cruciblecenter.cf

Score 88/100

Web site information

Website image cruciblecenter.cf
IP Address
Font Scripts
Font Awesome
Web Servers
LiteSpeed
CMS
WordPress
JavaScript Frameworks
jQuery
Programming Languages
PHP

SEO data

title
My Blog – My WordPress Blog
viewport
width=device-width, initial-scale=1
robots
max-image-preview:large
generator
WordPress 5.8.3

Lighthouse

Performance
98/100
Accessibility
91/100
Best Practices
92/100
SEO
87/100
PWA
30/100

Protocols

SSLv2
not offered
SSLv3
not offered
TLS 1.0
not offered
TLS 1.1
not offered
TLS 1.2
offered
TLS 1.3
offered with final
ALPN HTTP2
h2
ALPN
spdy/3.1http/1.1spdy/2spdy/3

Vulnerabilities

heartbleed
not vulnerable, no heartbeat extension
CCS
not vulnerable
ticketbleed
not vulnerable
ROBOT
not vulnerable, no RSA key transport cipher
SSL renegotiation
supported
SSL client renegotiation
not vulnerable
CRIME TLS
not vulnerable
BREACH
potentially VULNERABLE, br gzip HTTP compression detected - only supplied '/' tested
POODLE SSL
not vulnerable, no SSLv3
fallback SCSV
no protocol below TLS 1.2 offered
SWEET32
not vulnerable
FREAK
not vulnerable
DROWN
not vulnerable on this host and port
DROWN hint
no RSA certificate, can't be used with SSLv2 elsewhere
LOGJAM
not vulnerable, no DH EXPORT ciphers,
LOGJAM-common primes
no DH key with <= TLS 1.2
BEAST
not vulnerable, no SSL3 or TLS1
LUCKY13
not vulnerable
winshock
not vulnerable
RC4
not vulnerable

Header Responses

Status code
200 OK ('/')
Clock skew
0 seconds from localtime
HTTP headerTime
1642193726
HSTS
not offered
HPKP
No support for HTTP Public Key Pinning
security headers
--

Server Defaults

TLS extensions
'renegotiation info/#65281' 'EC point formats/#11' 'session ticket/#35' 'key share/#51' 'supported versions/#43' 'extended master secret/#23' 'application layer protocol negotiation/#16' 'compress_certificate/#27'
TLS session ticket
valid for 7199 seconds only (<daily)
SSL sessionID support
yes
Session Ticket Resumption
supported
Session ID Resumption
supported
TLS timestamp
off by -3 seconds from your localtime
certificate compression
0002/Brotli
clientAuth
none
cert numbers
1
Signature algorithm
SHA256 with RSA
Key size
EC 384 bits (curve P-384)
Key usage
Digital Signature
Extended key usage
TLS Web Server Authentication, TLS Web Client Authentication
Serial number
03E711534FF2324DB1D5ACF57D9A3A88BD89
cert serialNumberLen
18
Fingerprint SHA1
3EEEB7EE0F552DCEF3ED6831B826AAC0D674B70B
Fingerprint SHA256
A5E78D5ED59D38729ED7540FD5C0F46D4DC47069FC86DD96318AB3BAFD30340C
Certificate details
-----BEGIN CERTIFICATE----- MIIEkDCCA3igAwIBAgISA+cRU0/yMk2x1az1fZo6iL2JMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMTEyMjIxNTUzMzlaFw0yMjAzMjIxNTUzMzhaMBwxGjAYBgNVBAMT EWNydWNpYmxlY2VudGVyLmNmMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEn5dUC8rf fj7z6mS47WGFvxduhCV+A3FKMKTsA14hz5vbWXefJZQl25ro34IhXJ7b6QzKCHv3 A5l3FSO/GFBYdzKdxEe7w3wU1aTESou4QI5kri3JoRH+Sd/na88CSS4Po4ICYjCC Al4wDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD AjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSAWm7VMin8yAMZY+ps497K1B6aaDAf BgNVHSMEGDAWgBQULrMXt1hWy65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJMEcw IQYIKwYBBQUHMAGGFWh0dHA6Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYW aHR0cDovL3IzLmkubGVuY3Iub3JnLzAxBgNVHREEKjAoghMqLmNydWNpYmxlY2Vu dGVyLmNmghFjcnVjaWJsZWNlbnRlci5jZjBMBgNVHSAERTBDMAgGBmeBDAECATA3 BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpodHRwOi8vY3BzLmxldHNlbmNy eXB0Lm9yZzCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB2AEHIyrHfIkZKEMahOglC h15OMYsbA+vrS8do8JBilgb2AAABfeMQDiEAAAQDAEcwRQIgLKYrO3hUTmPfsxr3 mjNv2WMFd4z4i2+XK/9CyL0O/TMCIQD7Ia3uC2rMoXMzaLeisoEjbFca8K86Dy/B BtSKZxyqBQB3ACl5vvCeOTkh8FZzn2Old+W+V32cYAr4+U1dJlwlXceEAAABfeMQ DgoAAAQDAEgwRgIhAMV16YTBwNUC0VvfPReHjPqZKnzk2XtFeSkhnMDA0/5aAiEA oh4JY4Po51dyiaMjPPNMJt2jRUrRFpNZFXCNgXrY8tcwDQYJKoZIhvcNAQELBQAD ggEBALNMHlTgscnVRO1Py94HxUBlp+Hx3HUzd3rSYoEdGpVm1+34dfRiLWSxcK19 DoNxOLhPuE7bw86zSRYqK4O47ouCvM0SvlbPe1ATzMRIxNF+2gY4NR3JifOPkzrB cKvYpnIGvW+qblifFphNdYP8Ohne6hHvevgXKSAyvVLME9H1+wXkCdTw33gyHBNU YJ/RdXAlAMmaC+p5LfFN7Uj3WAOca0QaWWS6OwEeNvs0lI8y4Ktuj8kw39sZYwTf PgAdYx5W0PmdYdhIIsNhMX29dINReg3y9fORjecziGFRgP/kQblWUPCko3JhrSLi KYhztsxlW1g4+u/m2PPKyBOSpOc= -----END CERTIFICATE-----
Common names
cruciblecenter.cf
Service Name Indication
da900.is.cc
SubjectAlternative Name
*.cruciblecenter.cf cruciblecenter.cf
Certificate trusted
Ok via SAN and CN (SNI mandatory)
Certificate chain trusted
Some certificate trust checks failed -> Microsoft (chain incomplete) Linux (chain incomplete) , OK -> Mozilla Apple
Is certificate Extended Validation
no
cert expirationStatus
66 >= 30 days
Valid from
2021-12-22 15:53
Valid until
2022-03-22 15:53
cert extlifeSpan
certificate has no extended life time according to browser forum
cert eTLS
not present
cert crlDistributionPoints
--
Online Certificate Status Protocol URL
http://r3.o.lencr.org
OCSP stapling
not offered
cert mustStapleExtension
--
DNS CAArecord
--
certificate transparency
yes (certificate extension)
Chain
2
certs list ordering problem
no
Certificate authority issuers
R3 (Let's Encrypt from US)
intermediate cert
-----BEGIN CERTIFICATE----- MIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw WhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg RW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP R5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx sxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm NHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg Z3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG /kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC AYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB Af8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA FHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw AoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw Oi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB gt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W PTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl ikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz CkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm lJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4 avAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2 yJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O yK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids hCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+ HlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv MldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX nLRbwHOoq7hHwg== -----END CERTIFICATE-----
intermediate cert fingerprintSHA256
67ADD1166B020AE61B8F5FC96813C04C2AA589960796865572A3C7E737613DFD
intermediate cert notBefore
2020-09-04 00:00
intermediate cert notAfter
2025-09-15 16:00
intermediate cert expiration
ok > 40 days
intermediate cert chain
R3 <-- ISRG Root X1
intermediate cert badOCSP
intermediate certificate(s) is/are ok

Server Preferences

order
server -- TLS 1.3 client determined
Which protocol negotiated
Default protocol TLS1.3
negotiated
TLS13-AES-256-GCM-SHA384, 253 bit ECDH (X25519)
order TLSv1 2
ECDHE-ECDSA-AES128-GCM-SHA256

Ciphers

Browser Simulations

Android 2.3.7
No connection
Android 4.1.1
No connection
Android 4.3
No connection
Android 4.4.2
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 5.0.0
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 6.0
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 7.0
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Chrome 51
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Chrome 57
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Firefox 47
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Firefox 53
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows XP Internet Explorer 6
No connection
Windows Vista Internet Explorer 7
No connection
Windows XP Internet Explorer 8
No connection
Windows 7 Internet Explorer 8
No connection
Windows 7 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 8.1 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 8.1 update Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 10 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 10 Edge 13
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Phone 10 Edge 13
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 7 Opera 17
No connection
MacOSX 10.6.8 Safari 5.1.9
No connection
iOS 7 Safari 7
No connection
MacOSX 10.11 Safari 9
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
MacOSX 10.12 Safari 10
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
iOS 9 App Transport Security 9
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 7 Tor 7.0.9
No connection
Java 6 update 45
No connection
Java 7 update 25
No connection
Java 8 update 31
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
OpenSSL 1.1.1
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
OpenSSL 1.0.2e
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256