Check DNS, Urls + Redirects, Certificates and Content of your Website



N

No trusted Certificate

Checked:
11.09.2019 10:05:49


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
buildenvironment.com
A
84.16.73.17
Geneva/Switzerland (CH) - Infomaniak Network Management
Hostname: int-rp-vip13.infomaniak.ch
yes
1
0

AAAA
2001:1600:4:1::b
Carouge/Geneva/Switzerland (CH) - Infomaniak Network SA

yes


www.buildenvironment.com


yes
2
2

AAAA
2001:1600:4:1::b
Carouge/Geneva/Switzerland (CH) - Infomaniak Network SA

yes


www.buildenvironment.com
A
84.16.73.17
Geneva/Switzerland (CH) - Infomaniak Network Management
No Hostname found
no



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 59944, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 30.09.2019, 00:00:00 +, Signature-Inception: 09.09.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: com
com
1 DS RR in the parent zone found



1 RRSIG RR to validate DS RR found



RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 24.09.2019, 05:00:00 +, Signature-Inception: 11.09.2019, 04:00:00 +, KeyTag 59944, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 59944 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 17708, Flags 256



Public Key with Algorithm 8, KeyTag 30909, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 24.09.2019, 18:25:33 +, Signature-Inception: 09.09.2019, 18:20:33 +, KeyTag 30909, Signer-Name: com



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30909 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest "4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: buildenvironment.com
buildenvironment.com
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "pb009pkoso4ij9gf1ash76mkqr0ri4ej" between the hashed NSEC3-owner "pb007u0451q2kml3f1qd6p1pqib0dmen" and the hashed NextOwner "pb00kj50lb0lu1qq9ck6cee2rvosdfgd". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner pb007u0451q2kml3f1qd6p1pqib0dmen.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 18.09.2019, 05:37:09 +, Signature-Inception: 11.09.2019, 04:27:09 +, KeyTag 17708, Signer-Name: com



0 DNSKEY RR found




Zone: www.buildenvironment.com
www.buildenvironment.com
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.buildenvironment.com
  ns1.infomaniak.ch

buildenvironment.com
T  ns1.infomaniak.ch
84.16.66.66
Geneva/Switzerland (CH) - Infomaniak Network Management


 
2001:1600:0:aaaa::a
Carouge/Geneva/Switzerland (CH) - Infomaniak Network SA


  ns2.infomaniak.ch
84.16.67.66
Carouge/Geneva/Switzerland (CH) - Infomaniak Network Management


 
2001:1600:0:aaaa::b
Carouge/Geneva/Switzerland (CH) - Infomaniak Network SA

com
  a.gtld-servers.net


  b.gtld-servers.net


  c.gtld-servers.net


  d.gtld-servers.net


  e.gtld-servers.net


  f.gtld-servers.net


  g.gtld-servers.net


  h.gtld-servers.net


  i.gtld-servers.net


  j.gtld-servers.net


  k.gtld-servers.net


  l.gtld-servers.net


  m.gtld-servers.net


4. SOA-Entries


Domain:com
Zone-Name:
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1568189124
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:5


Domain:com
Zone-Name:
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1568189139
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:8


Domain:buildenvironment.com
Zone-Name:
Primary:ns1.infomaniak.ch
Mail:hostmaster.infomaniak.ch
Serial:2019091116
Refresh:10800
Retry:3600
Expire:605800
TTL:86400
num Entries:4


Domain:www.buildenvironment.com
Zone-Name:
Primary:ns1.infomaniak.ch
Mail:hostmaster.infomaniak.ch
Serial:2019091116
Refresh:10800
Retry:3600
Expire:605800
TTL:86400
num Entries:1


5. Screenshots

No Screenshot listed, because no screenshot found. Perhaps the check is too old, the feature startet 2019-12-23.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://buildenvironment.com/
84.16.73.17
301
https://nheeren.github.io
0.094
E
Date: Wed, 11 Sep 2019 08:06:39 GMT
Server: Apache
Location: https://nheeren.github.io
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html

• http://buildenvironment.com/
2001:1600:4:1::b
301
https://nheeren.github.io
0.064
E
Date: Wed, 11 Sep 2019 08:06:39 GMT
Server: Apache
Location: https://nheeren.github.io
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html

• http://www.buildenvironment.com/
84.16.73.17
301
https://nheeren.github.io
0.053
E
Date: Wed, 11 Sep 2019 08:06:39 GMT
Server: Apache
Location: https://nheeren.github.io
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html

• http://www.buildenvironment.com/
2001:1600:4:1::b
301
https://nheeren.github.io
0.063
E
Date: Wed, 11 Sep 2019 08:06:39 GMT
Server: Apache
Location: https://nheeren.github.io
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html

• https://buildenvironment.com/
84.16.73.17
301
https://nheeren.github.io
3.243
N
Certificate error: RemoteCertificateNameMismatch
Date: Wed, 11 Sep 2019 08:06:40 GMT
Server: Apache
Location: https://nheeren.github.io
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html

• https://buildenvironment.com/
2001:1600:4:1::b
301
https://nheeren.github.io
3.160
N
Certificate error: RemoteCertificateNameMismatch
Date: Wed, 11 Sep 2019 08:06:43 GMT
Server: Apache
Location: https://nheeren.github.io
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html

• https://www.buildenvironment.com/
84.16.73.17
301
https://nheeren.github.io
3.150
N
Certificate error: RemoteCertificateNameMismatch
Date: Wed, 11 Sep 2019 08:06:50 GMT
Server: Apache
Location: https://nheeren.github.io
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html

• https://www.buildenvironment.com/
2001:1600:4:1::b
301
https://nheeren.github.io
3.256
N
Certificate error: RemoteCertificateNameMismatch
Date: Wed, 11 Sep 2019 08:06:46 GMT
Server: Apache
Location: https://nheeren.github.io
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html

• https://nheeren.github.io
GZip used - 5353 / 24462 - 78.12 %
200

Html is minified: 144.51 %
3.193
B
Server: GitHub.com
Content-Type: text/html; charset=utf-8
Last-Modified: Tue, 10 Sep 2019 21:56:04 GMT
ETag: W/"5d781bf4-5f8e"
Access-Control-Allow-Origin: *
Expires: Wed, 11 Sep 2019 06:47:58 GMT
Cache-Control: max-age=600
Content-Encoding: gzip
X-Proxy-Cache: MISS
X-GitHub-Request-Id: 9828:29AA:E8BD1:1406B0:5D789645
Content-Length: 5353
Accept-Ranges: bytes
Date: Wed, 11 Sep 2019 08:06:54 GMT
Via: 1.1 varnish
Age: 199
Connection: close
X-Served-By: cache-hhn4020-HHN
X-Cache: HIT
X-Cache-Hits: 1
X-Timer: S1568189215.745384,VS0,VE1
Vary: Accept-Encoding
X-Fastly-Request-ID: 2d4346d72f0bce9abc9f22e2abbb7541ed1ab954

• http://buildenvironment.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
84.16.73.17 GZip used - 81 / 67 - -20.90 %
404

Html is minified: 100.00 %
0.094
A
Not Found
Visible Content:
Date: Wed, 11 Sep 2019 08:06:53 GMT
Server: Apache/2.2.22 (Debian)
Content-Encoding: gzip
Content-Length: 81
Content-Type: text/html
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
X-Frame-Options: sameorigin
X-Xss-Protection: 1; mode=block
Strict-Transport-Security: max-age=63072000
Connection: close

• http://buildenvironment.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2001:1600:4:1::b GZip used - 81 / 67 - -20.90 %
404

Html is minified: 100.00 %
0.104
A
Not Found
Visible Content:
Date: Wed, 11 Sep 2019 08:06:53 GMT
Server: Apache/2.2.22 (Debian)
Content-Encoding: gzip
Content-Length: 81
Content-Type: text/html
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
X-Frame-Options: sameorigin
X-Xss-Protection: 1; mode=block
Strict-Transport-Security: max-age=63072000
Connection: close

• http://www.buildenvironment.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
84.16.73.17 GZip used - 81 / 67 - -20.90 %
404

Html is minified: 100.00 %
0.094
A
Not Found
Visible Content:
Date: Wed, 11 Sep 2019 08:06:54 GMT
Server: Apache/2.2.22 (Debian)
Content-Encoding: gzip
Content-Length: 81
Content-Type: text/html
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
X-Frame-Options: sameorigin
X-Xss-Protection: 1; mode=block
Strict-Transport-Security: max-age=63072000
Connection: close

• http://www.buildenvironment.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2001:1600:4:1::b GZip used - 81 / 67 - -20.90 %
404

Html is minified: 100.00 %
0.306
A
Not Found
Visible Content:
Date: Wed, 11 Sep 2019 08:06:54 GMT
Server: Apache/2.2.22 (Debian)
Content-Encoding: gzip
Content-Length: 81
Content-Type: text/html
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
X-Frame-Options: sameorigin
X-Xss-Protection: 1; mode=block
Strict-Transport-Security: max-age=63072000
Connection: close

7. Comments


1. General Results, most used to calculate the result

Aname "buildenvironment.com" is domain, public suffix is "com", top-level-domain-type is "generic", tld-manager is "VeriSign Global Registry Services"
AGood: All ip addresses are public addresses
Ahttps://buildenvironment.com/ 84.16.73.17
301
https://nheeren.github.io
Correct redirect https to https
Ahttps://buildenvironment.com/ 2001:1600:4:1::b
301
https://nheeren.github.io
Correct redirect https to https
AGood: destination is https
AGood - only one version with Http-Status 200
AGood: one preferred version: non-www is preferred
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):1 complete Content-Type - header (5 urls)
http://buildenvironment.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 84.16.73.17


Url with incomplete Content-Type - header - missing charset
http://buildenvironment.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2001:1600:4:1::b


Url with incomplete Content-Type - header - missing charset
http://www.buildenvironment.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 84.16.73.17


Url with incomplete Content-Type - header - missing charset
http://www.buildenvironment.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2001:1600:4:1::b


Url with incomplete Content-Type - header - missing charset
Bhttps://buildenvironment.com/ 84.16.73.17
301

Missing HSTS-Header
Bhttps://buildenvironment.com/ 2001:1600:4:1::b
301

Missing HSTS-Header
Bhttps://nheeren.github.io
200

Missing HSTS-Header
Bhttps://www.buildenvironment.com/ 84.16.73.17
301

Missing HSTS-Header
Bhttps://www.buildenvironment.com/ 2001:1600:4:1::b
301

Missing HSTS-Header
Ehttp://buildenvironment.com/ 84.16.73.17
301
https://nheeren.github.io
Wrong redirect one domain http to other domain https. First redirect to https without new dns query, so the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Ehttp://buildenvironment.com/ 2001:1600:4:1::b
301
https://nheeren.github.io
Wrong redirect one domain http to other domain https. First redirect to https without new dns query, so the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Ehttp://www.buildenvironment.com/ 84.16.73.17
301
https://nheeren.github.io
Wrong redirect one domain http to other domain https. First redirect to https without new dns query, so the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Ehttp://www.buildenvironment.com/ 2001:1600:4:1::b
301
https://nheeren.github.io
Wrong redirect one domain http to other domain https. First redirect to https without new dns query, so the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Nhttps://buildenvironment.com/ 84.16.73.17
301
https://nheeren.github.io
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://buildenvironment.com/ 2001:1600:4:1::b
301
https://nheeren.github.io
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://www.buildenvironment.com/ 84.16.73.17
301
https://nheeren.github.io
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://www.buildenvironment.com/ 2001:1600:4:1::b
301
https://nheeren.github.io
Error - Certificate isn't trusted, RemoteCertificateNameMismatch

2. DNS- and NameServer - Checks

AGood: Nameserver supports TCP connections: 4 good Nameserver
XNameserver Timeout checking Echo Capitalization: ns1.infomaniak.ch / 84.16.66.66
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 4 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 4 good Nameserver
Nameserver doesn't pass all EDNS-Checks: ns1.infomaniak.ch: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok. COOKIE: ok. CLIENTSUBNET: fatal timeout.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
AInfo: Different Server-Headers found
ADuration: 85470 milliseconds, 85.470 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
nheeren.github.io
nheeren.github.io
443
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
supported
ok
nheeren.github.io
nheeren.github.io
443
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
supported
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)
1CN=www.github.com, O="GitHub, Inc.", L=San Francisco, C=US, ST=California

2CN=DigiCert SHA2 High Assurance Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US


buildenvironment.com
84.16.73.17
443
name does not match
Tls12
DiffieHellman
2048
Aes128
128
Sha256
error checking OCSP stapling
ok

buildenvironment.com
84.16.73.17
443
name does not match
Tls12

DiffieHellman
2048
Aes128
128
Sha256
error checking OCSP stapling
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete
1CN=chk.me, OU=PositiveSSL Multi-Domain

2CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

4CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE


buildenvironment.com
2001:1600:4:1::b
443
name does not match
Tls12
DiffieHellman
2048
Aes128
128
Sha256
error checking OCSP stapling
ok

buildenvironment.com
2001:1600:4:1::b
443
name does not match
Tls12

DiffieHellman
2048
Aes128
128
Sha256
error checking OCSP stapling
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete
1CN=chk.me, OU=PositiveSSL Multi-Domain

2CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

4CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE


www.buildenvironment.com
84.16.73.17
443
name does not match
Tls12
DiffieHellman
2048
Aes128
128
Sha256
error checking OCSP stapling
ok

www.buildenvironment.com
84.16.73.17
443
name does not match
Tls12

DiffieHellman
2048
Aes128
128
Sha256
error checking OCSP stapling
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete
1CN=chk.me, OU=PositiveSSL Multi-Domain

2CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

4CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE


www.buildenvironment.com
2001:1600:4:1::b
443
name does not match
Tls12
DiffieHellman
2048
Aes128
128
Sha256
error checking OCSP stapling
ok

www.buildenvironment.com
2001:1600:4:1::b
443
name does not match
Tls12

DiffieHellman
2048
Aes128
128
Sha256
error checking OCSP stapling
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete
1CN=chk.me, OU=PositiveSSL Multi-Domain

2CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

4CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE


9. Certificates

1.
1.
CN=chk.me, OU=PositiveSSL Multi-Domain, OU=Domain Control Validated
16.08.2017
16.08.2020
777 days expired
chk.me, short.infomaniak.ch, short.infomaniak.com - 3 entries
1.
1.
CN=chk.me, OU=PositiveSSL Multi-Domain, OU=Domain Control Validated
16.08.2017

16.08.2020
777 days expired
chk.me, short.infomaniak.ch, short.infomaniak.com - 3 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00DBE288FEB3E278F7138ED189F36707AA
Thumbprint:CD534F629C9517254E1AE3420F9C6DFEA553A0B5
SHA256 / Certificate:2+66+e7G0Id3QbHjiDk/E+AChGLpqf1H8YoYtsHdqs0=
SHA256 hex / Cert (DANE * 0 1):dbeebaf9eec6d0877741b1e388393f13e0028462e9a9fd47f18a18b6c1ddaacd
SHA256 hex / PublicKey (DANE * 1 1):098c75ffd05955fa89f80b397046d9c9e308cd82977b0b913582bee20ca3a64c
SHA256 hex / Subject Public Key Information (SPKI):098c75ffd05955fa89f80b397046d9c9e308cd82977b0b913582bee20ca3a64c
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Server Authentication (1.3.6.1.5.5.7.3.1), Client Authentication (1.3.6.1.5.5.7.3.2)


2.
CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
12.02.2014
12.02.2029
expires in 2325 days


2.
CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
12.02.2014

12.02.2029
expires in 2325 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:2B2E6EEAD975366C148A6EDBA37C8C07
Thumbprint:339CDD57CFD5B141169B615FF31428782D1DA639
SHA256 / Certificate:AqtX5OZ6DLSN0v80gw6KxA9EdvsIymvj9c2Eb2RoQPA=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):9253b6de74f67a11435c27f1dde1d30d1112333ddab23d66b8efb86887638ae6
SHA256 hex / Subject Public Key Information (SPKI):9253b6de74f67a11435c27f1dde1d30d1112333ddab23d66b8efb86887638ae6
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


3.
CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
19.01.2010
19.01.2038
expires in 5588 days


3.
CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
19.01.2010

19.01.2038
expires in 5588 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:4CAAF9CADB636FE01FF74ED85B03869D
Thumbprint:AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
SHA256 / Certificate:UvDhxOWOxikpG2AxfwdGcbhdfqgNWwcnNGNTSzK0AjQ=
SHA256 hex / Cert (DANE * 0 1):52f0e1c4e58ec629291b60317f074671b85d7ea80d5b07273463534b32b40234
SHA256 hex / PublicKey (DANE * 1 1):82b5f84daf47a59c7ab521e4982aefa40a53406a3aec26039efa6b2e0e7244c1
SHA256 hex / Subject Public Key Information (SPKI):82b5f84daf47a59c7ab521e4982aefa40a53406a3aec26039efa6b2e0e7244c1
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


2.
1.
CN=www.github.com, O="GitHub, Inc.", L=San Francisco, S=California, C=US
27.06.2018
20.06.2020
834 days expired
www.github.com, *.github.io, *.githubusercontent.com, *.github.com, github.com, github.io, githubusercontent.com - 7 entries
2.
1.
CN=www.github.com, O="GitHub, Inc.", L=San Francisco, S=California, C=US
27.06.2018

20.06.2020
834 days expired
www.github.com, *.github.io, *.githubusercontent.com, *.github.com, github.com, github.io, githubusercontent.com - 7 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0DFE7A75ABA8E06B12D2D39CF3F8A4FC
Thumbprint:700B6F624F41EB1A423F735ADA96982D7F2B756F
SHA256 / Certificate:cO6Lt3nR8CeyPvXN8Rz3zK5aW2WxsLunQBrAAacT+F0=
SHA256 hex / Cert (DANE * 0 1):70ee8bb779d1f027b23ef5cdf11cf7ccae5a5b65b1b0bba7401ac001a713f85d
SHA256 hex / PublicKey (DANE * 1 1):b655908636bbfb82d5f7aa82c3bd59137db95730c536042e234376b28378252a
SHA256 hex / Subject Public Key Information (SPKI):b655908636bbfb82d5f7aa82c3bd59137db95730c536042e234376b28378252a
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Server Authentication (1.3.6.1.5.5.7.3.1), Client Authentication (1.3.6.1.5.5.7.3.2)


2.
CN=DigiCert SHA2 High Assurance Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US
22.10.2013
22.10.2028
expires in 2212 days


2.
CN=DigiCert SHA2 High Assurance Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US
22.10.2013

22.10.2028
expires in 2212 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:04E1E7A4DC5CF2F36DC02B42B85D159F
Thumbprint:A031C46782E6E6C662C2C87C76DA9AA62CCABD8E
SHA256 / Certificate:GUAL5bejH7czkXcAeJ0vCiRxwMnVBsDlBMBsFtfLF8A=
SHA256 hex / Cert (DANE * 0 1):19400be5b7a31fb733917700789d2f0a2471c0c9d506c0e504c06c16d7cb17c0
SHA256 hex / PublicKey (DANE * 1 1):936bfae7bc41b0e55ed4f411c0eb07b30ddbb064f657322acf92bee7db0d430b
SHA256 hex / Subject Public Key Information (SPKI):936bfae7bc41b0e55ed4f411c0eb07b30ddbb064f657322acf92bee7db0d430b
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Server Authentication (1.3.6.1.5.5.7.3.1), Client Authentication (1.3.6.1.5.5.7.3.2)


3.
CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
10.11.2006
10.11.2031
expires in 3326 days


3.
CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
10.11.2006

10.11.2031
expires in 3326 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:02AC5C266A0B409B8F0B79F2AE462577
Thumbprint:5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25
SHA256 / Certificate:dDHl9MPBzkaQd08LYeBUQIg7qaAe0Aumq9eAbtOxGM8=
SHA256 hex / Cert (DANE * 0 1):7431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf
SHA256 hex / PublicKey (DANE * 1 1):5a889647220e54d6bd8a16817224520bb5c78e58984bd570506388b9de0f075f
SHA256 hex / Subject Public Key Information (SPKI):5a889647220e54d6bd8a16817224520bb5c78e58984bd570506388b9de0f075f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Small Code Update - wait one minute


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

No CRT - CT-Log entries found


11. Html-Content - Entries

Summary

No data found or small Code-update

Details

Small Code Update - wait one minute


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers:

No NameServer - IP address informations found. The feature is new (2020-05-07), so recheck this domain.


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.buildenvironment.com
0

no CAA entry found
1
0
buildenvironment.com
0

no CAA entry found
1
0
com
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
buildenvironment.com
1|nheeren.github.io
ok
1
0
buildenvironment.com
p|https
ok
1
0
www.buildenvironment.com
1|nheeren.github.io
ok
1
0
www.buildenvironment.com
p|https
ok
1
0
_acme-challenge.buildenvironment.com

Name Error - The domain name does not exist
1
0
_acme-challenge.www.buildenvironment.com

Name Error - The domain name does not exist
1
0
_acme-challenge.buildenvironment.com.buildenvironment.com

Name Error - The domain name does not exist
1
0
_acme-challenge.www.buildenvironment.com.buildenvironment.com

Name Error - The domain name does not exist
1
0
_acme-challenge.www.buildenvironment.com.www.buildenvironment.com

Name Error - The domain name does not exist
1
0


15. DomainService - Entries (SSHFP Check is new - 2022-09-24, may be incomplete, alpha, some results are required)

No DomainServiceEntries entries found



16. Cipher Suites

No Ciphers found


17. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.



Permalink: https://check-your-website.server-daten.de/?i=5486304f-d7c1-48cc-8138-a30e827ace26


Last Result: https://check-your-website.server-daten.de/?q=buildenvironment.com - 2019-09-11 10:05:49


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=buildenvironment.com" target="_blank">Check this Site: buildenvironment.com</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro