoh6RRg4xUAHbrG5/VILQBeydIfOqxpH0DBqjgDSeemVcS M0JNMdR3xSBsdkyDwi3hYaPNBP2l3pkgR046gj/3t8KI741X/zBKmpyRmVwJdryY Z19J1yfztpAR4Jh3emvYvG3GnrBpih+wqvaapTT88qdBN6EyxBvAOky8blPNRi6r T4e6beb1yy0VZhpOaKbPW8kWvY5gIim3dI9i0MF/zrzInnMd4uc= -----END CERTIFICATE-----
Common names
cinsidemedia.com
Service Name Indication
enewsworld.net
SubjectAlternative Name
cinsidemedia.com cinsidemedia.enewsworld.net mail.cinsidemedia.com www.cinsidemedia.com www.cinsidemedia.enewsworld.net
Certificate authority issuers
R3 (Let's Encrypt from US)
Certificate trusted
Ok via SAN and CN (SNI mandatory)
Certificate chain trusted
Some certificate trust checks failed -> Microsoft (chain incomplete) Linux (chain incomplete) , OK -> Mozilla Apple
Is certificate Extended Validation
no
Days before expiry
82 >= 60 days
Valid from
2021-11-26 06:12
Valid until
2022-02-24 06:12
Chain
2
CRL distribution points
--
Online Certificate Status Protocol URL
http://r3.o.lencr.org
OCSP stapling
offered
cert mustStapleExtension
--
DNS CAArecord
--
certificate transparency
yes (certificate extension)

Server Preferences

order
NOT cipher order configured
Which protocol negotiated
Default protocol TLS1.3
negotiated
TLS13-AES-256-GCM-SHA384, 253 bit ECDH (X25519) (limited sense as client will pick)
order
at (limited sense as client will pick)
order
at (limited sense as client will pick)
order
at (limited sense as client will pick)
order
at (limited sense as client will pick)
order TLSv1.2
ECDHE-RSA-AES256-GCM-SHA384 at TLSv1.2 (limited sense as client will pick)
order TLSv1.3
TLS13-AES-128-GCM-SHA256 at TLSv1.3 (limited sense as client will pick)

Perfect Forward Secrecy

PFS
offered
PFS s
ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-CAMELLIA128-SHA256 ECDHE-RSA-CAMELLIA256-SHA384
ECDHE curves
prime256v1 secp384r1 secp521r1

Ciphers

ECDHE-RSA-AES256-GCM-SHA384 ECDH 521 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
(0xc030)
ECDHE-RSA-AES256-SHA384 ECDH 521 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
(0xc028)
ECDHE-RSA-AES256-SHA ECDH 521 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
(0xc014)
ECDHE-RSA-CAMELLIA256-SHA384 ECDH 521 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
(0xc077)
AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
(0x9d)
AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
(0x3d)
AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
(0x35)
CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
(0xc0)
CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
(0x84)
ECDHE-RSA-AES128-GCM-SHA256 ECDH 521 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
(0xc02f)
ECDHE-RSA-AES128-SHA256 ECDH 521 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
(0xc027)
ECDHE-RSA-AES128-SHA ECDH 521 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
(0xc013)
ECDHE-RSA-CAMELLIA128-SHA256 ECDH 521 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
(0xc076)
AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
(0x9c)
AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256
(0x3c)
AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
(0x2f)
CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
(0xba)
SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA
(0x96)
CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
(0x41)

Browser Simulations

Android 2.3.7
No connection
Android 4.1.1
No connection
Android 4.3
No connection
Android 4.4.2
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Android 5.0.0
TLSv1.2 ECDHE-RSA-AES256-SHA
Android 6.0
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 7.0
TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305
Windows Chrome 51
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows Chrome 57
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows Firefox 47
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows Firefox 53
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Windows XP Internet Explorer 6
No connection
Windows Vista Internet Explorer 7
No connection
Windows XP Internet Explorer 8
No connection
Windows 7 Internet Explorer 8
No connection
Windows 7 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES256-SHA384
Windows 8.1 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES256-SHA384
Windows 8.1 update Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES256-SHA384
Windows 10 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Windows 10 Edge 13
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Windows Phone 10 Edge 13
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Windows 7 Opera 17
TLSv1.2 ECDHE-RSA-AES256-SHA
MacOSX 10.6.8 Safari 5.1.9
No connection
iOS 7 Safari 7
TLSv1.2 ECDHE-RSA-AES256-SHA384
MacOSX 10.11 Safari 9
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
MacOSX 10.12 Safari 10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
iOS 9 App Transport Security 9
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Windows 7 Tor 7.0.9
No connection
Java 6 update 45
No connection
Java 7 update 25
No connection
Java 8 update 31
TLSv1.2 ECDHE-RSA-AES128-SHA256
OpenSSL 1.1.1
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
OpenSSL 1.0.2e
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384