SSL/TLS Capabilities of Your Browser
User Agent: Mozilla (+http://web.nli.org.il/sites/NLI/English/collections/israel-collection/internet_archive/Pages/default.aspx)
Protocol Support
Logjam Vulnerability
For more information about the Logjam attack, please go to
weakdh.org.
To test manually, click here. Your user agent is not vulnerable if it fails to connect to the site.
To test manually, click here. Your user agent is not vulnerable if it fails to connect to the site.
FREAK Vulnerability
For more information about the FREAK attack, please go to
www.freakattack.com.
To test manually, click here. Your user agent is not vulnerable if it fails to connect to the site.
To test manually, click here. Your user agent is not vulnerable if it fails to connect to the site.
POODLE Vulnerability
For more information about the POODLE attack, please read this blog post.
SSL 2 Protocol Support
Your user agent supports SSL 2. You should upgrade.
SSL 2 is a very old, obsolete, and insecure version of the SSL protocol. You can usually disable this protocol
version in configuration, but modern clients don't support it at all. This really means that you should upgrade your software
to a better version.
iOS and OS X TLS Authentication Vulnerability
To test manually, click here. If your
user agent refuses to connect, you are not vulnerable. This test requires a connection to the SSL Labs
server on port 10443. A strict outbound firewall might interfere. You should test Safari running on
iOS or OS X. Chrome and Firefox are not vulnerable, even when running on a vulnerable operating system.
MORE »
Protocol Features
| Protocols | |
| TLS 1.2 | No |
| TLS 1.1 | No |
| TLS 1.0 | Yes* |
| SSL 3 | Yes* |
| SSL 2 | No |
| Cipher Suites (in order of preference) | ||
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)
Forward Secrecy
|
128 | |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
Forward Secrecy
|
128 | |
TLS_RSA_WITH_AES_128_CBC_SHA (0x2f)
|
128 | |
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (0xc004)
|
128 | |
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (0xc00e)
|
128 | |
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33)
Forward Secrecy
|
128 | |
TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x32)
Forward Secrecy2
|
128 | |
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (0xc007) INSECURE |
128 | |
TLS_ECDHE_RSA_WITH_RC4_128_SHA (0xc011) INSECURE |
128 | |
TLS_RSA_WITH_RC4_128_SHA (0x5) INSECURE |
128 | |
TLS_ECDH_ECDSA_WITH_RC4_128_SHA (0xc002) INSECURE |
128 | |
TLS_ECDH_RSA_WITH_RC4_128_SHA (0xc00c) INSECURE |
128 | |
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc008)
Forward Secrecy
|
112 | |
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (0xc012)
Forward Secrecy
|
112 | |
TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa)
|
112 | |
TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc003)
|
112 | |
TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (0xc00d)
|
112 | |
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0x16)
Forward Secrecy
|
112 | |
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0x13)
Forward Secrecy2
|
112 | |
TLS_RSA_WITH_RC4_128_MD5 (0x4) INSECURE |
128 | |
TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0xff) |
- | |
| (1) When a browser supports SSL 2, its SSL 2-only suites are shown only on the very first connection to this site. To see the suites, close all browser windows, then open this exact page directly. Don't refresh. | ||
| (2) Cannot be used for Forward Secrecy because they require DSA keys, which are effectively limited to 1024 bits. | ||
| Protocol Details | |
| Server Name Indication (SNI) | No |
| Secure Renegotiation | Yes |
| TLS compression | No |
| Session tickets | No |
| OCSP stapling | No |
| Signature algorithms | - |
| Elliptic curves | secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1 |
| Next Protocol Negotiation | No |
| Application Layer Protocol Negotiation | No |
| SSL 2 handshake compatibility | No |
Mixed Content Handling
| Mixed Content Tests | ||
| Images | Passive | Testing... |
| CSS | Active | Testing... |
| Scripts | Active | Testing... |
| XMLHttpRequest | Active | Testing... |
| WebSockets | Active | Testing... |
| Frames | Active | Testing... |
|
(1) These tests might cause a mixed content warning in your browser. That's expected. (2) If you see a failed test, try to reload the page. If the error persists, please get in touch. |
||
| Related Functionality | ||
| Upgrade Insecure Requests request header (more info) | No | |
