| 1. General Results, most used to calculate the result |
A | name "bi.mobilearionet.com.mx" is subdomain, public suffix is ".com.mx", top-level-domain is ".mx", top-level-domain-type is "country-code", Country is Mexico, tld-manager is "NIC-Mexico
ITESM - Campus Monterrey", num .mx-domains preloaded: 390 (complete: 245733)
|
A | Good: All ip addresses are public addresses
|
| Warning: Only one ip address found: bi.mobilearionet.com.mx has only one ip address.
|
| Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: bi.mobilearionet.com.mx has no ipv6 address.
|
A | Good: No asked Authoritative Name Server had a timeout
|
A | DNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
|
A | Good - only one version with Http-Status 200
|
| HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
|
A | Good: All urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset)
|
| http://bi.mobilearionet.com.mx/ 35.247.89.91
| csrf_token=ImY5OTllOTc5NzVjYjE5MDk2YTZjMThjMTllOWI4OWMwZWJkZWM4M2Ei.Zo2yMw.wU_akFaXLaW8ONDoNhFO7zKnWP0; Path=/
| Fatal: Cookie sent via http. Never send Cookies / Session-Cookies via http. If a user uses an insecure WLan and if the same cookie is used to managed the authenticated session, it's possible to hack that user. Same with HttpOnly - without https that's only decorative.
|
| http://bi.mobilearionet.com.mx/ 35.247.89.91
| session=eyJfcGVybWFuZW50Ijp0cnVlLCJjc3JmX3Rva2VuIjoiZjk5OWU5Nzk3NWNiMTkwOTZhNmMxOGMxOWU5Yjg5YzBlYmRlYzgzYSJ9.Zo2yMw.h_VkrgpL7FlKPLBVd4LTmMIV_Tk; Expires=Wed, 10-Jul-2024 03:57:07 GMT; HttpOnly; Path=/
| Fatal: Cookie sent via http. Never send Cookies / Session-Cookies via http. If a user uses an insecure WLan and if the same cookie is used to managed the authenticated session, it's possible to hack that user. Same with HttpOnly - without https that's only decorative.
|
| http://bi.mobilearionet.com.mx/login?next=http%3A%2F%2Fbi.mobilearionet.com.mx%2F
| csrf_token=IjU2YTA1YzlhMmFmNzgyNTAxMzAxNGUyOWYyYzQ5YTU5N2Q0NjNlYmMi.Zo2yOQ.mQt1TineFnQ5Fo6Z0KNb9zXhXZE; Path=/
| Fatal: Cookie sent via http. Never send Cookies / Session-Cookies via http. If a user uses an insecure WLan and if the same cookie is used to managed the authenticated session, it's possible to hack that user. Same with HttpOnly - without https that's only decorative.
|
| http://bi.mobilearionet.com.mx/login?next=http%3A%2F%2Fbi.mobilearionet.com.mx%2F
| session=eyJfcGVybWFuZW50Ijp0cnVlLCJjc3JmX3Rva2VuIjoiNTZhMDVjOWEyYWY3ODI1MDEzMDE0ZTI5ZjJjNDlhNTk3ZDQ2M2ViYyJ9.Zo2yOQ.WX5XCyLcS_JwezK8TOJaCdwF9I4; Expires=Wed, 10-Jul-2024 03:57:13 GMT; HttpOnly; Path=/
| Fatal: Cookie sent via http. Never send Cookies / Session-Cookies via http. If a user uses an insecure WLan and if the same cookie is used to managed the authenticated session, it's possible to hack that user. Same with HttpOnly - without https that's only decorative.
|
| http://bi.mobilearionet.com.mx/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 35.247.89.91
| csrf_token=Ijg0ZDZmZDQ5YzRhNzI2NGI1YmQ1MWMxMjI4YTQyZmU5OWFlMGQ4YWUi.Zo2yNQ.Qa-KS6IUDurdlgyaIzVYm5GybHw; Path=/
| Fatal: Cookie sent via http. Never send Cookies / Session-Cookies via http. If a user uses an insecure WLan and if the same cookie is used to managed the authenticated session, it's possible to hack that user. Same with HttpOnly - without https that's only decorative.
|
| http://bi.mobilearionet.com.mx/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 35.247.89.91
| session=eyJfcGVybWFuZW50Ijp0cnVlLCJjc3JmX3Rva2VuIjoiODRkNmZkNDljNGE3MjY0YjViZDUxYzEyMjhhNDJmZTk5YWUwZDhhZSJ9.Zo2yNQ.H0sZ6L-OQb86XHhiQ8Rau4JsJQE; Expires=Wed, 10-Jul-2024 03:57:09 GMT; HttpOnly; Path=/
| Fatal: Cookie sent via http. Never send Cookies / Session-Cookies via http. If a user uses an insecure WLan and if the same cookie is used to managed the authenticated session, it's possible to hack that user. Same with HttpOnly - without https that's only decorative.
|
| http://bi.mobilearionet.com.mx/login?next=http%3A%2F%2Fbi.mobilearionet.com.mx%2F.well-known%2Facme-challenge%2Fcheck-your-website-dot-server-daten-dot-de
| csrf_token=ImVmMmMyOGRmMmIzMzNlMGE4ZmJjYWE5NzYzZjI1NjQxMzc4YTcyOTYi.Zo2yOQ.YaHh6NYyCAi5SAZrrfgWkW1zzRw; Path=/
| Fatal: Cookie sent via http. Never send Cookies / Session-Cookies via http. If a user uses an insecure WLan and if the same cookie is used to managed the authenticated session, it's possible to hack that user. Same with HttpOnly - without https that's only decorative.
|
| http://bi.mobilearionet.com.mx/login?next=http%3A%2F%2Fbi.mobilearionet.com.mx%2F.well-known%2Facme-challenge%2Fcheck-your-website-dot-server-daten-dot-de
| session=eyJfcGVybWFuZW50Ijp0cnVlLCJjc3JmX3Rva2VuIjoiZWYyYzI4ZGYyYjMzM2UwYThmYmNhYTk3NjNmMjU2NDEzNzhhNzI5NiJ9.Zo2yOQ.-ErrGNOkOwTRwL0-L4I7uoFSOmA; Expires=Wed, 10-Jul-2024 03:57:13 GMT; HttpOnly; Path=/
| Fatal: Cookie sent via http. Never send Cookies / Session-Cookies via http. If a user uses an insecure WLan and if the same cookie is used to managed the authenticated session, it's possible to hack that user. Same with HttpOnly - without https that's only decorative.
|
B | http://bi.mobilearionet.com.mx/ 35.247.89.91
| csrf_token=ImY5OTllOTc5NzVjYjE5MDk2YTZjMThjMTllOWI4OWMwZWJkZWM4M2Ei.Zo2yMw.wU_akFaXLaW8ONDoNhFO7zKnWP0; Path=/
| Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
|
B | http://bi.mobilearionet.com.mx/ 35.247.89.91
| session=eyJfcGVybWFuZW50Ijp0cnVlLCJjc3JmX3Rva2VuIjoiZjk5OWU5Nzk3NWNiMTkwOTZhNmMxOGMxOWU5Yjg5YzBlYmRlYzgzYSJ9.Zo2yMw.h_VkrgpL7FlKPLBVd4LTmMIV_Tk; Expires=Wed, 10-Jul-2024 03:57:07 GMT; HttpOnly; Path=/
| Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
|
B | http://bi.mobilearionet.com.mx/login?next=http%3A%2F%2Fbi.mobilearionet.com.mx%2F
| csrf_token=IjU2YTA1YzlhMmFmNzgyNTAxMzAxNGUyOWYyYzQ5YTU5N2Q0NjNlYmMi.Zo2yOQ.mQt1TineFnQ5Fo6Z0KNb9zXhXZE; Path=/
| Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
|
B | http://bi.mobilearionet.com.mx/login?next=http%3A%2F%2Fbi.mobilearionet.com.mx%2F
| session=eyJfcGVybWFuZW50Ijp0cnVlLCJjc3JmX3Rva2VuIjoiNTZhMDVjOWEyYWY3ODI1MDEzMDE0ZTI5ZjJjNDlhNTk3ZDQ2M2ViYyJ9.Zo2yOQ.WX5XCyLcS_JwezK8TOJaCdwF9I4; Expires=Wed, 10-Jul-2024 03:57:13 GMT; HttpOnly; Path=/
| Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
|
B | http://bi.mobilearionet.com.mx/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 35.247.89.91
| csrf_token=Ijg0ZDZmZDQ5YzRhNzI2NGI1YmQ1MWMxMjI4YTQyZmU5OWFlMGQ4YWUi.Zo2yNQ.Qa-KS6IUDurdlgyaIzVYm5GybHw; Path=/
| Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
|
B | http://bi.mobilearionet.com.mx/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 35.247.89.91
| session=eyJfcGVybWFuZW50Ijp0cnVlLCJjc3JmX3Rva2VuIjoiODRkNmZkNDljNGE3MjY0YjViZDUxYzEyMjhhNDJmZTk5YWUwZDhhZSJ9.Zo2yNQ.H0sZ6L-OQb86XHhiQ8Rau4JsJQE; Expires=Wed, 10-Jul-2024 03:57:09 GMT; HttpOnly; Path=/
| Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
|
B | http://bi.mobilearionet.com.mx/login?next=http%3A%2F%2Fbi.mobilearionet.com.mx%2F.well-known%2Facme-challenge%2Fcheck-your-website-dot-server-daten-dot-de
| csrf_token=ImVmMmMyOGRmMmIzMzNlMGE4ZmJjYWE5NzYzZjI1NjQxMzc4YTcyOTYi.Zo2yOQ.YaHh6NYyCAi5SAZrrfgWkW1zzRw; Path=/
| Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
|
B | http://bi.mobilearionet.com.mx/login?next=http%3A%2F%2Fbi.mobilearionet.com.mx%2F.well-known%2Facme-challenge%2Fcheck-your-website-dot-server-daten-dot-de
| session=eyJfcGVybWFuZW50Ijp0cnVlLCJjc3JmX3Rva2VuIjoiZWYyYzI4ZGYyYjMzM2UwYThmYmNhYTk3NjNmMjU2NDEzNzhhNzI5NiJ9.Zo2yOQ.-ErrGNOkOwTRwL0-L4I7uoFSOmA; Expires=Wed, 10-Jul-2024 03:57:13 GMT; HttpOnly; Path=/
| Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
|
H | Fatal error: No https - result with http-status 200, no encryption
|
H | Fatal error: http result with http-status 200, no encryption. Add a redirect http ⇒ https, so every connection is secure. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop.
|
I | http://bi.mobilearionet.com.mx/login?next=http%3A%2F%2Fbi.mobilearionet.com.mx%2F.well-known%2Facme-challenge%2Fcheck-your-website-dot-server-daten-dot-de
|
| Content problems or problems with resources included - http links, files doesn't exist, different Content-Type definitions. Not used to calculate the result because it's a http - check. But listed so you should fix it.
|
X | Fatal error: Nameserver doesn't support TCP connection: ns2.raxahost.com: Refused
|
X | Fatal error: Nameserver doesn't support TCP connection: ns3.raxahost.com / 54.39.18.125: Timeout
|
| Info: Checking the ip addresses of that domain name not exact one certificate found. So it's impossible to check if that domain requires Server Name Indication (SNI).: Domain bi.mobilearionet.com.mx, 1 ip addresses.
|
B | No _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.bi.mobilearionet.com.mx
|
| 2. Header-Checks |
U |
|
| No https result with http status 2** or 4** (standard-check) found, no header checked.
|
| 3. DNS- and NameServer - Checks |
A | Info:: 9 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 5 Name Servers.
|
A | Info:: 9 Queries complete, 5 with IPv6, 4 with IPv4.
|
| Warning: Only some DNS Queries done via ipv6. IPv6 is the future, so the name servers of your name servers should have ipv6 addresses.
|
A | Good: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns1.raxa.host (51.222.142.72), ns2.raxa.host (15.235.118.111), ns3.raxa.host (15.235.118.229)
|
A | Good (1 - 3.0):: An average of 1.8 queries per domain name server required to find all ip addresses of all name servers.
|
A | Info:: 6 different Name Servers found: ns1.raxa.host, ns1.raxahost.com, ns2.raxa.host, ns2.raxahost.com, ns3.raxa.host, ns3.raxahost.com, 3 Name Servers included in Delegation: ns1.raxahost.com, ns2.raxahost.com, ns3.raxahost.com, 3 Name Servers included in 2 Zone definitions: ns1.raxa.host, ns2.raxa.host, ns3.raxa.host, 1 Name Servers listed in SOA.Primary: ns1.raxa.host.
|
A | Good: Only one SOA.Primary Name Server found.: ns1.raxa.host.
|
| Error: SOA.Primary Name Server not included in the delegation set.: ns1.raxa.host.
|
X | Fatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: ns1.raxa.host (51.222.142.72): Delegation: ns1.raxahost.com, ns2.raxahost.com, ns3.raxahost.com, Zone: ns1.raxa.host, ns2.raxa.host, ns3.raxa.host. Name Servers defined in Delegation, missing in Zone: ns1.raxahost.com, ns2.raxahost.com, ns3.raxahost.com.Name Servers defined in Zone, missing in Delegation: ns1.raxa.host, ns2.raxa.host, ns3.raxa.host.
|
X | Fatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: ns1.raxahost.com (51.222.142.72): Delegation: ns1.raxahost.com, ns2.raxahost.com, ns3.raxahost.com, Zone: ns1.raxa.host, ns2.raxa.host, ns3.raxa.host. Name Servers defined in Delegation, missing in Zone: ns1.raxahost.com, ns2.raxahost.com, ns3.raxahost.com.Name Servers defined in Zone, missing in Delegation: ns1.raxa.host, ns2.raxa.host, ns3.raxa.host.
|
X | Fatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: ns2.raxa.host (15.235.118.111): Delegation: ns1.raxahost.com, ns2.raxahost.com, ns3.raxahost.com, Zone: ns1.raxa.host, ns2.raxa.host, ns3.raxa.host. Name Servers defined in Delegation, missing in Zone: ns1.raxahost.com, ns2.raxahost.com, ns3.raxahost.com.Name Servers defined in Zone, missing in Delegation: ns1.raxa.host, ns2.raxa.host, ns3.raxa.host.
|
X | Fatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: ns3.raxa.host (15.235.118.229): Delegation: ns1.raxahost.com, ns2.raxahost.com, ns3.raxahost.com, Zone: ns1.raxa.host, ns2.raxa.host, ns3.raxa.host. Name Servers defined in Delegation, missing in Zone: ns1.raxahost.com, ns2.raxahost.com, ns3.raxahost.com.Name Servers defined in Zone, missing in Delegation: ns1.raxa.host, ns2.raxa.host, ns3.raxa.host.
|
A | Good: All Name Server Domain Names have a Public Suffix.
|
| Error: Name Server Domain Names with Public Suffix and without ip address found.: 1 Name Servers without ipv4 and ipv6: 1
|
|
|
A | Info: Ipv4-Subnet-list: 5 Name Servers, 3 different subnets (first Byte): 15., 51., 54., 3 different subnets (first two Bytes): 15.235., 51.222., 54.39., 3 different subnets (first three Bytes): 15.235.118., 51.222.142., 54.39.18.
|
A | Good: Name Server IPv4-addresses from different subnet found:
|
X | Nameserver Timeout checking Echo Capitalization: ns3.raxahost.com / 54.39.18.125
|
X | Nameserver Timeout checking EDNS512: ns3.raxahost.com / 54.39.18.125
|
| Nameserver doesn't pass all EDNS-Checks: ns1.raxa.host: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
|
| Nameserver doesn't pass all EDNS-Checks: ns1.raxa.host: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
|
| Nameserver doesn't pass all EDNS-Checks: ns2.raxahost.com: OP100: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. FLAGS: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1DNSSEC: ok. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. CLIENTSUBNET: ok.
|
| Nameserver doesn't pass all EDNS-Checks: ns3.raxahost.com / 54.39.18.125: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
|
A | Good: All SOA have the same Serial Number
|
| Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.
|
| 4. Content- and Performance-critical Checks |
| http://bi.mobilearionet.com.mx/login?next=http%3A%2F%2Fbi.mobilearionet.com.mx%2F.well-known%2Facme-challenge%2Fcheck-your-website-dot-server-daten-dot-de
|
| Warning: Not existing ACME-file, but Server sends 200, not 404 or redirect. May be a problem creating a Letsencrypt certificate. Checking /.well-known/acme-challenge/random-filename - a http status 404 - Not Found - is expected. If your server sends content and a http status 200, the validation file (87 bytes, token, dot and the hash of the public part of the account key) may be invisible, so Letsencrypt can't validate your domain. If it is an application that sends this content, perhaps create an exception, so /.well-known/acme-challenge sends raw files. Or create a redirect to another domain and / or port 443, but your Letsencrypt client must support such a solution. Certbot: Use webroot as authenticator - https://certbot.eff.org/docs/using.html Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
|
| Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 1 external CSS / JavaScript files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 1 complete.
|
| Warning: Images with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 1 image files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 1 complete.
|
A | Good: All checked attribute values are enclosed in quotation marks (" or ').
|
| Wrong: img-elements without alt-attribute or empty alt-attribute found. The alt-attribute ("alternative") is required and should describe the img. So Screenreader and search engines are able to use these informations.: 1 img-elements without alt-attribute, 0 img-elements with empty alt-attribute found.
|
A | Good: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
|
A | Duration: 215550 milliseconds, 215.550 seconds
|