Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

A

 

Top config

 

Checked:
08.02.2021 20:01:39

 

Older results

No older results found

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
icme.hpc.msstate.edu
CNAME
web.HPC.MsState.Edu
yes
1
0

A
130.18.90.4
Starkville/Mississippi/United States (US) - Mississippi State University
Hostname: 130-18-90-4.HPC.MsState.Edu
yes


www.icme.hpc.msstate.edu

Name Error
yes
1
0
*.hpc.msstate.edu
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.icme.hpc.msstate.edu
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 42351, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.02.2021, 00:00:00 +, Signature-Inception: 31.01.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: edu

edu
1 DS RR in the parent zone found






DS with Algorithm 8, KeyTag 28065, DigestType 2 and Digest QXJJbN6FU05REpBANVvQSx/P666Zbf3eZSAG9viyznY=






2 RRSIG RR to validate DS RR found






RRSIG-Owner edu., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 21.02.2021, 17:00:00 +, Signature-Inception: 08.02.2021, 16:00:00 +, KeyTag 42351, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 42351 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 28065, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 62987, Flags 256






2 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner edu., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 13.02.2021, 19:53:03 +, Signature-Inception: 29.01.2021, 19:48:03 +, KeyTag 28065, Signer-Name: edu






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 28065 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 28065, DigestType 2 and Digest "QXJJbN6FU05REpBANVvQSx/P666Zbf3eZSAG9viyznY=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: msstate.edu

msstate.edu
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "n9g83nftoqn3ejn6tel413odjaakmr6n" between the hashed NSEC3-owner "n6k2nb294up01or28j65evl6nrhpdk3a" and the hashed NextOwner "nc4rojtttjq5kgcsr5jtj0n7f0bov6si". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner n6k2nb294up01or28j65evl6nrhpdk3a.edu., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 15.02.2021, 14:55:07 +, Signature-Inception: 08.02.2021, 13:45:07 +, KeyTag 62987, Signer-Name: edu






DS-Query in the parent zone sends valid NSEC3 RR with the Hash "9dhs4ep5g85pf9nufk06hek0o48qgk77" as Owner. That's the Hash of "Edu" with the NextHashedOwnerName "9jnti6rqal4pl165b92tcrtv41ijicda". So that domain name is the Closest Encloser of "msstate.edu". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 9dhs4ep5g85pf9nufk06hek0o48qgk77.edu., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 15.02.2021, 14:38:25 +, Signature-Inception: 08.02.2021, 13:28:25 +, KeyTag 62987, Signer-Name: edu






0 DNSKEY RR found









Zone: hpc.msstate.edu

hpc.msstate.edu
0 DS RR in the parent zone found






0 DNSKEY RR found









Zone: icme.hpc.msstate.edu

icme.hpc.msstate.edu
0 DS RR in the parent zone found



Zone: www.icme.hpc.msstate.edu

www.icme.hpc.msstate.edu
0 DS RR in the parent zone found



Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 42351, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.02.2021, 00:00:00 +, Signature-Inception: 31.01.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: Edu

Edu
1 DS RR in the parent zone found






DS with Algorithm 8, KeyTag 28065, DigestType 2 and Digest QXJJbN6FU05REpBANVvQSx/P666Zbf3eZSAG9viyznY=






2 RRSIG RR to validate DS RR found






RRSIG-Owner edu., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 21.02.2021, 17:00:00 +, Signature-Inception: 08.02.2021, 16:00:00 +, KeyTag 42351, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 42351 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 28065, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 62987, Flags 256






2 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner edu., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 13.02.2021, 19:53:03 +, Signature-Inception: 29.01.2021, 19:48:03 +, KeyTag 28065, Signer-Name: edu






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 28065 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 28065, DigestType 2 and Digest "QXJJbN6FU05REpBANVvQSx/P666Zbf3eZSAG9viyznY=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: MsState.Edu

MsState.Edu
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "n9g83nftoqn3ejn6tel413odjaakmr6n" between the hashed NSEC3-owner "n78biv16e95dtakqd6d56jcs9onkidu3" and the hashed NextOwner "nc4rojtttjq5kgcsr5jtj0n7f0bov6si". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner n78biv16e95dtakqd6d56jcs9onkidu3.edu., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 15.02.2021, 19:06:02 +, Signature-Inception: 08.02.2021, 17:56:02 +, KeyTag 62987, Signer-Name: edu






DS-Query in the parent zone sends valid NSEC3 RR with the Hash "9dhs4ep5g85pf9nufk06hek0o48qgk77" as Owner. That's the Hash of "Edu" with the NextHashedOwnerName "9jnti6rqal4pl165b92tcrtv41ijicda". So that domain name is the Closest Encloser of "MsState.Edu". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 9dhs4ep5g85pf9nufk06hek0o48qgk77.edu., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 15.02.2021, 14:38:25 +, Signature-Inception: 08.02.2021, 13:28:25 +, KeyTag 62987, Signer-Name: edu






0 DNSKEY RR found









Zone: HPC.MsState.Edu

HPC.MsState.Edu
0 DS RR in the parent zone found






0 DNSKEY RR found









Zone: web.HPC.MsState.Edu

web.HPC.MsState.Edu
0 DS RR in the parent zone found






0 DNSKEY RR found







 

3. Name Servers

DomainNameserverNS-IP
www.icme.hpc.msstate.edu
  ns1.hpc.msstate.edu

hpc.msstate.edu
  ns1.hpc.msstate.edu
130.18.90.2
Starkville/Mississippi/United States (US) - Mississippi State University


  ns1.msstate.edu
130.18.80.12
Starkville/Mississippi/United States (US) - Mississippi State University


T 
2620:0:1a30:1080::12
Starkville/Mississippi/United States (US) - Mississippi State University


  ns2.hpc.msstate.edu
192.208.139.12
Starkville/Mississippi/United States (US) - Mississippi State University


  ns2.msstate.edu
130.18.80.13
Starkville/Mississippi/United States (US) - Mississippi State University


T 
2620:0:1a30:1080::13
Starkville/Mississippi/United States (US) - Mississippi State University

msstate.edu
  ns1.msstate.edu
130.18.80.12
Starkville/Mississippi/United States (US) - Mississippi State University


T 
2620:0:1a30:1080::12
Starkville/Mississippi/United States (US) - Mississippi State University


  ns2.msstate.edu
130.18.80.13
Starkville/Mississippi/United States (US) - Mississippi State University


T 
2620:0:1a30:1080::13
Starkville/Mississippi/United States (US) - Mississippi State University


  trantor.umd.edu
128.8.10.14
College Park/Maryland/United States (US) - University of Maryland

edu
  a.edu-servers.net / nnn1-fra6


  b.edu-servers.net / nnn1-eltxl2


  c.edu-servers.net / nnn1-fra6


  d.edu-servers.net / nnn1-fra6


  e.edu-servers.net / nnn1-fra6


  f.edu-servers.net / nnn1-fra5


  g.edu-servers.net / nnn1-fra5


  h.edu-servers.net / nnn1-fra5


  i.edu-servers.net / nnn1-fra5


  j.edu-servers.net / nnn1-ams5


  k.edu-servers.net / nnn1-ams5


  l.edu-servers.net / nnn1-ams5


  m.edu-servers.net / nnn1-ams5


web.HPC.MsState.Edu
  ns1.hpc.msstate.edu
130.18.90.2
Starkville/Mississippi/United States (US) - Mississippi State University

HPC.MsState.Edu
  ns1.hpc.msstate.edu
130.18.90.2
Starkville/Mississippi/United States (US) - Mississippi State University


  ns1.msstate.edu
130.18.80.12
Starkville/Mississippi/United States (US) - Mississippi State University


 
2620:0:1a30:1080::12
Starkville/Mississippi/United States (US) - Mississippi State University


  ns2.hpc.msstate.edu
192.208.139.12
Starkville/Mississippi/United States (US) - Mississippi State University


  ns2.msstate.edu
130.18.80.13
Starkville/Mississippi/United States (US) - Mississippi State University


 
2620:0:1a30:1080::13
Starkville/Mississippi/United States (US) - Mississippi State University

MsState.Edu
  ns1.msstate.edu
130.18.80.12
Starkville/Mississippi/United States (US) - Mississippi State University


 
2620:0:1a30:1080::12
Starkville/Mississippi/United States (US) - Mississippi State University


  ns2.msstate.edu
130.18.80.13
Starkville/Mississippi/United States (US) - Mississippi State University


 
2620:0:1a30:1080::13
Starkville/Mississippi/United States (US) - Mississippi State University


  trantor.umd.edu
128.8.10.14
College Park/Maryland/United States (US) - University of Maryland

Edu
  a.edu-servers.net


  b.edu-servers.net


  c.edu-servers.net


  d.edu-servers.net


  e.edu-servers.net


  f.edu-servers.net


  g.edu-servers.net


  h.edu-servers.net


  i.edu-servers.net


  j.edu-servers.net


  k.edu-servers.net


  l.edu-servers.net


  m.edu-servers.net

 

4. SOA-Entries


Domain:edu
Zone-Name:edu
Primary:a.edu-servers.net
Mail:nstld.verisign-grs.com
Serial:1612810879
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:8


Domain:edu
Zone-Name:edu
Primary:a.edu-servers.net
Mail:nstld.verisign-grs.com
Serial:1612810894
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:5


Domain:msstate.edu
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:2


Domain:msstate.edu
Zone-Name:msstate.edu
Primary:ns1.msstate.edu
Mail:hostmaster.MsState.Edu
Serial:2021020500
Refresh:3600
Retry:600
Expire:1809600
TTL:3600
num Entries:3


Domain:hpc.msstate.edu
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:2


Domain:hpc.msstate.edu
Zone-Name:HPC.MsState.Edu
Primary:ns1.hpc.msstate.edu
Mail:hostmaster.HPC.MsState.Edu
Serial:2021020515
Refresh:86400
Retry:900
Expire:1209600
TTL:3600
num Entries:1


Domain:hpc.msstate.edu
Zone-Name:HPC.MsState.Edu
Primary:ns1.hpc.msstate.edu
Mail:hostmaster.HPC.MsState.Edu
Serial:2021020811
Refresh:86400
Retry:900
Expire:1209600
TTL:3600
num Entries:3


Domain:www.icme.hpc.msstate.edu
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1



Domain:Edu
Zone-Name:Edu
Primary:a.edu-servers.net
Mail:nstld.verisign-grs.com
Serial:1612811334
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:1


Domain:Edu
Zone-Name:Edu
Primary:a.edu-servers.net
Mail:nstld.verisign-grs.com
Serial:1612811349
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:12


Domain:MsState.Edu
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:2


Domain:MsState.Edu
Zone-Name:msstate.edu
Primary:ns1.msstate.edu
Mail:hostmaster.MsState.Edu
Serial:2021020500
Refresh:3600
Retry:600
Expire:1809600
TTL:3600
num Entries:3


Domain:HPC.MsState.Edu
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:2


Domain:HPC.MsState.Edu
Zone-Name:HPC.MsState.Edu
Primary:ns1.hpc.msstate.edu
Mail:hostmaster.HPC.MsState.Edu
Serial:2021020515
Refresh:86400
Retry:900
Expire:1209600
TTL:3600
num Entries:1


Domain:HPC.MsState.Edu
Zone-Name:HPC.MsState.Edu
Primary:ns1.hpc.msstate.edu
Mail:hostmaster.HPC.MsState.Edu
Serial:2021020811
Refresh:86400
Retry:900
Expire:1209600
TTL:3600
num Entries:3


Domain:web.HPC.MsState.Edu
Zone-Name:HPC.MsState.Edu
Primary:ns1.hpc.msstate.edu
Mail:hostmaster.HPC.MsState.Edu
Serial:2021020811
Refresh:86400
Retry:900
Expire:1209600
TTL:3600
num Entries:1


5. Screenshots

Startaddress: https://icme.hpc.msstate.edu, address used: https://icme.hpc.msstate.edu/mediawiki/index.php.1.html, Screenshot created 2021-02-08 20:24:28 +00:0

 

Mobil (412px x 732px)

 

713 milliseconds

 

Screenshot mobile - https://icme.hpc.msstate.edu/mediawiki/index.php.1.html
Mobil + Landscape (732px x 412px)

 

558 milliseconds

 

Screenshot mobile landscape - https://icme.hpc.msstate.edu/mediawiki/index.php.1.html
Screen (1280px x 1680px)

 

1625 milliseconds

 

Screenshot Desktop - https://icme.hpc.msstate.edu/mediawiki/index.php.1.html

 

Mobile- and other Chrome-Checks


widthheight
visual Viewport396716
content Size11261503

 

Fatal: Horizontal scrollbar detected. Content-size width is greater then visual Viewport width.

 

Chrome-Connection: secure. secure connection settings. The connection to this site is encrypted and authenticated using TLS 1.3, X25519, and AES_256_GCM.

 

Chrome-Resources : secure. all served securely. All resources on this page are served securely.

 

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://icme.hpc.msstate.edu/
130.18.90.4
301
https://ICME.HPC.MsState.Edu/
Html is minified: 100.00 %
0.264
A
Date: Mon, 08 Feb 2021 19:23:47 GMT
Server: Apache
Strict-Transport-Security: max-age=31536000; includeSubDomains
Location: https://ICME.HPC.MsState.Edu/
Content-Length: 237
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://icme.hpc.msstate.edu/
130.18.90.4
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 101.38 %
Other inline scripts (∑/total): 0/0
3.897
A
small visible content (num chars: 0)
Date: Mon, 08 Feb 2021 19:23:47 GMT
Server: Apache
Strict-Transport-Security: max-age=31536000; includeSubDomains
Accept-Ranges: bytes
Content-Length: 147
Connection: close
Content-Type: text/html; charset=UTF-8

• http://icme.hpc.msstate.edu/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
130.18.90.4
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://ICME.HPC.MsState.Edu/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 100.00 %
Other inline scripts (∑/total): 0/0
0.260
A
Visible Content: Moved Permanently The document has moved here .
Date: Mon, 08 Feb 2021 19:23:52 GMT
Server: Apache
Strict-Transport-Security: max-age=31536000; includeSubDomains
Location: https://ICME.HPC.MsState.Edu/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-Length: 306
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://ICME.HPC.MsState.Edu/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 100.00 %
Other inline scripts (∑/total): 0/0
3.950
A
Not Found
Visible Content: Not Found The requested URL was not found on this server. Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.
Date: Mon, 08 Feb 2021 19:23:59 GMT
Server: Apache
Strict-Transport-Security: max-age=31536000; includeSubDomains
Content-Length: 315
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://130.18.90.4/
130.18.90.4
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
403

Html is minified: 100.00 %
Other inline scripts (∑/total): 0/0
5.946
N
Forbidden
Certificate error: RemoteCertificateNameMismatch
small visible content (num chars: 60)
Forbidden You don't have permission to access this resource.
Date: Mon, 08 Feb 2021 19:23:53 GMT
Server: Apache
Strict-Transport-Security: max-age=31536000; includeSubDomains
Content-Length: 199
Connection: close
Content-Type: text/html; charset=iso-8859-1

 

7. Comments


1. General Results, most used to calculate the result

Aname "icme.hpc.msstate.edu" is subdomain, public suffix is ".edu", top-level-domain is ".edu", top-level-domain-type is "sponsored", tld-manager is "EDUCAUSE", num .edu-domains preloaded: 18 (complete: 142558)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: icme.hpc.msstate.edu has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: icme.hpc.msstate.edu has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
AGood: destination is https
AGood - only one version with Http-Status 200
AGood: one preferred version: non-www is preferred
AGood: No cookie sent via http.
AGood: every https has a Strict Transport Security Header
AGood: HSTS max-age is long enough, 31536000 seconds = 365 days
AGood: HSTS has includeSubdomains - directive
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: All urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset)
Ahttp://icme.hpc.msstate.edu/ 130.18.90.4
301
https://ICME.HPC.MsState.Edu/
Correct redirect http - https with the same domain name
Mhttps://130.18.90.4/ 130.18.90.4
403

Misconfiguration - main pages should never send http status 400 - 499
Nhttps://130.18.90.4/ 130.18.90.4
403

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
XFatal error: Nameserver doesn't support TCP connection: ns1.msstate.edu / 2620:0:1a30:1080::12: Timeout
XFatal error: Nameserver doesn't support TCP connection: ns2.msstate.edu / 2620:0:1a30:1080::13: Timeout
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are different. So that domain requires Server Name Indication (SNI), so the server is able to select the correct certificate.: Domain icme.hpc.msstate.edu, 1 ip addresses.

2. Header-Checks


3. DNS- and NameServer - Checks

AInfo:: 3 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 3 Queries complete, 3 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns1.msstate.edu (130.18.80.12, 2620:0:1a30:1080::12), ns2.msstate.edu (130.18.80.13, 2620:0:1a30:1080::13)
AGood (1 - 3.0):: An average of 1.5 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 4 different Name Servers found: ns1.hpc.msstate.edu, ns1.msstate.edu, ns2.hpc.msstate.edu, ns2.msstate.edu, 4 Name Servers included in Delegation: NS1.HPC.MsState.Edu, NS1.MsState.Edu, NS2.HPC.MsState.Edu, NS2.MsState.Edu, 4 Name Servers included in 1 Zone definitions: NS1.HPC.MsState.Edu, NS1.MsState.Edu, NS2.HPC.MsState.Edu, NS2.MsState.Edu, 1 Name Servers listed in SOA.Primary: ns1.hpc.msstate.edu.
AGood: Only one SOA.Primary Name Server found.: ns1.hpc.msstate.edu.
AGood: SOA.Primary Name Server included in the delegation set.: ns1.hpc.msstate.edu.
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AInfo: Ipv4-Subnet-list: 4 Name Servers, 2 different subnets (first Byte): 130., 192., 2 different subnets (first two Bytes): 130.18., 192.208., 3 different subnets (first three Bytes): 130.18.80., 130.18.90., 192.208.139.
AGood: Name Server IPv4-addresses from different subnet found:
AInfo: IPv6-Subnet-list: 2 Name Servers with IPv6, 1 different subnets (first block): 2620:, 1 different subnets (first two blocks): 2620:0000:, 1 different subnets (first three blocks): 2620:0000:1a30:, 1 different subnets (first four blocks): 2620:0000:1a30:1080:
Fatal: All Name Server IPv6 addresses from the same subnet.
XNameserver Timeout checking Echo Capitalization: ns1.msstate.edu / 2620:0:1a30:1080::12
XNameserver Timeout checking Echo Capitalization: ns2.msstate.edu / 2620:0:1a30:1080::13
XNameserver Timeout checking EDNS512: ns1.msstate.edu / 2620:0:1a30:1080::12
XNameserver Timeout checking EDNS512: ns2.msstate.edu / 2620:0:1a30:1080::13
Nameserver doesn't pass all EDNS-Checks: a.edu-servers.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: b.edu-servers.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: c.edu-servers.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: d.edu-servers.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: e.edu-servers.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: f.edu-servers.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: g.edu-servers.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: h.edu-servers.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: i.edu-servers.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: j.edu-servers.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: k.edu-servers.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: l.edu-servers.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: m.edu-servers.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.hpc.msstate.edu: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.hpc.msstate.edu / 130.18.90.2: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.hpc.msstate.edu / 130.18.90.2: OP100: ok. FLAGS: ok. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: ok. V1DNSSEC: fatal timeout. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns1.hpc.msstate.edu / 130.18.90.2: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.msstate.edu / 130.18.80.12: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.msstate.edu / 130.18.80.12: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.msstate.edu / 2620:0:1a30:1080::12: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.msstate.edu / 2620:0:1a30:1080::12: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns1.msstate.edu / 2620:0:1a30:1080::12: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.msstate.edu / 2620:0:1a30:1080::12: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns2.hpc.msstate.edu / 192.208.139.12: OP100: ok. FLAGS: ok. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: ok. V1DNSSEC: fatal timeout. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.hpc.msstate.edu / 192.208.139.12: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.msstate.edu / 130.18.80.13: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.msstate.edu / 130.18.80.13: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.msstate.edu / 2620:0:1a30:1080::13: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.msstate.edu / 2620:0:1a30:1080::13: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.msstate.edu / 2620:0:1a30:1080::13: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns2.msstate.edu / 2620:0:1a30:1080::13: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: trantor.umd.edu / 128.8.10.14: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
AGood: CAA entries found, creating certificate is limited: letsencrypt.org is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: sectigo.com is allowed to create certificates

4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: No https + http status 200 with inline CSS / JavaScript found
AGood: Every https result with status 200 has a minified Html-Content with a quota lower then 110 %.
https://icme.hpc.msstate.edu/ 130.18.90.4
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
http://icme.hpc.msstate.edu/ 130.18.90.4
301

Warning: HSTS header sent via http has no effect
https://ICME.HPC.MsState.Edu/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404
3.950 seconds
Warning: 404 needs more then one second
ADuration: 1375513 milliseconds, 1375.513 seconds

 

8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
icme.hpc.msstate.edu
130.18.90.4
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
icme.hpc.msstate.edu
130.18.90.4
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - duplicate certificates

1CN=icme.hpc.msstate.edu


2CN=icme.hpc.msstate.edu


3CN=R3, O=Let's Encrypt, C=US


ICME.HPC.MsState.Edu
ICME.HPC.MsState.Edu
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

ICME.HPC.MsState.Edu
ICME.HPC.MsState.Edu
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - duplicate certificates

1CN=icme.hpc.msstate.edu


2CN=icme.hpc.msstate.edu


3CN=R3, O=Let's Encrypt, C=US


130.18.90.4
130.18.90.4
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

130.18.90.4
130.18.90.4
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=avtc.msstate.edu, OU=MsState, O=Mississippi State University, L=Mississippi State, C=US, street=Lee Boulevard


2CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


4CN=InCommon RSA Server CA, OU=InCommon, O=Internet2, L=Ann Arbor, C=US, ST=MI

 

9. Certificates

1.
1.
CN=icme.hpc.msstate.edu
19.01.2021
19.04.2021
1437 days expired
icme.hpc.msstate.edu - 1 entry
1.
1.
CN=icme.hpc.msstate.edu
19.01.2021

19.04.2021
1437 days expired


icme.hpc.msstate.edu - 1 entry

KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:04223D60F349106F33BB1760AF8A29963E0E
Thumbprint:650F669E8E65FD602BA6DE9B79C114C2B0F2314E
SHA256 / Certificate:xpm/Bzb5vNN9VvLwF0lejHXD1mWUunuJTjY9rpDsKkY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):9ce13b418c9deaec827ae8050135506d3d1977fe095e7b2b614c0cb665558406
SHA256 hex / Subject Public Key Information (SPKI):9ce13b418c9deaec827ae8050135506d3d1977fe095e7b2b614c0cb665558406
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=R3, O=Let's Encrypt, C=US
07.10.2020
29.09.2021
1274 days expired


2.
CN=R3, O=Let's Encrypt, C=US
07.10.2020

29.09.2021
1274 days expired




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:400175048314A4C8218C84A90C16CDDF
Thumbprint:48504E974C0DAC5B5CD476C8202274B24C8C7172
SHA256 / Certificate:cwwb3NhfV85dwLunM+XxulqSWyp3HWQKJvekVCJNrTs=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




3.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000
30.09.2021
1273 days expired


3.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000

30.09.2021
1273 days expired




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:44AFB080D6A327BA893039862EF8406B
Thumbprint:DAC9024F54D8F6DF94935FB1732638CA6AD77C13
SHA256 / Certificate:BocmAzGnJAPZCfEF5pvPDTLhvSST/8bZIG0RvNZ3Bzk=
SHA256 hex / Cert (DANE * 0 1):0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739
SHA256 hex / PublicKey (DANE * 1 1):563b3caf8cfef34c2335caf560a7a95906e8488462eb75ac59784830df9e5b2b
SHA256 hex / Subject Public Key Information (SPKI):563b3caf8cfef34c2335caf560a7a95906e8488462eb75ac59784830df9e5b2b
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




2.
1.
CN=avtc.msstate.edu, OU=MsState, O=Mississippi State University, STREET=Lee Boulevard, L=Mississippi State, S=MS, PostalCode=39762, C=US
26.02.2019
26.02.2021
1489 days expired
avtc.msstate.edu - 1 entry
2.
1.
CN=avtc.msstate.edu, OU=MsState, O=Mississippi State University, STREET=Lee Boulevard, L=Mississippi State, S=MS, PostalCode=39762, C=US
26.02.2019

26.02.2021
1489 days expired


avtc.msstate.edu - 1 entry

KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00D7644EE73C22B275D85063BE9B9E84D8
Thumbprint:84CAD7F9462842850C6CCA5BECF2FC9ECC00C5FB
SHA256 / Certificate:oFU6Zd7hGUeaoLq/3kpRq/aENF9wGYo6hQeTwYqFAEw=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):a407c8eb1d28398594f8979eda94e50a1701ef211bb10a17fe83b4f43378c474
SHA256 hex / Subject Public Key Information (SPKI):a407c8eb1d28398594f8979eda94e50a1701ef211bb10a17fe83b4f43378c474
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=avtc.msstate.edu, OU=MsState, O=Mississippi State University, STREET=Lee Boulevard, L=Mississippi State, S=MS, PostalCode=39762, C=US
26.02.2019
26.02.2021
1489 days expired
avtc.msstate.edu - 1 entry

2.
CN=avtc.msstate.edu, OU=MsState, O=Mississippi State University, STREET=Lee Boulevard, L=Mississippi State, S=MS, PostalCode=39762, C=US
26.02.2019

26.02.2021
1489 days expired


avtc.msstate.edu - 1 entry

KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00D7644EE73C22B275D85063BE9B9E84D8
Thumbprint:84CAD7F9462842850C6CCA5BECF2FC9ECC00C5FB
SHA256 / Certificate:oFU6Zd7hGUeaoLq/3kpRq/aENF9wGYo6hQeTwYqFAEw=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):a407c8eb1d28398594f8979eda94e50a1701ef211bb10a17fe83b4f43378c474
SHA256 hex / Subject Public Key Information (SPKI):a407c8eb1d28398594f8979eda94e50a1701ef211bb10a17fe83b4f43378c474
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




3.
CN=InCommon RSA Server CA, OU=InCommon, O=Internet2, L=Ann Arbor, S=MI, C=US
06.10.2014
06.10.2024
171 days expired


3.
CN=InCommon RSA Server CA, OU=InCommon, O=Internet2, L=Ann Arbor, S=MI, C=US
06.10.2014

06.10.2024
171 days expired




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:4720D0FA85461A7E17A1640291846374
Thumbprint:F5FB01DEA6E59CA6DD057054F4A3FF72DDE1D5C6
SHA256 / Certificate:CgXEYnVjkN0fHV3YJ5TDAPBL54nc521+MS95DWj9OFo=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):6f5240ebee2cbe39999f11a3022418dd14b403d16d8ca2c259a46556608f336f
SHA256 hex / Subject Public Key Information (SPKI):6f5240ebee2cbe39999f11a3022418dd14b403d16d8ca2c259a46556608f336f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




4.
CN=InCommon RSA Server CA, OU=InCommon, O=Internet2, L=Ann Arbor, S=MI, C=US
06.10.2014
06.10.2024
171 days expired


4.
CN=InCommon RSA Server CA, OU=InCommon, O=Internet2, L=Ann Arbor, S=MI, C=US
06.10.2014

06.10.2024
171 days expired




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:4720D0FA85461A7E17A1640291846374
Thumbprint:F5FB01DEA6E59CA6DD057054F4A3FF72DDE1D5C6
SHA256 / Certificate:CgXEYnVjkN0fHV3YJ5TDAPBL54nc521+MS95DWj9OFo=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):6f5240ebee2cbe39999f11a3022418dd14b403d16d8ca2c259a46556608f336f
SHA256 hex / Subject Public Key Information (SPKI):6f5240ebee2cbe39999f11a3022418dd14b403d16d8ca2c259a46556608f336f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010
19.01.2038
expires in 4682 days


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010

19.01.2038
expires in 4682 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:01FD6D30FCA3CA51A81BBC640E35032D
Thumbprint:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
SHA256 / Certificate:55PJsC/YqhPiHDEiisywgRlkO3SciYlksXRtRsPUy9I=
SHA256 hex / Cert (DANE * 0 1):e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:





6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019
01.01.2029
expires in 1377 days


6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019

01.01.2029
expires in 1377 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:3972443AF922B751D7D36C10DD313595
Thumbprint:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
SHA256 / Certificate:aLnHYSGaWx8BMXhEdGZdthu9sQngDwXKn3QkTuX19Ss=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004
01.01.2029
expires in 1377 days


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004

01.01.2029
expires in 1377 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:01
Thumbprint:D1EB23A46D17D68FD92564C2F1F1601764D8E349
SHA256 / Certificate:16eg+11+JzHXcelITrze9x1fDD4KKUh4K8g+4OppnvQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SHA256 hex / Subject Public Key Information (SPKI):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Small Code Update - wait one minute

 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Small Code Update - wait one minute

 

11. Html-Content - Entries

Summary

No data found or small Code-update

 

Details (currently limited to 500 rows - some problems with spam users)

Small Code Update - wait one minute

 

12. Html-Parsing via https://validator.w3.org/nu/

Small Code update, wait one minute

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns1.hpc.msstate.edu, ns1.msstate.edu, ns2.hpc.msstate.edu, ns2.msstate.edu

 

QNr.DomainTypeNS used
1
edu
NS
d.root-servers.net (2001:500:2d::d)

Answer: a.edu-servers.net, b.edu-servers.net, c.edu-servers.net, d.edu-servers.net, e.edu-servers.net, f.edu-servers.net, g.edu-servers.net, h.edu-servers.net, i.edu-servers.net, j.edu-servers.net, k.edu-servers.net, l.edu-servers.net, m.edu-servers.net
2
ns1.hpc.msstate.edu
NS
a.edu-servers.net (2001:503:a83e::2:30)

Answer: ns1.msstate.edu, ns2.msstate.edu, trantor.umd.edu

Answer: ns1.msstate.edu
130.18.80.12, 2620:0:1a30:1080::12

Answer: ns2.msstate.edu
130.18.80.13, 2620:0:1a30:1080::13

Answer: trantor.umd.edu
128.8.10.14
3
ns2.hpc.msstate.edu
NS
a.edu-servers.net (2001:503:a83e::2:30)

Answer: ns1.msstate.edu, ns2.msstate.edu, trantor.umd.edu

Answer: ns1.msstate.edu
130.18.80.12, 2620:0:1a30:1080::12

Answer: ns2.msstate.edu
130.18.80.13, 2620:0:1a30:1080::13

Answer: trantor.umd.edu
128.8.10.14

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
icme.hpc.msstate.edu



1
0
web.HPC.MsState.Edu
0

no CAA entry found
1
0
hpc.msstate.edu
5
issue
letsencrypt.org
1
0

5
issue
letsencrypt.org
1
0

5
issue
sectigo.com
1
0

5
issue
sectigo.com
1
0
msstate.edu
0

no CAA entry found
1
0

0

no CAA entry found
1
0
Edu
0

no CAA entry found
1
0

0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
hpc.msstate.edu
High Performance Computing Collaboratory (HPC2)
ok
1
0
hpc.msstate.edu
MS=3EF5F512172015635BC07705AE7A28CD3C594E81
ok
1
0
hpc.msstate.edu
v=spf1 include:_spf.hpc.msstate.edu ?all
ok
1
0
hpc.msstate.edu
yq12p/MFpOiIUp+hlvVSLHURXRnBCyVXSUAs5momvK9Jlm0I4byD6QYZnmxoMXFN0uVcCQdyGSRJQPMO5jVW7g==
ok
1
0
icme.hpc.msstate.edu


1
0
_acme-challenge.web.HPC.MsState.Edu

Name Error - The domain name does not exist
1
0
_acme-challenge.icme.hpc.msstate.edu

Name Error - The domain name does not exist
1
0
_acme-challenge.icme.hpc.msstate.edu.hpc.msstate.edu

Name Error - The domain name does not exist
1
0
_acme-challenge.web.HPC.MsState.Edu.web.HPC.MsState.Edu

Name Error - The domain name does not exist
1
0
_acme-challenge.icme.hpc.msstate.edu.icme.hpc.msstate.edu

Name Error - The domain name does not exist
1
0

 

16. DomainService - Entries

No DomainServiceEntries entries found

 

 

17. Cipher Suites

No Ciphers found

 

18. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.

 

 

Permalink: https://check-your-website.server-daten.de/?i=56c2e19a-0d38-4f72-8d0c-05a00d8adbc7

 

Last Result: https://check-your-website.server-daten.de/?q=icme.hpc.msstate.edu - 2021-02-08 20:01:39

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=icme.hpc.msstate.edu" target="_blank">Check this Site: icme.hpc.msstate.edu</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=icme.hpc.msstate.edu