Summary of gnu.org:443 (HTTPS) SSL Security Test
Provided "as is" without any warranty of any kind.
This test was made 83 days ago and may be outdated
Refresh Test
Date/Time:Jan 8th, 2026 17:46 GMT+0
Source IP/Port:209.51.188.116:443
Protocol:HTTPS
Location:Mount Hope, United States
Your final score:
- A
- B
- C
- F
B
Executive Summary for gnu.org
- The server on the tested port is not currently prepared for post-quantum key exchange. The server’s certificate chain relies entirely on classical signature algorithms without post-quantum support. Show details.
- 1 certificate chain(s) detected. Show details.
- 8 of 17 supported cipher suites are not compliant with PCI DSS. The server supports PCI DSS compliant protocols (TLSv1.2 and TLSv1.3) as well as non-compliant protocols (TLSv1.0 and TLSv1.1). All supported elliptic curves are compliant with PCI DSS: P-256, P-521, P-384, X25519 and X448. There are 1 more issue(s) which make the server non-compliant with PCI DSS: potential Marvin Attack. Show details.
- 9 of 17 supported cipher suites are not compliant with NIST and HIPAA. The server supports NIST and HIPAA compliant protocols (TLSv1.2 and TLSv1.3) as well as non-compliant protocols (TLSv1.0 and TLSv1.1). All supported elliptic curves are compliant with NIST and HIPAA: P-256, P-521, P-384, X25519 and X448. There are 2 more issue(s) which make the server non-compliant with NIST and HIPAA: certificate does not provide OCSP revocation information, EC point format extension. Show details.
- No issues related to industry best practices were identified. Show details.