Summary of bura.jp:443 (HTTPS) SSL Security Test
Provided "as is" without any warranty of any kind.
This test was made 2488 days ago and may be outdated
Refresh Test
Date/Time:Aug 1st, 2019 08:16 GMT+0
Source IP/Port:202.231.176.35:443
Protocol:HTTPS
Location:Tochigi, Japan
Your final score:
- A
- B
- C
- F
F
Executive Summary for bura.jp
- 1 SSL/TLS end-entity certificate(s) detected: the first certificate is an untrusted RSA 2048 bits certificate with unknown issuer valid until February 26, 2013. 1 certificate chain(s) detected. Show details.
- 12 of 36 supported cipher suites are not compliant with PCI DSS. The server supports PCI DSS compliant protocols (TLSv1.1 and TLSv1.2) as well as non-compliant protocols (SSLv3 and TLSv1.0). There are 5 more issue(s) which make the server non-compliant with PCI DSS: certificates have a weak signature, certificates are untrusted, poodle over ssl, 0-length openssl, cve-2016-2107. Show details.
- 18 of 36 supported cipher suites are not compliant with NIST and HIPAA. The server supports NIST and HIPAA compliant protocols (TLSv1.0, TLSv1.1 and TLSv1.2) as well as non-compliant protocols (SSLv3). There are 6 more issue(s) which make the server non-compliant with NIST and HIPAA: X.509 certificates are not in version 3, certificates are self-signed, certificate does not provide OCSP revocation information, certificates have a weak signature, no support for common curves, EC point format extension. Show details.
- 3 issue(s) related to industry best practices were identified: server does not support TLS 1.3, server does not have cipher preference, server does not provide HSTS. Show details.