Check DNS, Urls + Redirects, Certificates and Content of your Website




X

DNS-problem - authoritative Nameserver refused, not defined or timeout

Checked:
24.01.2023 12:32:37


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
samraksha.ceikerala.gov.in
A
117.193.73.153
Kannur/Kerala/India (IN) - BSNL Internet
No Hostname found
yes
1
0

AAAA

yes


www.samraksha.ceikerala.gov.in
A
117.193.73.153
Kannur/Kerala/India (IN) - BSNL Internet
No Hostname found
yes
1
0

AAAA

yes


*.ceikerala.gov.in
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.samraksha.ceikerala.gov.in
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 951, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.02.2023, 00:00:00 +, Signature-Inception: 21.01.2023, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: in
in
2 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 54739, DigestType 1 and Digest K1ykVaDmV2n/nfnnXsQO4ewc3Kk=



DS with Algorithm 8, KeyTag 54739, DigestType 2 and Digest nxIs/WYErm3toP4J8nvjQKMY8Gr6wRcUpzQJ1DE2Ryw=



1 RRSIG RR to validate DS RR found



RRSIG-Owner in., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 06.02.2023, 05:00:00 +, Signature-Inception: 24.01.2023, 04:00:00 +, KeyTag 951, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 951 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 54739, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 65169, Flags 256



2 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner in., Algorithm: 8, 1 Labels, original TTL: 900 sec, Signature-expiration: 17.02.2023, 03:14:53 +, Signature-Inception: 18.01.2023, 02:23:22 +, KeyTag 54739, Signer-Name: in



RRSIG-Owner in., Algorithm: 8, 1 Labels, original TTL: 900 sec, Signature-expiration: 17.02.2023, 03:14:53 +, Signature-Inception: 18.01.2023, 02:23:22 +, KeyTag 65169, Signer-Name: in



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 54739 used to validate the DNSKEY RRSet



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 65169 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 54739, DigestType 1 and Digest "K1ykVaDmV2n/nfnnXsQO4ewc3Kk=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 54739, DigestType 2 and Digest "nxIs/WYErm3toP4J8nvjQKMY8Gr6wRcUpzQJ1DE2Ryw=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: gov.in
gov.in
2 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 6814, DigestType 1 and Digest iDh7B2sln6av9FC1N4nNuVvZA8E=



DS with Algorithm 8, KeyTag 6814, DigestType 2 and Digest xguzkutzexQGINmT6ncNlBjmDD1WDpEyZjSULdcEOOs=



1 RRSIG RR to validate DS RR found



RRSIG-Owner gov.in., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 17.02.2023, 01:59:48 +, Signature-Inception: 18.01.2023, 01:39:53 +, KeyTag 65169, Signer-Name: in



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 65169 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 6814, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 62943, Flags 256



2 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner gov.in., Algorithm: 8, 2 Labels, original TTL: 900 sec, Signature-expiration: 17.02.2023, 03:58:29 +, Signature-Inception: 18.01.2023, 03:35:57 +, KeyTag 6814, Signer-Name: gov.in



RRSIG-Owner gov.in., Algorithm: 8, 2 Labels, original TTL: 900 sec, Signature-expiration: 17.02.2023, 03:58:29 +, Signature-Inception: 18.01.2023, 03:35:57 +, KeyTag 62943, Signer-Name: gov.in



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 6814 used to validate the DNSKEY RRSet



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 62943 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 6814, DigestType 1 and Digest "iDh7B2sln6av9FC1N4nNuVvZA8E=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 6814, DigestType 2 and Digest "xguzkutzexQGINmT6ncNlBjmDD1WDpEyZjSULdcEOOs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: ceikerala.gov.in
ceikerala.gov.in
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "lcn5he6n4p925dqdlpt98g36gdkocl5s" between the hashed NSEC3-owner "jeebm8ks0n4mq4cdgdacnk3lnr8ams2g" and the hashed NextOwner "lqv6jhotd9pl11hjacqtlt91q6j20c43". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner jeebm8ks0n4mq4cdgdacnk3lnr8ams2g.gov.in., Algorithm: 8, 3 Labels, original TTL: 1800 sec, Signature-expiration: 17.02.2023, 03:27:20 +, Signature-Inception: 18.01.2023, 03:10:42 +, KeyTag 62943, Signer-Name: gov.in



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "npk19skvsdmju264d4ono0khqf7eafqv" as Owner. That's the Hash of "gov.in" with the NextHashedOwnerName "p0kkr4bmbgljdokbgbi0kdm39dsm0ea4". So that domain name is the Closest Encloser of "ceikerala.gov.in". Opt-Out: True.
Bitmap: NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner npk19skvsdmju264d4ono0khqf7eafqv.gov.in., Algorithm: 8, 3 Labels, original TTL: 1800 sec, Signature-expiration: 17.02.2023, 03:58:39 +, Signature-Inception: 18.01.2023, 03:00:14 +, KeyTag 62943, Signer-Name: gov.in



0 DNSKEY RR found




Zone: samraksha.ceikerala.gov.in
samraksha.ceikerala.gov.in
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: www.samraksha.ceikerala.gov.in
www.samraksha.ceikerala.gov.in
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.samraksha.ceikerala.gov.in
  ldmaster.kerala.gov.in

samraksha.ceikerala.gov.in
  ldmaster.kerala.gov.in
103.251.43.64
Trivandrum/Kerala/India (IN) - Kerala State IT Mission

ceikerala.gov.in
  ldmaster.kerala.gov.in
103.251.43.64
Trivandrum/Kerala/India (IN) - Kerala State IT Mission


  ldslave.kerala.gov.in
103.251.43.44
Trivandrum/Kerala/India (IN) - Kerala State IT Mission

gov.in
  ns1.registry.in / dns1.frpar1
37.209.192.12
Melbourne/Victoria/Australia (AU) - NeuStar, Inc.


 
2001:dcd:1::12
Melbourne/Victoria/Australia (AU) - NeuStar, Inc.


  ns2.registry.in / dns1.defra1
37.209.194.12
Sydney/New South Wales/Australia (AU) - NeuStar, Inc.


 
2001:dcd:2::12
Melbourne/Victoria/Australia (AU) - NeuStar, Inc.


  ns3.registry.in / dns4.nlams1
37.209.196.12
Sydney/New South Wales/Australia (AU) - NeuStar, Inc.


 
2001:dcd:3::12
Melbourne/Victoria/Australia (AU) - NeuStar, Inc.


  ns4.registry.in / dns2.nlams1
37.209.198.12
Sydney/New South Wales/Australia (AU) - NeuStar, Inc.


 
2001:dcd:4::12
Melbourne/Victoria/Australia (AU) - NeuStar, Inc.


  ns5.registry.in / TLD_Host1.Frankfurt_Node1
156.154.100.20
New York/United States (US) - NeuStar, Inc.


 
2001:502:2eda::20
Sterling/Virginia/United States (US) - NeuStar, Inc.


  ns6.registry.in / TLD_Host1.Amsterdam_Node1
156.154.101.20
New York/United States (US) - NeuStar, Inc.


 
2001:502:ad09::20
Sterling/Virginia/United States (US) - NeuStar, Inc.

in
  ns1.registry.in / dns3.frpar1


  ns2.registry.in / dns4.nlams1


  ns3.registry.in / dns3.nlams1


  ns4.registry.in / dns4.nlams1


  ns5.registry.in / TLD_Host2.Frankfurt_Node1


  ns6.registry.in / TLD_Host2.Amsterdam_Node1


4. SOA-Entries


Domain:in
Zone-Name:in
Primary:ns1.registry.in
Mail:dns.registry.in
Serial:1674559321
Refresh:1800
Retry:300
Expire:1814400
TTL:1800
num Entries:2


Domain:in
Zone-Name:in
Primary:ns1.registry.in
Mail:dns.registry.in
Serial:1674559638
Refresh:1800
Retry:300
Expire:1814400
TTL:1800
num Entries:4


Domain:gov.in
Zone-Name:gov.in
Primary:ns1.registry.in
Mail:dns.registry.in
Serial:1674553915
Refresh:1800
Retry:300
Expire:1814400
TTL:1800
num Entries:12


Domain:ceikerala.gov.in
Zone-Name:ceikerala.gov.in
Primary:ldmaster.kerala.gov.in
Mail:nsadmin.keralaitmission.org
Serial:2018041006
Refresh:3600
Retry:3600
Expire:1209600
TTL:3600
num Entries:2


Domain:samraksha.ceikerala.gov.in
Zone-Name:ceikerala.gov.in
Primary:ldmaster.kerala.gov.in
Mail:nsadmin.keralaitmission.org
Serial:2018041006
Refresh:3600
Retry:3600
Expire:1209600
TTL:3600
num Entries:1


Domain:www.samraksha.ceikerala.gov.in
Zone-Name:ceikerala.gov.in
Primary:ldmaster.kerala.gov.in
Mail:nsadmin.keralaitmission.org
Serial:2018041006
Refresh:3600
Retry:3600
Expire:1209600
TTL:3600
num Entries:1


5. Screenshots

Startaddress: https://samraksha.ceikerala.gov.in/, address used: https://samraksha.ceikerala.gov.in/, Screenshot created 2023-01-24 12:38:59 +00:0 url is insecure, certificate invalid

Mobil (412px x 732px)

2093 milliseconds

Screenshot mobile - https://samraksha.ceikerala.gov.in/
Mobil + Landscape (732px x 412px)

2041 milliseconds

Screenshot mobile landscape - https://samraksha.ceikerala.gov.in/
Screen (1280px x 1680px)

3608 milliseconds

Screenshot Desktop - https://samraksha.ceikerala.gov.in/

Mobile- and other Chrome-Checks

widthheight
visual Viewport396732
content Size3967242

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://samraksha.ceikerala.gov.in/
117.193.73.153 GZip used - 11595 / 86825 - 86.65 %
200

Html is minified: 288.28 %
0.517

Date: Tue, 24 Jan 2023 11:34:27 GMT
Server: CustomSecretiveName
Cache-Control: no-cache, private
Referrer-Policy: no-referrer-when-downgrade
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Strict-Transport-Security: max-age=31536000; includeSubDomains
X-Forwarded-Host: samraksha.ceikerala.gov.in
Content-Security-Policy: connect-src 'self';object-src 'self',frame-src 'self',child-src 'self';
Expect-CT: enforce, max-age=30
Permissions-Policy: autoplay=(self), camera=(), encrypted-media=(self), fullscreen=(), geolocation=(self), gyroscope=(self), magnetometer=(), microphone=(), midi=(), payment=(), sync-xhr=(self), usb=()
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: GET,POST,PUT,PATCH,DELETE,OPTIONS
Access-Control-Allow-Headers: Content-Type,Authorization,X-Requested-With,X-CSRF-Token
Set-Cookie: XSRF-TOKEN=eyJpdiI6IitTZ0RjZVBvRDlkWEZUVDh3REhtdkE9PSIsInZhbHVlIjoiZmpMLy9TMGU2RUJzTVV5YkJObVN4b3lBUmhyZHNyYjExTkVhK1dMMTIyaFNXSThzYXZLcW9tTmR2UHNwMXdTc2pLV21paHVJZi9GYWU2UnQrbXhoZnJkOTFYT1Z3WWllbFVienh6OWxLM1ljWU1XR0s3UWlsQXF2TEZ1L1E2SjYiLCJtYWMiOiI5MDVhYTY0NjNlNjUwNGY1ZWY3YzM4MTkwMDU3ZGQ0ZDY3NjZhZTQ0Y2ZiNjI2NWZhMGQ1N2IzYzk0YjMxYzFiIiwidGFnIjoiIn0%3D; expires=Tue, 24-Jan-2023 13:34:27 GMT; Max-Age=7200; path=/,kselb_session=eyJpdiI6Iis0a1E5dmJpMEtHeklKUG10Q21HMFE9PSIsInZhbHVlIjoiZUV2THdObFBDOHZ3cFRVeE1Hb1YxV2FmemNmbElGMHVaMTJQNGZIVm5WLyttRDNjZzM5U2lLb2J3dWt2L1ZWbW9oNWg3d0lqS2xWWjRqQ3ZUWTB5SDhlQU9jSkRkbHhwVTJjWWJRSytHM1owZTNoRnljZFM5SzJ2R2U3azAwbWQiLCJtYWMiOiJmOTNiNjA1YjFhMWYyNDkyZmUzNjA2NjZhZTcxYjllZTg3YWUwOWEwNmE0YTJlMGNmMGZkMmQyZDY1YWMwNjViIiwidGFnIjoiIn0%3D; path=/; httponly
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Length: 11595
Connection: close
Content-Type: text/html; charset=UTF-8

• http://www.samraksha.ceikerala.gov.in/
117.193.73.153
400

0.470
M
Bad Request
Date: Tue, 24 Jan 2023 11:34:28 GMT
Server: CustomSecretiveName
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8

• https://samraksha.ceikerala.gov.in/
117.193.73.153 GZip used - 11587 / 86864 - 86.66 %
Inline-JavaScript (∑/total): 17/20133 Inline-CSS (∑/total): 4/2944
200

Html is minified: 288.34 %
6.807
N
Certificate error: RemoteCertificateChainErrors
Date: Tue, 24 Jan 2023 11:34:29 GMT
Server: CustomSecretiveName
Cache-Control: no-cache, private
Referrer-Policy: no-referrer-when-downgrade
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Strict-Transport-Security: max-age=31536000; includeSubDomains
X-Forwarded-Host: samraksha.ceikerala.gov.in
Content-Security-Policy: connect-src 'self';object-src 'self',frame-src 'self',child-src 'self';
Expect-CT: enforce, max-age=30
Permissions-Policy: autoplay=(self), camera=(), encrypted-media=(self), fullscreen=(), geolocation=(self), gyroscope=(self), magnetometer=(), microphone=(), midi=(), payment=(), sync-xhr=(self), usb=()
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: GET,POST,PUT,PATCH,DELETE,OPTIONS
Access-Control-Allow-Headers: Content-Type,Authorization,X-Requested-With,X-CSRF-Token
Set-Cookie: XSRF-TOKEN=eyJpdiI6ImpWWENNYmx0Z25seXM2L3pueXBNY2c9PSIsInZhbHVlIjoiUGtqekMwMmEzM09YK05XZCs0Z3NEUmhrSjlYN1c3WVRaTjVGYUdPWlRKWFRwREdHT0lNNHRhOStjR0d6c08xb1RvcDN1VnVKZGt3OTZFQnVQa20zM2RhQ3N4VDlMN0pGRS9yZTZDdEJ0azBpbERyYzNKSjNOdk1tTExVVjBXUGIiLCJtYWMiOiJlZmM4NjM0YTEyOTZkMTVhMGI3NWFmYTE2MjQ3NzdkNzkxMDcwZjVmMDU1MmFjZWNhZTYzNmY5OWZkMzA2Y2FmIiwidGFnIjoiIn0%3D; expires=Tue, 24-Jan-2023 13:34:29 GMT; Max-Age=7200; path=/,kselb_session=eyJpdiI6IkFjN3RPTG0xQzF1VnBqUmxmTzhBWXc9PSIsInZhbHVlIjoiR3RzT1orSTNYc2V4ajdSdlhiZkF4c3ZVc3l1WGpxMllYWU1WY1lTQkpUalFHZEs5UHpTQ05meXRKa3ZGUWNYMlF1YlJYT3FqWVR2UzJjMHdEa21TcnB5cVAwanV0QzhEclBBNStSODcxQU52c3ZFOUsrcmV2VWhvWXlCSW5ob1kiLCJtYWMiOiI2MzhjZTUxNDZmOTUwMWFmNGQ1YTQ3NmFiOGQ3MDRhNGVlYjEwMmVmNTNhZTU4YzljMzIxMjMxYzJiMTZkNjVkIiwidGFnIjoiIn0%3D; path=/; httponly
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Length: 11587
Connection: close
Content-Type: text/html; charset=UTF-8

• https://www.samraksha.ceikerala.gov.in/
117.193.73.153
400

6.460
N
Bad Request
Certificate error: RemoteCertificateChainErrors
Date: Tue, 24 Jan 2023 11:34:37 GMT
Server: CustomSecretiveName
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8

• https://www.samraksha.ceikerala.gov.in:80/
117.193.73.153
-4

0.887
A
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.
Visible Content:

• http://samraksha.ceikerala.gov.in/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
117.193.73.153 GZip used - 459 / 1208 - 62.00 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 1/715
200

Html is minified: 413.70 %
0.483

Visible Content: Something went Wrong!!!!
Date: Tue, 24 Jan 2023 11:34:44 GMT
Server: CustomSecretiveName
Cache-Control: no-cache, private
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Length: 459
Connection: close
Content-Type: text/html; charset=UTF-8

• http://www.samraksha.ceikerala.gov.in/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
117.193.73.153 GZip used - 459 / 1208 - 62.00 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 1/715
200

Html is minified: 413.70 %
0.470

Visible Content: Something went Wrong!!!!
Date: Tue, 24 Jan 2023 11:34:44 GMT
Server: CustomSecretiveName
Cache-Control: no-cache, private
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Length: 459
Connection: close
Content-Type: text/html; charset=UTF-8

• https://117.193.73.153/
117.193.73.153
301
https://samraksha.ceikerala.gov.in/
Html is minified: 100.00 %
6.620
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Date: Tue, 24 Jan 2023 11:34:46 GMT
Server: CustomSecretiveName
Location: https://samraksha.ceikerala.gov.in/
Content-Length: 243
Connection: close
Content-Type: text/html; charset=iso-8859-1

7. Comments


1. General Results, most used to calculate the result

Aname "samraksha.ceikerala.gov.in" is subdomain, public suffix is ".gov.in", top-level-domain is ".in", top-level-domain-type is "country-code", Country is India, tld-manager is "National Internet Exchange of India", num .in-domains preloaded: 918 (complete: 216710)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: samraksha.ceikerala.gov.in has only one ip address.
Warning: Only one ip address found: www.samraksha.ceikerala.gov.in has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: samraksha.ceikerala.gov.in has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.samraksha.ceikerala.gov.in has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
Ahttps://117.193.73.153/ 117.193.73.153
301
https://samraksha.ceikerala.gov.in/
Correct redirect https to https
AGood: one preferred version: non-www is preferred
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: All urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset)
Bhttps://www.samraksha.ceikerala.gov.in/ 117.193.73.153
400

Missing HSTS-Header
http://samraksha.ceikerala.gov.in/ 117.193.73.153
200
XSRF-TOKEN=eyJpdiI6IitTZ0RjZVBvRDlkWEZUVDh3REhtdkE9PSIsInZhbHVlIjoiZmpMLy9TMGU2RUJzTVV5YkJObVN4b3lBUmhyZHNyYjExTkVhK1dMMTIyaFNXSThzYXZLcW9tTmR2UHNwMXdTc2pLV21paHVJZi9GYWU2UnQrbXhoZnJkOTFYT1Z3WWllbFVienh6OWxLM1ljWU1XR0s3UWlsQXF2TEZ1L1E2SjYiLCJtYWMiOiI5MDVhYTY0NjNlNjUwNGY1ZWY3YzM4MTkwMDU3ZGQ0ZDY3NjZhZTQ0Y2ZiNjI2NWZhMGQ1N2IzYzk0YjMxYzFiIiwidGFnIjoiIn0%3D; expires=Tue, 24-Jan-2023 13:34:27 GMT; Max-Age=7200; path=/
Fatal: Cookie sent via http. Never send Cookies / Session-Cookies via http. If a user uses an insecure WLan and if the same cookie is used to managed the authenticated session, it's possible to hack that user. Same with HttpOnly - without https that's only decorative.
http://samraksha.ceikerala.gov.in/ 117.193.73.153
200
kselb_session=eyJpdiI6Iis0a1E5dmJpMEtHeklKUG10Q21HMFE9PSIsInZhbHVlIjoiZUV2THdObFBDOHZ3cFRVeE1Hb1YxV2FmemNmbElGMHVaMTJQNGZIVm5WLyttRDNjZzM5U2lLb2J3dWt2L1ZWbW9oNWg3d0lqS2xWWjRqQ3ZUWTB5SDhlQU9jSkRkbHhwVTJjWWJRSytHM1owZTNoRnljZFM5SzJ2R2U3azAwbWQiLCJtYWMiOiJmOTNiNjA1YjFhMWYyNDkyZmUzNjA2NjZhZTcxYjllZTg3YWUwOWEwNmE0YTJlMGNmMGZkMmQyZDY1YWMwNjViIiwidGFnIjoiIn0%3D; path=/; httponly
Fatal: Cookie sent via http. Never send Cookies / Session-Cookies via http. If a user uses an insecure WLan and if the same cookie is used to managed the authenticated session, it's possible to hack that user. Same with HttpOnly - without https that's only decorative.
Bhttps://samraksha.ceikerala.gov.in/ 117.193.73.153
200
XSRF-TOKEN=eyJpdiI6ImpWWENNYmx0Z25seXM2L3pueXBNY2c9PSIsInZhbHVlIjoiUGtqekMwMmEzM09YK05XZCs0Z3NEUmhrSjlYN1c3WVRaTjVGYUdPWlRKWFRwREdHT0lNNHRhOStjR0d6c08xb1RvcDN1VnVKZGt3OTZFQnVQa20zM2RhQ3N4VDlMN0pGRS9yZTZDdEJ0azBpbERyYzNKSjNOdk1tTExVVjBXUGIiLCJtYWMiOiJlZmM4NjM0YTEyOTZkMTVhMGI3NWFmYTE2MjQ3NzdkNzkxMDcwZjVmMDU1MmFjZWNhZTYzNmY5OWZkMzA2Y2FmIiwidGFnIjoiIn0%3D; expires=Tue, 24-Jan-2023 13:34:29 GMT; Max-Age=7200; path=/
Cookie sent via https, but not marked as secure
Bhttps://samraksha.ceikerala.gov.in/ 117.193.73.153
200
kselb_session=eyJpdiI6IkFjN3RPTG0xQzF1VnBqUmxmTzhBWXc9PSIsInZhbHVlIjoiR3RzT1orSTNYc2V4ajdSdlhiZkF4c3ZVc3l1WGpxMllYWU1WY1lTQkpUalFHZEs5UHpTQ05meXRKa3ZGUWNYMlF1YlJYT3FqWVR2UzJjMHdEa21TcnB5cVAwanV0QzhEclBBNStSODcxQU52c3ZFOUsrcmV2VWhvWXlCSW5ob1kiLCJtYWMiOiI2MzhjZTUxNDZmOTUwMWFmNGQ1YTQ3NmFiOGQ3MDRhNGVlYjEwMmVmNTNhZTU4YzljMzIxMjMxYzJiMTZkNjVkIiwidGFnIjoiIn0%3D; path=/; httponly
Cookie sent via https, but not marked as secure
Bhttp://samraksha.ceikerala.gov.in/ 117.193.73.153
200
XSRF-TOKEN=eyJpdiI6IitTZ0RjZVBvRDlkWEZUVDh3REhtdkE9PSIsInZhbHVlIjoiZmpMLy9TMGU2RUJzTVV5YkJObVN4b3lBUmhyZHNyYjExTkVhK1dMMTIyaFNXSThzYXZLcW9tTmR2UHNwMXdTc2pLV21paHVJZi9GYWU2UnQrbXhoZnJkOTFYT1Z3WWllbFVienh6OWxLM1ljWU1XR0s3UWlsQXF2TEZ1L1E2SjYiLCJtYWMiOiI5MDVhYTY0NjNlNjUwNGY1ZWY3YzM4MTkwMDU3ZGQ0ZDY3NjZhZTQ0Y2ZiNjI2NWZhMGQ1N2IzYzk0YjMxYzFiIiwidGFnIjoiIn0%3D; expires=Tue, 24-Jan-2023 13:34:27 GMT; Max-Age=7200; path=/
Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
Bhttp://samraksha.ceikerala.gov.in/ 117.193.73.153
200
kselb_session=eyJpdiI6Iis0a1E5dmJpMEtHeklKUG10Q21HMFE9PSIsInZhbHVlIjoiZUV2THdObFBDOHZ3cFRVeE1Hb1YxV2FmemNmbElGMHVaMTJQNGZIVm5WLyttRDNjZzM5U2lLb2J3dWt2L1ZWbW9oNWg3d0lqS2xWWjRqQ3ZUWTB5SDhlQU9jSkRkbHhwVTJjWWJRSytHM1owZTNoRnljZFM5SzJ2R2U3azAwbWQiLCJtYWMiOiJmOTNiNjA1YjFhMWYyNDkyZmUzNjA2NjZhZTcxYjllZTg3YWUwOWEwNmE0YTJlMGNmMGZkMmQyZDY1YWMwNjViIiwidGFnIjoiIn0%3D; path=/; httponly
Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
Bhttps://samraksha.ceikerala.gov.in/ 117.193.73.153
200
XSRF-TOKEN=eyJpdiI6ImpWWENNYmx0Z25seXM2L3pueXBNY2c9PSIsInZhbHVlIjoiUGtqekMwMmEzM09YK05XZCs0Z3NEUmhrSjlYN1c3WVRaTjVGYUdPWlRKWFRwREdHT0lNNHRhOStjR0d6c08xb1RvcDN1VnVKZGt3OTZFQnVQa20zM2RhQ3N4VDlMN0pGRS9yZTZDdEJ0azBpbERyYzNKSjNOdk1tTExVVjBXUGIiLCJtYWMiOiJlZmM4NjM0YTEyOTZkMTVhMGI3NWFmYTE2MjQ3NzdkNzkxMDcwZjVmMDU1MmFjZWNhZTYzNmY5OWZkMzA2Y2FmIiwidGFnIjoiIn0%3D; expires=Tue, 24-Jan-2023 13:34:29 GMT; Max-Age=7200; path=/
Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
Bhttps://samraksha.ceikerala.gov.in/ 117.193.73.153
200
kselb_session=eyJpdiI6IkFjN3RPTG0xQzF1VnBqUmxmTzhBWXc9PSIsInZhbHVlIjoiR3RzT1orSTNYc2V4ajdSdlhiZkF4c3ZVc3l1WGpxMllYWU1WY1lTQkpUalFHZEs5UHpTQ05meXRKa3ZGUWNYMlF1YlJYT3FqWVR2UzJjMHdEa21TcnB5cVAwanV0QzhEclBBNStSODcxQU52c3ZFOUsrcmV2VWhvWXlCSW5ob1kiLCJtYWMiOiI2MzhjZTUxNDZmOTUwMWFmNGQ1YTQ3NmFiOGQ3MDRhNGVlYjEwMmVmNTNhZTU4YzljMzIxMjMxYzJiMTZkNjVkIiwidGFnIjoiIn0%3D; path=/; httponly
Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
HFatal error: http result with http-status 200, no encryption. Add a redirect http ⇒ https, so every connection is secure. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop.
Mhttp://www.samraksha.ceikerala.gov.in/ 117.193.73.153
400

Misconfiguration - main pages should never send http status 400 - 499
Mhttps://www.samraksha.ceikerala.gov.in/ 117.193.73.153
400

Misconfiguration - main pages should never send http status 400 - 499
Nhttps://samraksha.ceikerala.gov.in/ 117.193.73.153
200

Error - Certificate isn't trusted, RemoteCertificateChainErrors
Nhttps://www.samraksha.ceikerala.gov.in/ 117.193.73.153
400

Error - Certificate isn't trusted, RemoteCertificateChainErrors
Nhttps://117.193.73.153/ 117.193.73.153
301
https://samraksha.ceikerala.gov.in/
Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain samraksha.ceikerala.gov.in, 1 ip addresses, 1 different http results.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain www.samraksha.ceikerala.gov.in, 1 ip addresses, 1 different http results.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.samraksha.ceikerala.gov.in

2. Header-Checks (alpha, started 2022-10-23, may be buggy / incomplete)

Asamraksha.ceikerala.gov.in 117.193.73.153
Content-Security-Policy
Ok: Header without syntax errors found: connect-src 'self';object-src 'self',frame-src 'self',child-src 'self';
F

Bad: Missing default-src directive. A default-src directive is used if one of the specialized fetch directives (child-src, connect-src, font-src, frame-src, img-src, manifest-src, media-src, object-src, prefetch-src, script-src, style-src, worker-src) isn't defined. Missing default-src, all sources are allowed, that's bad. A default-src with 'none' or 'self' blocks that.
E

Bad: No form-action directive found. Use one to limit the form - action - destinations. form-action is a navigation-directive, so default-src isn't used.
E

Bad: No frame-ancestors directive found. Use one to limit the pages allowed to use this page in frame / iframe / object / embed / applet. frame-ancestors is a navigation-directive, so default-src isn't used.
E

Bad: No base-uri directive found. Use one to limit the URLs which can be used in a document's <base> element. Because it's a document directive, default-src isn't used, so an own directive is required.
A

Good: object-src only with 'none' or 'self' found, no scheme, no other urls. That blocks object / embed / applet - elements.
F

Critical: No script-src and no default-src as fallback defined. So scripts are unlimited. That's fatal.
A
Referrer-Policy
Ok: Header without syntax errors found: no-referrer-when-downgrade
A
Permissions-Policy
Ok: Header without syntax errors found: autoplay=(self), camera=(), encrypted-media=(self), fullscreen=(), geolocation=(self), gyroscope=(self), magnetometer=(), microphone=(), midi=(), payment=(), sync-xhr=(self), usb=()
A
X-Frame-Options
Ok: Header without syntax errors found: SAMEORIGIN
B

Info: Header is deprecated. May not longer work in modern browsers. SAMEORIGIN. Better solution: Use a Content-Security-Policy Header with a frame-ancestors directive. DENY - use 'none', SAMEORIGIN - use 'self'. If you want to allow some domains to frame your page, add these urls.
A
Expect-CT
Ok: Header without syntax errors found: enforce, max-age=30
B

Info: Header is deprecated. May not longer work in modern browsers. enforce, max-age=30
A
X-Xss-Protection
Ok: Header without syntax errors found: 1; mode=block
B

Info: Header is deprecated. May not longer work in modern browsers. 1; mode=block
Fsamraksha.ceikerala.gov.in 117.193.73.153
X-Content-Type-Options
Critical: Missing Header:
Fwww.samraksha.ceikerala.gov.in 117.193.73.153
Content-Security-Policy
Critical: Missing Header:
Fwww.samraksha.ceikerala.gov.in 117.193.73.153
X-Content-Type-Options
Critical: Missing Header:
Fwww.samraksha.ceikerala.gov.in 117.193.73.153
Referrer-Policy
Critical: Missing Header:
Fwww.samraksha.ceikerala.gov.in 117.193.73.153
Permissions-Policy
Critical: Missing Header:

3. DNS- and NameServer - Checks

AInfo:: 9 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 9 Queries complete, 5 with IPv6, 4 with IPv4.
Warning: Only some DNS Queries done via ipv6. IPv6 is the future, so the name servers of your name servers should have ipv6 addresses.
Ok (4 - 8):: An average of 4.5 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 2 different Name Servers found: ldmaster.kerala.gov.in, ldslave.kerala.gov.in, 2 Name Servers included in Delegation: ldmaster.kerala.gov.in, ldslave.kerala.gov.in, 2 Name Servers included in 1 Zone definitions: ldmaster.kerala.gov.in, ldslave.kerala.gov.in, 1 Name Servers listed in SOA.Primary: ldmaster.kerala.gov.in.
AGood: Only one SOA.Primary Name Server found.: ldmaster.kerala.gov.in.
AGood: SOA.Primary Name Server included in the delegation set.: ldmaster.kerala.gov.in.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ldmaster.kerala.gov.in, ldslave.kerala.gov.in
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 2 different Name Servers found
Warning: No Name Server IPv6 address found. IPv6 is the future, so your name servers should be visible via IPv6.: 2 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 2 Name Servers, 1 Top Level Domain: gov.in
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: kerala.gov.in
Warning: All Name Servers from the same Country / IP location.: 2 Name Servers, 1 Countries: IN
AInfo: Ipv4-Subnet-list: 2 Name Servers, 1 different subnets (first Byte): 103., 1 different subnets (first two Bytes): 103.251., 1 different subnets (first three Bytes): 103.251.43.
XFatal: All Name Server IPv4 addresses from the same subnet. Check https://www.iana.org/help/nameserver-requirements to learn some basics about name server configurations. If you manage these name servers, fix it. If it's your provider, change your provider.:
AGood: Nameserver supports TCP connections: 1 good Nameserver
AGood: Nameserver supports Echo Capitalization: 1 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 1 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 1 good Nameserver
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

http://samraksha.ceikerala.gov.in/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 117.193.73.153
200

Warning: Not existing ACME-file, but Server sends 200, not 404 or redirect. May be a problem creating a Letsencrypt certificate. Checking /.well-known/acme-challenge/random-filename - a http status 404 - Not Found - is expected. If your server sends content and a http status 200, the validation file (87 bytes, token, dot and the hash of the public part of the account key) may be invisible, so Letsencrypt can't validate your domain. If it is an application that sends this content, perhaps create an exception, so /.well-known/acme-challenge sends raw files. Or create a redirect to another domain and / or port 443, but your Letsencrypt client must support such a solution. Certbot: Use webroot as authenticator - https://certbot.eff.org/docs/using.html Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
http://www.samraksha.ceikerala.gov.in/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 117.193.73.153
200

Warning: Not existing ACME-file, but Server sends 200, not 404 or redirect. May be a problem creating a Letsencrypt certificate. Checking /.well-known/acme-challenge/random-filename - a http status 404 - Not Found - is expected. If your server sends content and a http status 200, the validation file (87 bytes, token, dot and the hash of the public part of the account key) may be invisible, so Letsencrypt can't validate your domain. If it is an application that sends this content, perhaps create an exception, so /.well-known/acme-challenge sends raw files. Or create a redirect to another domain and / or port 443, but your Letsencrypt client must support such a solution. Certbot: Use webroot as authenticator - https://certbot.eff.org/docs/using.html Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Every https result with status 200 supports GZip.
https://samraksha.ceikerala.gov.in/ 117.193.73.153
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://samraksha.ceikerala.gov.in/ 117.193.73.153
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://samraksha.ceikerala.gov.in/ 117.193.73.153
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
AGood: All CSS / JavaScript files are sent with GZip. That reduces the content of the files. 2 external CSS / JavaScript files found
Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 0 external CSS / JavaScript files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 2 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 2 complete.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
http://samraksha.ceikerala.gov.in/ 117.193.73.153
200

Warning: HSTS header sent via http has no effect
ADuration: 393867 milliseconds, 393.867 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
samraksha.ceikerala.gov.in
117.193.73.153
443
Certificate/chain invalid
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
samraksha.ceikerala.gov.in
117.193.73.153
443
Certificate/chain invalid
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=samraksha.ceikerala.gov.in

2CN=R3, O=Let's Encrypt, C=US


www.samraksha.ceikerala.gov.in
117.193.73.153
443
Certificate/chain invalid
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok

www.samraksha.ceikerala.gov.in
117.193.73.153
443
Certificate/chain invalid
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=samraksha.ceikerala.gov.in

2CN=R3, O=Let's Encrypt, C=US


117.193.73.153
117.193.73.153
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok

117.193.73.153
117.193.73.153
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=samraksha.ceikerala.gov.in

2CN=R3, O=Let's Encrypt, C=US


9. Certificates

1.
1.
CN=samraksha.ceikerala.gov.in
22.10.2022
20.01.2023
11 days expired
samraksha.ceikerala.gov.in, www.samraksha.ceikerala.gov.in - 2 entries
1.
1.
CN=samraksha.ceikerala.gov.in
22.10.2022

20.01.2023
11 days expired
samraksha.ceikerala.gov.in, www.samraksha.ceikerala.gov.in - 2 entries

KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:04F127ACBAB46F7666C7B04CCD4DCA72ABF3
Thumbprint:6D4508260D487B774BEA203869309CB33056683B
SHA256 / Certificate:IST5cmA54Ol/733ulfNlGozl6c9+Vv0/GyuRm5d7zew=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):3c093ac118e9b8a0829f2d1a73bd6fffa0176151f8a4feb3e82bf91f51f7aeaa
SHA256 hex / Subject Public Key Information (SPKI):3c093ac118e9b8a0829f2d1a73bd6fffa0176151f8a4feb3e82bf91f51f7aeaa (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)

NotTimeValid: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.
RevocationStatusUnknown: The revocation function was unable to check revocation for the certificate.
OfflineRevocation: The revocation function was unable to check revocation because the revocation server was offline.

2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 958 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 958 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4507 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4507 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0
2
2

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
4724082184
leaf cert
CN=R3, O=Let's Encrypt, C=US
2023-01-24 04:46:32
2023-04-24 04:46:31
samraksha.ceikerala.gov.in - 1 entries


4712108309
leaf cert
CN=R3, O=Let's Encrypt, C=US
2023-01-21 10:28:52
2023-04-21 10:28:51
www.samraksha.ceikerala.gov.in - 1 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0 /0 new
2
3

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
8483778341
precert
CN=R3, O=Let's Encrypt, C=US
2023-01-24 03:46:32
2023-04-24 02:46:31
samraksha.ceikerala.gov.in
1 entries


8478098011
precert
CN=R3, O=Let's Encrypt, C=US
2023-01-21 09:28:52
2023-04-21 08:28:51
www.samraksha.ceikerala.gov.in
1 entries


7813245575
leaf cert
CN=R3, O=Let's Encrypt, C=US
2022-10-22 03:43:18
2023-01-20 04:43:17
samraksha.ceikerala.gov.in, www.samraksha.ceikerala.gov.in
2 entries



11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ldmaster.kerala.gov.in, ldslave.kerala.gov.in

QNr.DomainTypeNS used
1
in
NS
m.root-servers.net (2001:dc3::35)

Answer: ns1.registry.in, ns2.registry.in, ns3.registry.in, ns4.registry.in, ns5.registry.in, ns6.registry.in
2
ldmaster.kerala.gov.in
NS
ns1.registry.in (2001:dcd:1::12)

Answer: ns1.cdit.org, ns2.cdit.org, ns3.cdit.org
3
ldslave.kerala.gov.in
NS
ns1.registry.in (2001:dcd:1::12)

Answer: ns1.cdit.org, ns2.cdit.org, ns3.cdit.org
4
org
NS
j.root-servers.net (2001:503:c27::2:30)

Answer: a0.org.afilias-nst.info, a2.org.afilias-nst.info, b0.org.afilias-nst.org, b2.org.afilias-nst.org, c0.org.afilias-nst.info, d0.org.afilias-nst.org
5
ns1.cdit.org: 13.234.87.197
NS
a0.org.afilias-nst.info (2001:500:e::1)

Answer: ns2.cdit.org
103.251.43.100

Answer: ns3.cdit.org
13.234.87.197

Answer: ns4.cdit.org
103.251.43.100

Answer: ns5.cdit.org
13.234.87.197

Answer: ns6.cdit.org
103.251.43.100
6
ldmaster.kerala.gov.in: 103.251.43.64
A
ns1.cdit.org (13.234.87.197)
7
ldmaster.kerala.gov.in: No AAAA record found
AAAA
ns1.cdit.org (13.234.87.197)
8
ldslave.kerala.gov.in: 103.251.43.44
A
ns1.cdit.org (13.234.87.197)
9
ldslave.kerala.gov.in: No AAAA record found
AAAA
ns1.cdit.org (13.234.87.197)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.samraksha.ceikerala.gov.in
0

no CAA entry found
1
0
samraksha.ceikerala.gov.in
0

no CAA entry found
1
0
ceikerala.gov.in
0

no CAA entry found
1
0
gov.in
0

no CAA entry found
1
0
in
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
ceikerala.gov.in
v=spf1 a mx ptr ~all
ok
1
0
samraksha.ceikerala.gov.in

ok
1
0
www.samraksha.ceikerala.gov.in

ok
1
0
_acme-challenge.samraksha.ceikerala.gov.in

Name Error - The domain name does not exist
1
0
_acme-challenge.www.samraksha.ceikerala.gov.in

Name Error - The domain name does not exist
1
0
_acme-challenge.samraksha.ceikerala.gov.in.ceikerala.gov.in

Name Error - The domain name does not exist
1
0
_acme-challenge.samraksha.ceikerala.gov.in.samraksha.ceikerala.gov.in

Name Error - The domain name does not exist
1
0
_acme-challenge.www.samraksha.ceikerala.gov.in.samraksha.ceikerala.gov.in

Name Error - The domain name does not exist
1
0
_acme-challenge.www.samraksha.ceikerala.gov.in.www.samraksha.ceikerala.gov.in

Name Error - The domain name does not exist
1
0


15. DomainService - Entries (SSHFP Check is new - 2022-09-24, may be incomplete, alpha, some results are required)

No DomainServiceEntries entries found



16. Cipher Suites

DomainIPPortCipher (OpenSsl / IANA)
samraksha.ceikerala.gov.in
117.193.73.153
443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
3 Ciphers, 105.72 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD
www.samraksha.ceikerala.gov.in
117.193.73.153
443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
3 Ciphers, 105.80 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD


17. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.



Permalink: https://check-your-website.server-daten.de/?i=dc3f3fdd-a3d2-42a0-be54-bb5870d17d8c


Last Result: https://check-your-website.server-daten.de/?q=samraksha.ceikerala.gov.in - 2023-01-24 12:32:37


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=samraksha.ceikerala.gov.in" target="_blank">Check this Site: samraksha.ceikerala.gov.in</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro