Check DNS, Urls + Redirects, Certificates and Content of your Website




X

DNS-problem - authoritative Nameserver refused, not defined or timeout

Checked:
02.04.2024 11:19:10


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
bc-test.halter.ag
A
188.40.220.123
Tann/Zurich/Switzerland (CH) - Hetzner Online GmbH
Hostname: linux3.buerki-hosting.ch
yes
1
0

AAAA

yes


www.bc-test.halter.ag
A
188.40.220.123
Tann/Zurich/Switzerland (CH) - Hetzner Online GmbH
Hostname: linux3.buerki-hosting.ch
yes
1
0

AAAA

yes


*.halter.ag
A
188.40.220.123
yes



AAAA

yes



CNAME

yes


*.bc-test.halter.ag
A
188.40.220.123
yes



AAAA

yes



CNAME

yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



3 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 5613, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 30903, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.04.2024, 00:00:00 +, Signature-Inception: 01.04.2024, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: ag
ag
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 8905, DigestType 2 and Digest 483OMwtvFwKDwGoeOq0RwJitSoPPwPPLYD7PxJr0oFk=



1 RRSIG RR to validate DS RR found



RRSIG-Owner ag., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 15.04.2024, 05:00:00 +, Signature-Inception: 02.04.2024, 04:00:00 +, KeyTag 5613, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 5613 used to validate the DS RRSet in the parent zone



3 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 8905, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 16818, Flags 256



Public Key with Algorithm 8, KeyTag 38370, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner ag., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 22.04.2024, 15:41:08 +, Signature-Inception: 01.04.2024, 14:41:08 +, KeyTag 8905, Signer-Name: ag



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 8905 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 8905, DigestType 2 and Digest "483OMwtvFwKDwGoeOq0RwJitSoPPwPPLYD7PxJr0oFk=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: halter.ag
halter.ag
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "k5e33fi6ppkb27650to236s0gejp1mf9" between the hashed NSEC3-owner "jt9n8eov91bunqh1vo3v88v0f5fq1542" and the hashed NextOwner "kenhe5ghu62k1e0boscr362mq8lcf9co". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner jt9n8eov91bunqh1vo3v88v0f5fq1542.ag., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 22.04.2024, 15:41:08 +, Signature-Inception: 01.04.2024, 14:41:08 +, KeyTag 16818, Signer-Name: ag



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "poa72ffj15eua8f5n06o03ent3qems64" as Owner. That's the Hash of "ag" with the NextHashedOwnerName "ps0fhdebaeko0604bq6ppfg48sd0eog5". So that domain name is the Closest Encloser of "halter.ag". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner poa72ffj15eua8f5n06o03ent3qems64.ag., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 23.04.2024, 09:13:05 +, Signature-Inception: 02.04.2024, 08:13:05 +, KeyTag 16818, Signer-Name: ag



1 DNSKEY RR found



Public Key with Algorithm 13, KeyTag 28170, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner halter.ag., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 28170 used to validate the DNSKEY RRSet



Error: DNSKEY 28170 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.

Zone: bc-test.halter.ag
bc-test.halter.ag
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "*.halter.ag" and the NextOwner "_dmarc.halter.ag". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, RRSIG, NSEC



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: CNAME, RRSIG, NSEC



0 DNSKEY RR found






RRSIG Type 1 validates the A - Result: 188.40.220.123. RRSIG Owner has 3 labels, RRSIG Labels = 2, so it's a wildcard expansion, the Query Name doesn't exists. An additional NSEC/NSEC3 is required to confirm the Not-Existence of the query name.
Validated: RRSIG-Owner bc-test.halter.ag., Algorithm: 13, 2 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



A-Query sends a valid NSEC RR as result with the query name "bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that A RR.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner autodiscover.halter.ag., Algorithm: 13, 3 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



CNAME-Query sends a valid NSEC RR as result with the owner name *.halter.ag as the Wildcard-Expansion of the Closest Encloser of the query name "bc-test.halter.ag". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.halter.ag., Algorithm: 13, 2 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



CNAME-Query sends a valid NSEC RR as result with the query name "bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that CNAME RR.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner autodiscover.halter.ag., Algorithm: 13, 3 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



TXT-Query sends a valid NSEC RR as result with the owner name *.halter.ag as the Wildcard-Expansion of the Closest Encloser of the query name "bc-test.halter.ag". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.halter.ag., Algorithm: 13, 2 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



TXT-Query sends a valid NSEC RR as result with the query name "bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that TXT RR.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner autodiscover.halter.ag., Algorithm: 13, 3 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



AAAA-Query sends a valid NSEC RR as result with the owner name *.halter.ag as the Wildcard-Expansion of the Closest Encloser of the query name "bc-test.halter.ag". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.halter.ag., Algorithm: 13, 2 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



AAAA-Query sends a valid NSEC RR as result with the query name "bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that AAAA RR.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner autodiscover.halter.ag., Algorithm: 13, 3 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



TLSA-Query sends a valid NSEC RR as result with the owner name *.halter.ag as the Wildcard-Expansion of the Closest Encloser of the query name "_443._tcp.bc-test.halter.ag". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.halter.ag., Algorithm: 13, 2 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



TLSA-Query (_443._tcp.bc-test.halter.ag) sends a valid NSEC RR as result with the query name "_443._tcp.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.bc-test.halter.ag) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner autodiscover.halter.ag., Algorithm: 13, 3 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



CAA-Query sends a valid NSEC RR as result with the owner name *.halter.ag as the Wildcard-Expansion of the Closest Encloser of the query name "bc-test.halter.ag". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.halter.ag., Algorithm: 13, 2 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



CAA-Query sends a valid NSEC RR as result with the query name "bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that CAA RR.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner autodiscover.halter.ag., Algorithm: 13, 3 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.

Zone: www.bc-test.halter.ag
www.bc-test.halter.ag
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "*.halter.ag" and the NextOwner "_dmarc.halter.ag". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, RRSIG, NSEC



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: CNAME, RRSIG, NSEC



RRSIG Type 1 validates the A - Result: 188.40.220.123. RRSIG Owner has 4 labels, RRSIG Labels = 2, so it's a wildcard expansion, the Query Name doesn't exists. An additional NSEC/NSEC3 is required to confirm the Not-Existence of the query name.
Validated: RRSIG-Owner www.bc-test.halter.ag., Algorithm: 13, 2 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



A-Query sends a valid NSEC RR as result with the query name "www.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that A RR.A-Query sends a valid NSEC RR as result with the parent Wildcard "*.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner autodiscover.halter.ag., Algorithm: 13, 3 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



CNAME-Query sends a valid NSEC RR as result with the owner name *.halter.ag as the Wildcard-Expansion of the Closest Encloser of the query name "www.bc-test.halter.ag". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.halter.ag., Algorithm: 13, 2 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



CNAME-Query sends a valid NSEC RR as result with the query name "www.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that CNAME RR.CNAME-Query sends a valid NSEC RR as result with the parent Wildcard "*.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner autodiscover.halter.ag., Algorithm: 13, 3 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



TXT-Query sends a valid NSEC RR as result with the owner name *.halter.ag as the Wildcard-Expansion of the Closest Encloser of the query name "www.bc-test.halter.ag". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.halter.ag., Algorithm: 13, 2 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



TXT-Query sends a valid NSEC RR as result with the query name "www.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that TXT RR.TXT-Query sends a valid NSEC RR as result with the parent Wildcard "*.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner autodiscover.halter.ag., Algorithm: 13, 3 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



AAAA-Query sends a valid NSEC RR as result with the owner name *.halter.ag as the Wildcard-Expansion of the Closest Encloser of the query name "www.bc-test.halter.ag". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.halter.ag., Algorithm: 13, 2 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



AAAA-Query sends a valid NSEC RR as result with the query name "www.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that AAAA RR.AAAA-Query sends a valid NSEC RR as result with the parent Wildcard "*.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner autodiscover.halter.ag., Algorithm: 13, 3 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



TLSA-Query sends a valid NSEC RR as result with the owner name *.halter.ag as the Wildcard-Expansion of the Closest Encloser of the query name "_443._tcp.www.bc-test.halter.ag". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.halter.ag., Algorithm: 13, 2 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



TLSA-Query (_443._tcp.www.bc-test.halter.ag) sends a valid NSEC RR as result with the query name "_443._tcp.www.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.www.bc-test.halter.ag) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.www.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner autodiscover.halter.ag., Algorithm: 13, 3 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



CAA-Query sends a valid NSEC RR as result with the owner name *.halter.ag as the Wildcard-Expansion of the Closest Encloser of the query name "www.bc-test.halter.ag". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.halter.ag., Algorithm: 13, 2 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.



CAA-Query sends a valid NSEC RR as result with the query name "www.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that CAA RR.CAA-Query sends a valid NSEC RR as result with the parent Wildcard "*.bc-test.halter.ag" between the NSEC-owner "autodiscover.halter.ag" and the NextOwner "mail.halter.ag". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner autodiscover.halter.ag., Algorithm: 13, 3 Labels, original TTL: 600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 28170, Signer-Name: halter.ag



Status: Good. NoData-Proof required and found.


3. Name Servers

DomainNameserverNS-IP
www.bc-test.halter.ag
  dns11.firestorm.ch

bc-test.halter.ag
  dns11.firestorm.ch / dns11
188.40.219.50
Tann/Zurich/Switzerland (CH) - Hetzner Online GmbH


 
2a01:4f8:d0:6600::32
Tann/Zurich/Switzerland (CH) - Hetzner Online GmbH

halter.ag
  dns11.firestorm.ch


  ns1.serverarray.ch / dns11
188.40.219.50
Tann/Zurich/Switzerland (CH) - Hetzner Online GmbH


  ns2.serverarray.ch / dns12.firestorm-isp.com
188.40.216.50
Tann/Zurich/Switzerland (CH) - Hetzner Online GmbH


  ns3.serverarray.ch / dns13.firestorm-isp.com
46.140.230.170
Rechthalten/Fribourg/Switzerland (CH) - UPC Schweiz GmbH


  ns4.serverarray.ch / dns14.firestorm.ch
188.40.220.180
Tann/Zurich/Switzerland (CH) - Hetzner Online GmbH

ag
  a0.cctld.afilias-nst.info / app21.nrt1.hosts.meta.redstone.afilias-nst.info-1615580861


  a2.cctld.afilias-nst.info / FRA5


  b0.cctld.afilias-nst.org / app6.ams2.hosts.meta.redstone.afilias-nst.info-1615580861


  b2.cctld.afilias-nst.org / FRA3


  c0.cctld.afilias-nst.info / app26.ams2.hosts.meta.redstone.afilias-nst.info-1615580861


  d0.cctld.afilias-nst.org / app21.nrt1.hosts.meta.redstone.afilias-nst.info-1615580861


4. SOA-Entries


Domain:ag
Zone-Name:ag
Primary:a0.cctld.afilias-nst.info
Mail:hostmaster.donuts.email
Serial:1712049140
Refresh:7200
Retry:900
Expire:1209600
TTL:3600
num Entries:6


Domain:halter.ag
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:halter.ag
Zone-Name:halter.ag
Primary:dns11.firestorm.ch
Mail:info.firestorm.ch
Serial:2024032807
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:4


Domain:bc-test.halter.ag
Zone-Name:halter.ag
Primary:dns11.firestorm.ch
Mail:info.firestorm.ch
Serial:2024032807
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:2


Domain:www.bc-test.halter.ag
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

Startaddress: https://bc-test.halter.ag/, address used: https://linux3.buerki-hosting.ch:8443/login_up.php?success_redirect_url=%2F, Screenshot created 2024-04-02 11:40:52 +00:0 url is insecure, certificate invalid

Mobil (412px x 732px)

1090 milliseconds

Screenshot mobile - https://linux3.buerki-hosting.ch:8443/login_up.php?success_redirect_url=%2F
Mobil + Landscape (732px x 412px)

1056 milliseconds

Screenshot mobile landscape - https://linux3.buerki-hosting.ch:8443/login_up.php?success_redirect_url=%2F
Screen (1280px x 1680px)

1299 milliseconds

Screenshot Desktop - https://linux3.buerki-hosting.ch:8443/login_up.php?success_redirect_url=%2F

Mobile- and other Chrome-Checks

widthheight
visual Viewport396732
content Size396967

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://bc-test.halter.ag/
188.40.220.123
301
https://bc-test.halter.ag/
Html is minified: 109.46 %
0.060
A
Server: nginx
Date: Tue, 02 Apr 2024 09:20:16 GMT
Connection: close
Location: https://bc-test.halter.ag/
Content-Type: text/html
Content-Length: 162

• http://www.bc-test.halter.ag/
188.40.220.123
301
https://www.bc-test.halter.ag/
Html is minified: 109.46 %
0.053
A
Server: nginx
Date: Tue, 02 Apr 2024 09:20:16 GMT
Connection: close
Location: https://www.bc-test.halter.ag/
Content-Type: text/html
Content-Length: 162

• https://bc-test.halter.ag/
188.40.220.123 GZip used - 127 / 128 - 0.78 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 100.00 %
2.540
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx
Date: Tue, 02 Apr 2024 09:20:16 GMT
Connection: close
X-Accel-Version: 0.01
ETag: "80-51715f5ffe120-gzip"
Accept-Ranges: bytes
Vary: Accept-Encoding
X-Powered-By: PleskLin
Content-Type: text/html
Content-Length: 127
Last-Modified: Wed, 27 May 2015 20:19:32 GMT
Content-Encoding: gzip

• https://www.bc-test.halter.ag/
188.40.220.123 GZip used - 127 / 128 - 0.78 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 100.00 %
2.380
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx
Date: Tue, 02 Apr 2024 09:20:20 GMT
Connection: close
X-Accel-Version: 0.01
ETag: "80-51715f5ffe120-gzip"
Accept-Ranges: bytes
Vary: Accept-Encoding
X-Powered-By: PleskLin
Content-Type: text/html
Content-Length: 127
Last-Modified: Wed, 27 May 2015 20:19:32 GMT
Content-Encoding: gzip

• http://bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
188.40.220.123
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 109.46 %
0.057
A
Visible Content:
Server: nginx
Date: Tue, 02 Apr 2024 09:20:23 GMT
Connection: close
Location: https://bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-Type: text/html
Content-Length: 162

• http://www.bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
188.40.220.123
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://www.bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 109.46 %
0.060
A
Visible Content:
Server: nginx
Date: Tue, 02 Apr 2024 09:20:23 GMT
Connection: close
Location: https://www.bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-Type: text/html
Content-Length: 162

• https://bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 110.61 %
2.210
N
Not Found
Certificate error: RemoteCertificateNameMismatch
Visible Content:
Server: nginx
Date: Tue, 02 Apr 2024 09:20:26 GMT
Connection: close
Content-Type: text/html
Content-Length: 146

• https://www.bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 110.61 %
2.237
N
Not Found
Certificate error: RemoteCertificateNameMismatch
Visible Content:
Server: nginx
Date: Tue, 02 Apr 2024 09:20:29 GMT
Connection: close
Content-Type: text/html
Content-Length: 146

• https://188.40.220.123/
188.40.220.123 GZip used - 127 / 128 - 0.78 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 100.00 %
2.323
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx
Date: Tue, 02 Apr 2024 09:20:23 GMT
Connection: close
X-Accel-Version: 0.01
ETag: "80-51715f5ffe120-gzip"
Accept-Ranges: bytes
Vary: Accept-Encoding
X-Powered-By: PleskLin
Content-Type: text/html
Content-Length: 127
Last-Modified: Wed, 27 May 2015 20:19:32 GMT
Content-Encoding: gzip

7. Comments


1. General Results, most used to calculate the result

Aname "bc-test.halter.ag" is subdomain, public suffix is ".ag", top-level-domain is ".ag", top-level-domain-type is "country-code", Country is Antigua and Barbuda, tld-manager is "UHSA School of Medicine", num .ag-domains preloaded: 136 (complete: 240622)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: bc-test.halter.ag has only one ip address.
Warning: Only one ip address found: www.bc-test.halter.ag has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: bc-test.halter.ag has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.bc-test.halter.ag has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
AGood: destination is https
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (5 urls)
https://bc-test.halter.ag/ 188.40.220.123


Url with incomplete Content-Type - header - missing charset
https://www.bc-test.halter.ag/ 188.40.220.123


Url with incomplete Content-Type - header - missing charset
https://bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de


Url with incomplete Content-Type - header - missing charset
https://www.bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de


Url with incomplete Content-Type - header - missing charset
https://188.40.220.123/ 188.40.220.123


Url with incomplete Content-Type - header - missing charset
Ahttp://bc-test.halter.ag/ 188.40.220.123
301
https://bc-test.halter.ag/
Correct redirect http - https with the same domain name
Ahttp://www.bc-test.halter.ag/ 188.40.220.123
301
https://www.bc-test.halter.ag/
Correct redirect http - https with the same domain name
Bhttps://bc-test.halter.ag/ 188.40.220.123
200

Missing HSTS-Header
Bhttps://www.bc-test.halter.ag/ 188.40.220.123
200

Missing HSTS-Header
Bhttps://bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404

Missing HSTS-Header
Bhttps://www.bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404

Missing HSTS-Header
CError - no preferred version www or non-www. Select one version as preferred version, then add a redirect https + not-preferred version to https + preferred version. Perhaps in your port 443 vHost something like "RewriteEngine on" + "RewriteCond %{SERVER_NAME} = example.com" + "ReWriteRule ^ https://www.example.com%{REQUEST_URI} [END,QSA,R=permanent]" (three rows, without the "). That should create a redirect https + example.com ⇒ https + www.example.com. Or switch both values to use the non-www version as your preferred version.
CError - more then one version with Http-Status 200. After all redirects, all users (and search engines) should see the same https url: Non-www or www, but not both with http status 200.
Nhttps://bc-test.halter.ag/ 188.40.220.123
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://www.bc-test.halter.ag/ 188.40.220.123
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://www.bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://188.40.220.123/ 188.40.220.123
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nwww.bc-test.halter.ag:25


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nbc-test.halter.ag:25


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nwww.bc-test.halter.ag:465


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nbc-test.halter.ag:465


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nbc-test.halter.ag:587


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nwww.bc-test.halter.ag:587


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nwww.bc-test.halter.ag:993


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nbc-test.halter.ag:993


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nbc-test.halter.ag:995


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nwww.bc-test.halter.ag:995


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nbc-test.halter.ag:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nwww.bc-test.halter.ag:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Obc-test.halter.ag / 188.40.220.123 / 25


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 7 Cipher Suites without Forward Secrecy found
Obc-test.halter.ag / 188.40.220.123 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 6 Cipher Suites without Forward Secrecy found
Obc-test.halter.ag / 188.40.220.123 / 465


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 7 Cipher Suites without Forward Secrecy found
Obc-test.halter.ag / 188.40.220.123 / 587


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 7 Cipher Suites without Forward Secrecy found
Obc-test.halter.ag / 188.40.220.123 / 993


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 7 Cipher Suites without Forward Secrecy found
Obc-test.halter.ag / 188.40.220.123 / 995


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 7 Cipher Suites without Forward Secrecy found
Obc-test.halter.ag / 188.40.220.123 / 8443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 7 Cipher Suites without Forward Secrecy found
Owww.bc-test.halter.ag / 188.40.220.123 / 25


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 7 Cipher Suites without Forward Secrecy found
Owww.bc-test.halter.ag / 188.40.220.123 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 6 Cipher Suites without Forward Secrecy found
Owww.bc-test.halter.ag / 188.40.220.123 / 465


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 7 Cipher Suites without Forward Secrecy found
Owww.bc-test.halter.ag / 188.40.220.123 / 587


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 7 Cipher Suites without Forward Secrecy found
Owww.bc-test.halter.ag / 188.40.220.123 / 993


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 7 Cipher Suites without Forward Secrecy found
Owww.bc-test.halter.ag / 188.40.220.123 / 995


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 7 Cipher Suites without Forward Secrecy found
Owww.bc-test.halter.ag / 188.40.220.123 / 8443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 7 Cipher Suites without Forward Secrecy found
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain bc-test.halter.ag, 1 ip addresses, 1 different http results.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain www.bc-test.halter.ag, 1 ip addresses, 1 different http results.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.bc-test.halter.ag

2. Header-Checks

Fbc-test.halter.ag 188.40.220.123
Content-Security-Policy
Critical: Missing Header:
Fbc-test.halter.ag 188.40.220.123
X-Content-Type-Options
Critical: Missing Header:
Fbc-test.halter.ag 188.40.220.123
Referrer-Policy
Critical: Missing Header:
Fbc-test.halter.ag 188.40.220.123
Permissions-Policy
Critical: Missing Header:
Fwww.bc-test.halter.ag 188.40.220.123
Content-Security-Policy
Critical: Missing Header:
Fwww.bc-test.halter.ag 188.40.220.123
X-Content-Type-Options
Critical: Missing Header:
Fwww.bc-test.halter.ag 188.40.220.123
Referrer-Policy
Critical: Missing Header:
Fwww.bc-test.halter.ag 188.40.220.123
Permissions-Policy
Critical: Missing Header:

3. DNS- and NameServer - Checks

AInfo:: 15 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 4 Name Servers.
AInfo:: 15 Queries complete, 15 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 3.8 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 5 different Name Servers found: dns11.firestorm.ch, ns1.serverarray.ch, ns2.serverarray.ch, ns3.serverarray.ch, ns4.serverarray.ch, 3 Name Servers included in Delegation: ns1.serverarray.ch, ns2.serverarray.ch, ns3.serverarray.ch, 4 Name Servers included in 2 Zone definitions: ns1.serverarray.ch, ns2.serverarray.ch, ns3.serverarray.ch, ns4.serverarray.ch, 1 Name Servers listed in SOA.Primary: dns11.firestorm.ch.
AGood: Only one SOA.Primary Name Server found.: dns11.firestorm.ch.
Error: SOA.Primary Name Server not included in the delegation set.: dns11.firestorm.ch.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: ns1.serverarray.ch (188.40.219.50): Delegation: ns1.serverarray.ch, ns2.serverarray.ch, ns3.serverarray.ch, Zone: ns1.serverarray.ch, ns2.serverarray.ch, ns3.serverarray.ch, ns4.serverarray.ch. Name Servers defined in Zone, missing in Delegation: ns4.serverarray.ch.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: ns2.serverarray.ch (188.40.216.50): Delegation: ns1.serverarray.ch, ns2.serverarray.ch, ns3.serverarray.ch, Zone: ns1.serverarray.ch, ns2.serverarray.ch, ns3.serverarray.ch, ns4.serverarray.ch. Name Servers defined in Zone, missing in Delegation: ns4.serverarray.ch.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: ns3.serverarray.ch (46.140.230.170): Delegation: ns1.serverarray.ch, ns2.serverarray.ch, ns3.serverarray.ch, Zone: ns1.serverarray.ch, ns2.serverarray.ch, ns3.serverarray.ch, ns4.serverarray.ch. Name Servers defined in Zone, missing in Delegation: ns4.serverarray.ch.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: ns4.serverarray.ch (188.40.220.180): Delegation: ns1.serverarray.ch, ns2.serverarray.ch, ns3.serverarray.ch, Zone: ns1.serverarray.ch, ns2.serverarray.ch, ns3.serverarray.ch, ns4.serverarray.ch. Name Servers defined in Zone, missing in Delegation: ns4.serverarray.ch.
AGood: All Name Server Domain Names have a Public Suffix.
Error: Name Server Domain Names with Public Suffix and without ip address found.: 1 Name Servers without ipv4 and ipv6: 1

AGood: Minimal 2 different name servers (public suffix and public ip address) found: 4 different Name Servers found
Warning: No Name Server IPv6 address found. IPv6 is the future, so your name servers should be visible via IPv6.: 4 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 4 Name Servers, 1 Top Level Domain: ch
AGood: Name Servers with different domain names found.: 2 different Domains found
Warning: All Name Servers from the same Country / IP location.: 4 Name Servers, 1 Countries: CH
AInfo: Ipv4-Subnet-list: 4 Name Servers, 2 different subnets (first Byte): 188., 46., 2 different subnets (first two Bytes): 188.40., 46.140., 4 different subnets (first three Bytes): 188.40.216., 188.40.219., 188.40.220., 46.140.230.
AGood: Name Server IPv4-addresses from different subnet found:
AGood: Nameserver supports TCP connections: 2 good Nameserver
AGood: Nameserver supports Echo Capitalization: 2 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 2 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 2 good Nameserver
Nameserver doesn't pass all EDNS-Checks: dns11.firestorm.ch: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: dns11.firestorm.ch: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: No https + http status 200 with inline CSS / JavaScript found
AGood: Every https result with status 200 has a minified Html-Content with a quota lower then 110 %.
AGood: Every https connection via port 443 supports the http/2 protocol via ALPN.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
https://bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404
2.210 seconds
Warning: 404 needs more then one second
https://www.bc-test.halter.ag/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404
2.237 seconds
Warning: 404 needs more then one second
ADuration: 1325120 milliseconds, 1325.120 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
bc-test.halter.ag
188.40.220.123
443
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
bc-test.halter.ag
188.40.220.123
443
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=linux3.buerki-hosting.ch

2CN=R3, O=Let's Encrypt, C=US


www.bc-test.halter.ag
188.40.220.123
443
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

www.bc-test.halter.ag
188.40.220.123
443
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=linux3.buerki-hosting.ch

2CN=R3, O=Let's Encrypt, C=US


bc-test.halter.ag
bc-test.halter.ag
443
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

bc-test.halter.ag
bc-test.halter.ag
443
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=linux3.buerki-hosting.ch

2CN=R3, O=Let's Encrypt, C=US


www.bc-test.halter.ag
www.bc-test.halter.ag
443
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

www.bc-test.halter.ag
www.bc-test.halter.ag
443
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=linux3.buerki-hosting.ch

2CN=R3, O=Let's Encrypt, C=US


188.40.220.123
188.40.220.123
443
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

188.40.220.123
188.40.220.123
443
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=linux3.buerki-hosting.ch

2CN=R3, O=Let's Encrypt, C=US


bc-test.halter.ag
188.40.220.123
25
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

bc-test.halter.ag
188.40.220.123
25
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2


bc-test.halter.ag
188.40.220.123
465
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok

bc-test.halter.ag
188.40.220.123
465
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=linux3.buerki-hosting.ch

2CN=R3, O=Let's Encrypt, C=US


bc-test.halter.ag
188.40.220.123
587
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

bc-test.halter.ag
188.40.220.123
587
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2


bc-test.halter.ag
188.40.220.123
993
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok

bc-test.halter.ag
188.40.220.123
993
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=linux3.buerki-hosting.ch

2CN=R3, O=Let's Encrypt, C=US


bc-test.halter.ag
188.40.220.123
995
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok

bc-test.halter.ag
188.40.220.123
995
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=linux3.buerki-hosting.ch

2CN=R3, O=Let's Encrypt, C=US


bc-test.halter.ag
188.40.220.123
8443
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok

bc-test.halter.ag
188.40.220.123
8443
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=linux3.buerki-hosting.ch

2CN=R3, O=Let's Encrypt, C=US


www.bc-test.halter.ag
188.40.220.123
25
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

www.bc-test.halter.ag
188.40.220.123
25
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2


www.bc-test.halter.ag
188.40.220.123
465
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok

www.bc-test.halter.ag
188.40.220.123
465
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=linux3.buerki-hosting.ch

2CN=R3, O=Let's Encrypt, C=US


www.bc-test.halter.ag
188.40.220.123
587
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

www.bc-test.halter.ag
188.40.220.123
587
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2


www.bc-test.halter.ag
188.40.220.123
993
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok

www.bc-test.halter.ag
188.40.220.123
993
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=linux3.buerki-hosting.ch

2CN=R3, O=Let's Encrypt, C=US


www.bc-test.halter.ag
188.40.220.123
995
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok

www.bc-test.halter.ag
188.40.220.123
995
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=linux3.buerki-hosting.ch

2CN=R3, O=Let's Encrypt, C=US


www.bc-test.halter.ag
188.40.220.123
8443
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok

www.bc-test.halter.ag
188.40.220.123
8443
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=linux3.buerki-hosting.ch

2CN=R3, O=Let's Encrypt, C=US


9. Certificates

1.
1.
CN=linux3.buerki-hosting.ch
18.03.2024
16.06.2024
expires in 59 days
linux3.buerki-hosting.ch, linux3.serverarray.ch, webmail.linux3.buerki-hosting.ch, www.linux3.buerki-hosting.ch, www.linux3.serverarray.ch - 5 entries
1.
1.
CN=linux3.buerki-hosting.ch
18.03.2024

16.06.2024
expires in 59 days
linux3.buerki-hosting.ch, linux3.serverarray.ch, webmail.linux3.buerki-hosting.ch, www.linux3.buerki-hosting.ch, www.linux3.serverarray.ch - 5 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0462F169834E6B8F1431D308E126D94DE2B5
Thumbprint:D9D0F593255E7CA30EAB1C8B9BD668837AB7BD11
SHA256 / Certificate:nRxGUYPsQ3y9rGNEHp8sYgDOTu1dhA4N2PlnrSwJ/aM=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):9a683d959993b641bc83a3ea36eec033134daf0c30a3f7201c26ca698ad2e7c1
SHA256 hex / Subject Public Key Information (SPKI):9a683d959993b641bc83a3ea36eec033134daf0c30a3f7201c26ca698ad2e7c1 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 515 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 515 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4064 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4064 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


2.
1.
CN=linux3.buerki-hosting.ch
18.03.2024
16.06.2024
expires in 59 days
linux3.buerki-hosting.ch - 1 entry
2.
1.
CN=linux3.buerki-hosting.ch
18.03.2024

16.06.2024
expires in 59 days
linux3.buerki-hosting.ch - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:04AF9170358C363BB49C1E794DB778E08493
Thumbprint:99BFEAC8A894509452B829CD7B3AD16E7749FBD8
SHA256 / Certificate:5b4I7Rl8inwG/QxThkgxlHQAmluR0H0fd+2hO6Hfygk=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8c3f2a8da4b26d30f169b9d1a5cc1173352617849c6c270b0e194dbbdf3c40c1
SHA256 hex / Subject Public Key Information (SPKI):8c3f2a8da4b26d30f169b9d1a5cc1173352617849c6c270b0e194dbbdf3c40c1 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 515 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 515 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4064 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4064 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

No CRT - CT-Log entries found


11. Html-Content - Entries

Summary

Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://bc-test.halter.ag/
188.40.220.123
meta
other
1

0


0
0
0

https://www.bc-test.halter.ag/
188.40.220.123
meta
other
1

0


0
0
0

https://188.40.220.123/
188.40.220.123
meta
other
1

0


0
0
0

Details

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://bc-test.halter.ag/
188.40.220.123
meta
refresh
0; URL=https://linux3.buerki-hosting.ch:8443/


1
ok







https://www.bc-test.halter.ag/
188.40.220.123
meta
refresh
0; URL=https://linux3.buerki-hosting.ch:8443/


1
ok







https://188.40.220.123/
188.40.220.123
meta
refresh
0; URL=https://linux3.buerki-hosting.ch:8443/


1
ok








12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns1.serverarray.ch, ns2.serverarray.ch, ns3.serverarray.ch, ns4.serverarray.ch

QNr.DomainTypeNS used
1
ch
NS
e.root-servers.net (2001:500:a8::e)

Answer: a.nic.ch, b.nic.ch, d.nic.ch, e.nic.ch, f.nic.ch
2
ns1.serverarray.ch
NS
a.nic.ch (2001:620:0:ff::56)

Answer: dns11.firestorm.ch, dns12.firestorm-isp.com, dns13.firestorm-isp.com, dns14.firestorm.ch

Answer: dns11.firestorm.ch
188.40.219.50, 2a01:4f8:d0:6600::32

Answer: dns14.firestorm.ch
185.206.180.93, 2a0b:1640:1:1:1:1:12cd:a04a
3
ns2.serverarray.ch
NS
a.nic.ch (2001:620:0:ff::56)

Answer: dns11.firestorm.ch, dns12.firestorm-isp.com, dns13.firestorm-isp.com, dns14.firestorm.ch

Answer: dns11.firestorm.ch
188.40.219.50, 2a01:4f8:d0:6600::32

Answer: dns14.firestorm.ch
185.206.180.93, 2a0b:1640:1:1:1:1:12cd:a04a
4
ns3.serverarray.ch
NS
a.nic.ch (2001:620:0:ff::56)

Answer: dns11.firestorm.ch, dns12.firestorm-isp.com, dns13.firestorm-isp.com, dns14.firestorm.ch

Answer: dns11.firestorm.ch
188.40.219.50, 2a01:4f8:d0:6600::32

Answer: dns14.firestorm.ch
185.206.180.93, 2a0b:1640:1:1:1:1:12cd:a04a
5
ns4.serverarray.ch
NS
a.nic.ch (2001:620:0:ff::56)

Answer: dns11.firestorm.ch, dns12.firestorm-isp.com, dns13.firestorm-isp.com, dns14.firestorm.ch

Answer: dns11.firestorm.ch
188.40.219.50, 2a01:4f8:d0:6600::32

Answer: dns14.firestorm.ch
185.206.180.93, 2a0b:1640:1:1:1:1:12cd:a04a
6
com
NS
f.root-servers.net (2001:500:2f::f)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
7
dns12.firestorm-isp.com: 188.40.216.50, 188.40.220.180, 2001:41d0:404:200::201, 2a01:4f8:d0:6500::b4, 2a01:4f8:d0:6700::32, 2a01:4f8:d0:6700:ff::32, 46.140.230.170, 51.91.77.116
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: dns13.firestorm-isp.com
2001:41d0:404:200::201, 51.91.77.116
8
ns1.serverarray.ch: 188.40.219.50
A
dns11.firestorm.ch (2a01:4f8:d0:6600::32)
9
ns1.serverarray.ch: No AAAA record found
AAAA
dns11.firestorm.ch (2a01:4f8:d0:6600::32)
10
ns2.serverarray.ch: 188.40.216.50
A
dns11.firestorm.ch (2a01:4f8:d0:6600::32)
11
ns2.serverarray.ch: No AAAA record found
AAAA
dns11.firestorm.ch (2a01:4f8:d0:6600::32)
12
ns3.serverarray.ch: 46.140.230.170
A
dns11.firestorm.ch (2a01:4f8:d0:6600::32)
13
ns3.serverarray.ch: No AAAA record found
AAAA
dns11.firestorm.ch (2a01:4f8:d0:6600::32)
14
ns4.serverarray.ch: 188.40.220.180
A
dns11.firestorm.ch (2a01:4f8:d0:6600::32)
15
ns4.serverarray.ch: No AAAA record found
AAAA
dns11.firestorm.ch (2a01:4f8:d0:6600::32)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.bc-test.halter.ag
0

no CAA entry found
1
0
bc-test.halter.ag
0

no CAA entry found
1
0
halter.ag
0

no CAA entry found
1
0
ag
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
halter.ag
MS=ms87633115
ok
1
0
halter.ag
v=spf1 a mx include:spf.protection.outlook.com ~all
ok
1
0
bc-test.halter.ag

ok
1
0
www.bc-test.halter.ag

ok
1
0
_acme-challenge.bc-test.halter.ag

missing entry or wrong length
1
0
_acme-challenge.www.bc-test.halter.ag

missing entry or wrong length
1
0
_acme-challenge.bc-test.halter.ag.halter.ag

perhaps wrong
1
0
_acme-challenge.bc-test.halter.ag.bc-test.halter.ag

perhaps wrong
1
0
_acme-challenge.www.bc-test.halter.ag.bc-test.halter.ag

perhaps wrong
1
0
_acme-challenge.www.bc-test.halter.ag.www.bc-test.halter.ag

perhaps wrong
1
0


15. DomainService - Entries

TypeDomainPrefValueDNS-errornum AnswersStatusDescription
_dmarc
TXT
_dmarc.bc-test.halter.ag

00ok



16. Cipher Suites

DomainIPPortCipher (OpenSsl / IANA)
bc-test.halter.ag
188.40.220.123
25
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
17 Ciphers, 87.70 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DES-CBC3-SHA
(Weak)
SSLv3
0x00,0x0A
No FS

TLS_RSA_WITH_3DES_EDE_CBC_SHA
RSA
RSA
3DES(168)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


443
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
18 Ciphers, 75.51 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
ECDH
RSA
CHACHA20/POLY1305(256)
AEAD



ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xAA
FS

TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
DH
RSA
CHACHA20/POLY1305(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


465
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
17 Ciphers, 73.82 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DES-CBC3-SHA
(Weak)
SSLv3
0x00,0x0A
No FS

TLS_RSA_WITH_3DES_EDE_CBC_SHA
RSA
RSA
3DES(168)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


587
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
17 Ciphers, 87.98 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DES-CBC3-SHA
(Weak)
SSLv3
0x00,0x0A
No FS

TLS_RSA_WITH_3DES_EDE_CBC_SHA
RSA
RSA
3DES(168)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


993
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
17 Ciphers, 75.98 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DES-CBC3-SHA
(Weak)
SSLv3
0x00,0x0A
No FS

TLS_RSA_WITH_3DES_EDE_CBC_SHA
RSA
RSA
3DES(168)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


995
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
17 Ciphers, 77.40 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DES-CBC3-SHA
(Weak)
SSLv3
0x00,0x0A
No FS

TLS_RSA_WITH_3DES_EDE_CBC_SHA
RSA
RSA
3DES(168)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


8443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
17 Ciphers, 74.08 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DES-CBC3-SHA
(Weak)
SSLv3
0x00,0x0A
No FS

TLS_RSA_WITH_3DES_EDE_CBC_SHA
RSA
RSA
3DES(168)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1
www.bc-test.halter.ag
188.40.220.123
25
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
17 Ciphers, 86.67 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DES-CBC3-SHA
(Weak)
SSLv3
0x00,0x0A
No FS

TLS_RSA_WITH_3DES_EDE_CBC_SHA
RSA
RSA
3DES(168)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


443
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
18 Ciphers, 76.67 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
ECDH
RSA
CHACHA20/POLY1305(256)
AEAD



ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xAA
FS

TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
DH
RSA
CHACHA20/POLY1305(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


465
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
17 Ciphers, 74.72 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DES-CBC3-SHA
(Weak)
SSLv3
0x00,0x0A
No FS

TLS_RSA_WITH_3DES_EDE_CBC_SHA
RSA
RSA
3DES(168)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


587
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
17 Ciphers, 88.26 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DES-CBC3-SHA
(Weak)
SSLv3
0x00,0x0A
No FS

TLS_RSA_WITH_3DES_EDE_CBC_SHA
RSA
RSA
3DES(168)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


993
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
17 Ciphers, 76.87 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DES-CBC3-SHA
(Weak)
SSLv3
0x00,0x0A
No FS

TLS_RSA_WITH_3DES_EDE_CBC_SHA
RSA
RSA
3DES(168)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


995
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
17 Ciphers, 75.79 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DES-CBC3-SHA
(Weak)
SSLv3
0x00,0x0A
No FS

TLS_RSA_WITH_3DES_EDE_CBC_SHA
RSA
RSA
3DES(168)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


8443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
17 Ciphers, 73.90 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DES-CBC3-SHA
(Weak)
SSLv3
0x00,0x0A
No FS

TLS_RSA_WITH_3DES_EDE_CBC_SHA
RSA
RSA
3DES(168)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


17. Portchecks

DomainIPPortDescriptionResultAnswer
bc-test.halter.ag
188.40.220.123
21
FTP
open
220 ProFTPD Server (ProFTPD) [188.40.220.123]

bc-test.halter.ag
188.40.220.123
21
FTP
open
220 ProFTPD Server (ProFTPD) [188.40.220.123]

bc-test.halter.ag
188.40.220.123
22
SSH
open
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10

bc-test.halter.ag
188.40.220.123
22
SSH
open
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
Bad: SSH without DNS SSHFP Record found
Possible DNS SSHFP Entries:
bc-test.halter.ag IN SSHFP 1 2 dfcc443ebc9dfda957678eb9c44be099eac8d6df0f42e2c7da5ca6712e89d10c
bc-test.halter.ag IN SSHFP 3 2 94212736d750bf4fcc6bf8d22e5786c8dd0d9a1e068e504ed439ea397e209aed
bc-test.halter.ag IN SSHFP 4 2 803be9a22d765098c7c9400685c1c74f7b3996e7daa81708fc27611181395c82
bc-test.halter.ag
188.40.220.123
25
SMTP
open
220 linux3.buerki-hosting.ch ESMTP Postfix (Ubuntu)

Answer EHLO: 250-linux3.buerki-hosting.ch 250-PIPELINING 250-SIZE 40960000 250-ETRN 250-STARTTLS 250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250-SMTPUTF8 250 CHUNKING

Answer AUTH LOGIN: 334 VXNlcm5hbWU6

Mail certificate is invalid
bc-test.halter.ag
188.40.220.123
25
SMTP
open
220 linux3.buerki-hosting.ch ESMTP Postfix (Ubuntu)
Mail certificate is invalid
Answer EHLO: 250-linux3.buerki-hosting.ch 250-PIPELINING 250-SIZE 40960000 250-ETRN 250-STARTTLS 250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250-SMTPUTF8 250 CHUNKING Good: STARTTLS found
Answer AUTH LOGIN: 334 VXNlcm5hbWU6 Bad: Unencrypted Login allowed
bc-test.halter.ag
188.40.220.123
53
DNS



bc-test.halter.ag
188.40.220.123
53
DNS



bc-test.halter.ag
188.40.220.123
110
POP3
open
+OK Hello there. <31572.1712049636@localhost.localdomain>

bc-test.halter.ag
188.40.220.123
110
POP3
open
+OK Hello there. <31572.1712049636@localhost.localdomain>
This port ist unencrypted and deprecated. Don't use it.
bc-test.halter.ag
188.40.220.123
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA AUTH=CRAM-MD5 AUTH=CRAM-SHA1 AUTH=CRAM-SHA256 AUTH=PLAIN IDLE UTF8=ACCEPT ACL ACL2=UNION STARTTLS ENABLE UTF8=ACCEPT] Courier-IMAP ready. Copyright 1998-2018 Double Precision, Inc. See COPYING for distribution information.

bc-test.halter.ag
188.40.220.123
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA AUTH=CRAM-MD5 AUTH=CRAM-SHA1 AUTH=CRAM-SHA256 AUTH=PLAIN IDLE UTF8=ACCEPT ACL ACL2=UNION STARTTLS ENABLE UTF8=ACCEPT] Courier-IMAP ready. Copyright 1998-2018 Double Precision, Inc. See COPYING for distribution information.
This port ist unencrypted and deprecated. Don't use it.
bc-test.halter.ag
188.40.220.123
465
SMTP (encrypted)
open
220 linux3.buerki-hosting.ch ESMTP Postfix (Ubuntu)
Mail certificate is invalid
bc-test.halter.ag
188.40.220.123
465
SMTP (encrypted)
open
220 linux3.buerki-hosting.ch ESMTP Postfix (Ubuntu)
Mail certificate is invalid
bc-test.halter.ag
188.40.220.123
587
SMTP (encrypted, submission)
open
220 linux3.buerki-hosting.ch ESMTP Postfix (Ubuntu)

Answer EHLO: 250-linux3.buerki-hosting.ch 250-PIPELINING 250-SIZE 40960000 250-ETRN 250-STARTTLS 250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250-SMTPUTF8 250 CHUNKING

Answer AUTH LOGIN: 334 VXNlcm5hbWU6

Mail certificate is invalid
bc-test.halter.ag
188.40.220.123
587
SMTP (encrypted, submission)
open
220 linux3.buerki-hosting.ch ESMTP Postfix (Ubuntu)
Mail certificate is invalid
Answer EHLO: 250-linux3.buerki-hosting.ch 250-PIPELINING 250-SIZE 40960000 250-ETRN 250-STARTTLS 250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250-SMTPUTF8 250 CHUNKING Good: STARTTLS found
Answer AUTH LOGIN: 334 VXNlcm5hbWU6 Bad: Unencrypted Login allowed
bc-test.halter.ag
188.40.220.123
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA AUTH=CRAM-MD5 AUTH=CRAM-SHA1 AUTH=CRAM-SHA256 AUTH=PLAIN IDLE UTF8=ACCEPT ACL ACL2=UNION ENABLE UTF8=ACCEPT] Courier-IMAP ready. Copyright 1998-2018 Double Precision, Inc. See COPYING for distribution information.
Mail certificate is invalid
bc-test.halter.ag
188.40.220.123
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA AUTH=CRAM-MD5 AUTH=CRAM-SHA1 AUTH=CRAM-SHA256 AUTH=PLAIN IDLE UTF8=ACCEPT ACL ACL2=UNION ENABLE UTF8=ACCEPT] Courier-IMAP ready. Copyright 1998-2018 Double Precision, Inc. See COPYING for distribution information.
Mail certificate is invalid
bc-test.halter.ag
188.40.220.123
995
POP3 (encrypted)
open
+OK Hello there. <31579.1712049636@localhost.localdomain>
Mail certificate is invalid
bc-test.halter.ag
188.40.220.123
995
POP3 (encrypted)
open
+OK Hello there. <31579.1712049636@localhost.localdomain>
Mail certificate is invalid
bc-test.halter.ag
188.40.220.123
1433
MS SQL



bc-test.halter.ag
188.40.220.123
1433
MS SQL



bc-test.halter.ag
188.40.220.123
2082
cPanel (http)



bc-test.halter.ag
188.40.220.123
2082
cPanel (http)



bc-test.halter.ag
188.40.220.123
2083
cPanel (https)



bc-test.halter.ag
188.40.220.123
2083
cPanel (https)



bc-test.halter.ag
188.40.220.123
2086
WHM (http)



bc-test.halter.ag
188.40.220.123
2086
WHM (http)



bc-test.halter.ag
188.40.220.123
2087
WHM (https)



bc-test.halter.ag
188.40.220.123
2087
WHM (https)



bc-test.halter.ag
188.40.220.123
2089
cPanel Licensing



bc-test.halter.ag
188.40.220.123
2089
cPanel Licensing



bc-test.halter.ag
188.40.220.123
2095
cPanel Webmail (http)



bc-test.halter.ag
188.40.220.123
2095
cPanel Webmail (http)



bc-test.halter.ag
188.40.220.123
2096
cPanel Webmail (https)



bc-test.halter.ag
188.40.220.123
2096
cPanel Webmail (https)



bc-test.halter.ag
188.40.220.123
2222
DirectAdmin (http)



bc-test.halter.ag
188.40.220.123
2222
DirectAdmin (http)



bc-test.halter.ag
188.40.220.123
2222
DirectAdmin (https)



bc-test.halter.ag
188.40.220.123
2222
DirectAdmin (https)



bc-test.halter.ag
188.40.220.123
3306
mySql
open


bc-test.halter.ag
188.40.220.123
3306
mySql
open


bc-test.halter.ag
188.40.220.123
5224
Plesk Licensing



bc-test.halter.ag
188.40.220.123
5224
Plesk Licensing



bc-test.halter.ag
188.40.220.123
5432
PostgreSQL



bc-test.halter.ag
188.40.220.123
5432
PostgreSQL



bc-test.halter.ag
188.40.220.123
8080
Ookla Speedtest (http)



bc-test.halter.ag
188.40.220.123
8080
Ookla Speedtest (http)



bc-test.halter.ag
188.40.220.123
8080
Ookla Speedtest (https)



bc-test.halter.ag
188.40.220.123
8080
Ookla Speedtest (https)



bc-test.halter.ag
188.40.220.123
8083
VestaCP http



bc-test.halter.ag
188.40.220.123
8083
VestaCP http



bc-test.halter.ag
188.40.220.123
8083
VestaCP https



bc-test.halter.ag
188.40.220.123
8083
VestaCP https



bc-test.halter.ag
188.40.220.123
8443
Plesk Administration (https)
open
https://188.40.220.123:8443/
Http-Status: 303
Certificate is invalid Redirect: https://bc-test.halter.ag/login.php?success_redirect_url=%2F
bc-test.halter.ag
188.40.220.123
8443
Plesk Administration (https)
open
https://188.40.220.123:8443/
Http-Status: 303
Certificate is invalid Redirect: https://bc-test.halter.ag/login.php?success_redirect_url=%2F
bc-test.halter.ag
188.40.220.123
8447
Plesk Installer + Updates



bc-test.halter.ag
188.40.220.123
8447
Plesk Installer + Updates



bc-test.halter.ag
188.40.220.123
8880
Plesk Administration (http)



bc-test.halter.ag
188.40.220.123
8880
Plesk Administration (http)



bc-test.halter.ag
188.40.220.123
10000
Webmin (http)



bc-test.halter.ag
188.40.220.123
10000
Webmin (http)



bc-test.halter.ag
188.40.220.123
10000
Webmin (https)



bc-test.halter.ag
188.40.220.123
10000
Webmin (https)



www.bc-test.halter.ag
188.40.220.123
21
FTP
open
220 ProFTPD Server (ProFTPD) [188.40.220.123]

www.bc-test.halter.ag
188.40.220.123
21
FTP
open
220 ProFTPD Server (ProFTPD) [188.40.220.123]

www.bc-test.halter.ag
188.40.220.123
22
SSH
open
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10

www.bc-test.halter.ag
188.40.220.123
22
SSH
open
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
Bad: SSH without DNS SSHFP Record found
Possible DNS SSHFP Entries:
www.bc-test.halter.ag IN SSHFP 1 2 dfcc443ebc9dfda957678eb9c44be099eac8d6df0f42e2c7da5ca6712e89d10c
www.bc-test.halter.ag IN SSHFP 3 2 94212736d750bf4fcc6bf8d22e5786c8dd0d9a1e068e504ed439ea397e209aed
www.bc-test.halter.ag IN SSHFP 4 2 803be9a22d765098c7c9400685c1c74f7b3996e7daa81708fc27611181395c82
www.bc-test.halter.ag
188.40.220.123
25
SMTP
open
220 linux3.buerki-hosting.ch ESMTP Postfix (Ubuntu)

Answer EHLO: 250-linux3.buerki-hosting.ch 250-PIPELINING 250-SIZE 40960000 250-ETRN 250-STARTTLS 250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250-SMTPUTF8 250 CHUNKING

Answer AUTH LOGIN: 334 VXNlcm5hbWU6

Mail certificate is invalid
www.bc-test.halter.ag
188.40.220.123
25
SMTP
open
220 linux3.buerki-hosting.ch ESMTP Postfix (Ubuntu)
Mail certificate is invalid
Answer EHLO: 250-linux3.buerki-hosting.ch 250-PIPELINING 250-SIZE 40960000 250-ETRN 250-STARTTLS 250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250-SMTPUTF8 250 CHUNKING Good: STARTTLS found
Answer AUTH LOGIN: 334 VXNlcm5hbWU6 Bad: Unencrypted Login allowed
www.bc-test.halter.ag
188.40.220.123
53
DNS



www.bc-test.halter.ag
188.40.220.123
53
DNS



www.bc-test.halter.ag
188.40.220.123
110
POP3
open
+OK Hello there. <31639.1712049662@localhost.localdomain>

www.bc-test.halter.ag
188.40.220.123
110
POP3
open
+OK Hello there. <31639.1712049662@localhost.localdomain>
This port ist unencrypted and deprecated. Don't use it.
www.bc-test.halter.ag
188.40.220.123
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA AUTH=CRAM-MD5 AUTH=CRAM-SHA1 AUTH=CRAM-SHA256 AUTH=PLAIN IDLE UTF8=ACCEPT ACL ACL2=UNION STARTTLS ENABLE UTF8=ACCEPT] Courier-IMAP ready. Copyright 1998-2018 Double Precision, Inc. See COPYING for distribution information.

www.bc-test.halter.ag
188.40.220.123
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA AUTH=CRAM-MD5 AUTH=CRAM-SHA1 AUTH=CRAM-SHA256 AUTH=PLAIN IDLE UTF8=ACCEPT ACL ACL2=UNION STARTTLS ENABLE UTF8=ACCEPT] Courier-IMAP ready. Copyright 1998-2018 Double Precision, Inc. See COPYING for distribution information.
This port ist unencrypted and deprecated. Don't use it.
www.bc-test.halter.ag
188.40.220.123
465
SMTP (encrypted)
open
220 linux3.buerki-hosting.ch ESMTP Postfix (Ubuntu)
Mail certificate is invalid
www.bc-test.halter.ag
188.40.220.123
465
SMTP (encrypted)
open
220 linux3.buerki-hosting.ch ESMTP Postfix (Ubuntu)
Mail certificate is invalid
www.bc-test.halter.ag
188.40.220.123
587
SMTP (encrypted, submission)
open
220 linux3.buerki-hosting.ch ESMTP Postfix (Ubuntu)

Answer EHLO: 250-linux3.buerki-hosting.ch 250-PIPELINING 250-SIZE 40960000 250-ETRN 250-STARTTLS 250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250-SMTPUTF8 250 CHUNKING

Answer AUTH LOGIN: 334 VXNlcm5hbWU6

Mail certificate is invalid
www.bc-test.halter.ag
188.40.220.123
587
SMTP (encrypted, submission)
open
220 linux3.buerki-hosting.ch ESMTP Postfix (Ubuntu)
Mail certificate is invalid
Answer EHLO: 250-linux3.buerki-hosting.ch 250-PIPELINING 250-SIZE 40960000 250-ETRN 250-STARTTLS 250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250-SMTPUTF8 250 CHUNKING Good: STARTTLS found
Answer AUTH LOGIN: 334 VXNlcm5hbWU6 Bad: Unencrypted Login allowed
www.bc-test.halter.ag
188.40.220.123
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA AUTH=CRAM-MD5 AUTH=CRAM-SHA1 AUTH=CRAM-SHA256 AUTH=PLAIN IDLE UTF8=ACCEPT ACL ACL2=UNION ENABLE UTF8=ACCEPT] Courier-IMAP ready. Copyright 1998-2018 Double Precision, Inc. See COPYING for distribution information.
Mail certificate is invalid
www.bc-test.halter.ag
188.40.220.123
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA AUTH=CRAM-MD5 AUTH=CRAM-SHA1 AUTH=CRAM-SHA256 AUTH=PLAIN IDLE UTF8=ACCEPT ACL ACL2=UNION ENABLE UTF8=ACCEPT] Courier-IMAP ready. Copyright 1998-2018 Double Precision, Inc. See COPYING for distribution information.
Mail certificate is invalid
www.bc-test.halter.ag
188.40.220.123
995
POP3 (encrypted)
open
+OK Hello there. <31644.1712049662@localhost.localdomain>
Mail certificate is invalid
www.bc-test.halter.ag
188.40.220.123
995
POP3 (encrypted)
open
+OK Hello there. <31644.1712049662@localhost.localdomain>
Mail certificate is invalid
www.bc-test.halter.ag
188.40.220.123
1433
MS SQL



www.bc-test.halter.ag
188.40.220.123
1433
MS SQL



www.bc-test.halter.ag
188.40.220.123
2082
cPanel (http)



www.bc-test.halter.ag
188.40.220.123
2082
cPanel (http)



www.bc-test.halter.ag
188.40.220.123
2083
cPanel (https)



www.bc-test.halter.ag
188.40.220.123
2083
cPanel (https)



www.bc-test.halter.ag
188.40.220.123
2086
WHM (http)



www.bc-test.halter.ag
188.40.220.123
2086
WHM (http)



www.bc-test.halter.ag
188.40.220.123
2087
WHM (https)



www.bc-test.halter.ag
188.40.220.123
2087
WHM (https)



www.bc-test.halter.ag
188.40.220.123
2089
cPanel Licensing



www.bc-test.halter.ag
188.40.220.123
2089
cPanel Licensing



www.bc-test.halter.ag
188.40.220.123
2095
cPanel Webmail (http)



www.bc-test.halter.ag
188.40.220.123
2095
cPanel Webmail (http)



www.bc-test.halter.ag
188.40.220.123
2096
cPanel Webmail (https)



www.bc-test.halter.ag
188.40.220.123
2096
cPanel Webmail (https)



www.bc-test.halter.ag
188.40.220.123
2222
DirectAdmin (http)



www.bc-test.halter.ag
188.40.220.123
2222
DirectAdmin (http)



www.bc-test.halter.ag
188.40.220.123
2222
DirectAdmin (https)



www.bc-test.halter.ag
188.40.220.123
2222
DirectAdmin (https)



www.bc-test.halter.ag
188.40.220.123
3306
mySql
open


www.bc-test.halter.ag
188.40.220.123
3306
mySql
open


www.bc-test.halter.ag
188.40.220.123
5224
Plesk Licensing



www.bc-test.halter.ag
188.40.220.123
5224
Plesk Licensing



www.bc-test.halter.ag
188.40.220.123
5432
PostgreSQL



www.bc-test.halter.ag
188.40.220.123
5432
PostgreSQL



www.bc-test.halter.ag
188.40.220.123
8080
Ookla Speedtest (http)



www.bc-test.halter.ag
188.40.220.123
8080
Ookla Speedtest (http)



www.bc-test.halter.ag
188.40.220.123
8080
Ookla Speedtest (https)



www.bc-test.halter.ag
188.40.220.123
8080
Ookla Speedtest (https)



www.bc-test.halter.ag
188.40.220.123
8083
VestaCP http



www.bc-test.halter.ag
188.40.220.123
8083
VestaCP http



www.bc-test.halter.ag
188.40.220.123
8083
VestaCP https



www.bc-test.halter.ag
188.40.220.123
8083
VestaCP https



www.bc-test.halter.ag
188.40.220.123
8443
Plesk Administration (https)
open
https://188.40.220.123:8443/
Http-Status: 303
Certificate is invalid Redirect: https://www.bc-test.halter.ag/login.php?success_redirect_url=%2F
www.bc-test.halter.ag
188.40.220.123
8443
Plesk Administration (https)
open
https://188.40.220.123:8443/
Http-Status: 303
Certificate is invalid Redirect: https://www.bc-test.halter.ag/login.php?success_redirect_url=%2F
www.bc-test.halter.ag
188.40.220.123
8447
Plesk Installer + Updates



www.bc-test.halter.ag
188.40.220.123
8447
Plesk Installer + Updates



www.bc-test.halter.ag
188.40.220.123
8880
Plesk Administration (http)



www.bc-test.halter.ag
188.40.220.123
8880
Plesk Administration (http)



www.bc-test.halter.ag
188.40.220.123
10000
Webmin (http)



www.bc-test.halter.ag
188.40.220.123
10000
Webmin (http)



www.bc-test.halter.ag
188.40.220.123
10000
Webmin (https)



www.bc-test.halter.ag
188.40.220.123
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=5469421f-291e-4b62-8b7c-a659fda5ffe8


Last Result: https://check-your-website.server-daten.de/?q=bc-test.halter.ag - 2024-04-02 11:19:10


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=bc-test.halter.ag" target="_blank">Check this Site: bc-test.halter.ag</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro