SSL Security Test of bura.jp

Test the SSL/TLS stack of your web or email server for security, cryptographic flaws and misconfigurations, and compliance with NIST & HIPAA
Free online tool with PDF report
  • Web Server SSL/TLS Security
  • Post-Quantum Cryptography (PQC) Readiness
  • Email Server SSL/TLS Security
  • PCI DSS, HIPAA & NIST Compliance
  • SSL Certificate Validity
  • Best-Practices Compliance
Free online tool with PDF report
181,416,713 tests performed
Provided "as is" without any warranty of any kind
225
tests
running
64,470
tests
in 24 hours
Tests in 24 Hours
Share this report:

Summary of bura.jp:443 (HTTPS) SSL Security Test

Provided "as is" without any warranty of any kind.
This test was made 2488 days ago and may be outdated
Refresh Test
Date/Time:Aug 1st, 2019 08:16 GMT+0
Source IP/Port:202.231.176.35:443
Protocol:HTTPS
Location:Tochigi, JapanJapan
Your final score:
  • A
  • B
  • C
  • F
F

Executive Summary for bura.jp

  • SSL/TLS Certificate Analysis
    1 SSL/TLS end-entity certificate(s) detected: the first certificate is an untrusted RSA 2048 bits certificate with unknown issuer valid until February 26, 2013. 1 certificate chain(s) detected. Show details.
  • PCI DSS Compliance Test
    12 of 36 supported cipher suites are not compliant with PCI DSS. The server supports PCI DSS compliant protocols (TLSv1.1 and TLSv1.2) as well as non-compliant protocols (SSLv3 and TLSv1.0). There are 5 more issue(s) which make the server non-compliant with PCI DSS: certificates have a weak signature, certificates are untrusted, poodle over ssl, 0-length openssl, cve-2016-2107. Show details.
  • NIST and HIPAA Compliance Test
    18 of 36 supported cipher suites are not compliant with NIST and HIPAA. The server supports NIST and HIPAA compliant protocols (TLSv1.0, TLSv1.1 and TLSv1.2) as well as non-compliant protocols (SSLv3). There are 6 more issue(s) which make the server non-compliant with NIST and HIPAA: X.509 certificates are not in version 3, certificates are self-signed, certificate does not provide OCSP revocation information, certificates have a weak signature, no support for common curves, EC point format extension. Show details.
  • Industry Best Practices Test
    3 issue(s) related to industry best practices were identified: server does not support TLS 1.3, server does not have cipher preference, server does not provide HSTS. Show details.
Please wait. Data is loading...
Please wait. Data is loading...
Share this report: