SSL Report:
my.swmed.edu
(199.242.239.143)
Assessed on: Tue, 26 Aug 2025 21:13:15 UTC
| Clear cache
Summary
0
20
40
60
80
100
Certificate
Protocol Support
Key Exchange
Cipher Strength
Visit our documentation page
for more information, configuration guides, and books. Known issues are documented
here.
This server accepts RC4 cipher, but only with older protocols. Grade capped to B.
MORE INFO »
This server supports TLS 1.0 and TLS 1.1.
Grade capped to B. MORE INFO »
This server does not support TLS 1.3. MORE INFO »
Certificate #1: RSA 4096 bits (SHA384withRSA)

Server Key and Certificate #1
|
|
Subject |
my.swmed.edu
Fingerprint SHA256: fbde2b8e65cd459d9a58ca27fa9a400faf1f9db47da023485a60290fcbc97c67 Pin SHA256: VF4SjuUNkSmmQbwjvxYAEB0QL6YCWOLS+C1NtyJQXc4= |
Common names | my.swmed.edu |
Alternative names | my.swmed.edu admissionapplication.swmed.edu admissionapplication.swmed.org admissionapplication2.swmed.edu admissionapplication2.swmed.org archibus.swmed.edu archibus.swmed.org archibus2.swmed.edu archibus2.swmed.org bi.swmed.edu bi.swmed.org bi2.swmed.edu bi2.swmed.org budget.swmed.edu budget.swmed.org budget2.swmed.edu budget2.swmed.org ecrt.swmed.edu ecrt.swmed.org ecrt2.swmed.edu ecrt2.swmed.org edw.swmed.edu edw.swmed.org edw2.swmed.edu edw2.swmed.org egrant.swmed.edu egrant.swmed.org egrant2.swmed.edu egrant2.swmed.org jobapplication.swmed.edu jobapplication.swmed.org jobapplication2.swmed.edu jobapplication2.swmed.org mobileinventory.swmed.edu mobileinventory.swmed.org mobileinventory2.swmed.edu mobileinventory2.swmed.org my.swmed.org my2.swmed.edu my2.swmed.org myaccount.swmed.edu myaccount.swmed.org myaccount2.swmed.edu myaccount2.swmed.org mybenefit.swmed.edu mybenefit.swmed.org mybenefit2.swmed.edu mybenefit2.swmed.org mycampus.swmed.edu mycampus.swmed.org mycampus2.swmed.edu mycampus2.swmed.org mydocument.swmed.edu mydocument.swmed.org mydocument2.swmed.edu mydocument2.swmed.org myfcm.swmed.edu myfcm.swmed.org myfcm2.swmed.edu myfcm2.swmed.org mygrant.swmed.edu mygrant.swmed.org mygrant2.swmed.edu mygrant2.swmed.org myhcm.swmed.edu myhcm.swmed.org myhcm2.swmed.edu myhcm2.swmed.org mylearning.swmed.edu mylearning.swmed.org mylearning2.swmed.edu mylearning2.swmed.org mypayroll.swmed.edu mypayroll.swmed.org mypayroll2.swmed.edu mypayroll2.swmed.org myportal.swmed.edu myportal.swmed.org myportal2.swmed.edu myportal2.swmed.org mytest.swmed.edu mytest.swmed.org mytest2.swmed.edu mytest2.swmed.org mytime.swmed.edu mytime.swmed.org mytime2.swmed.edu mytime2.swmed.org myworklist.swmed.edu myworklist.swmed.org myworklist2.swmed.edu myworklist2.swmed.org planning.swmed.edu planning.swmed.org planning2.swmed.edu planning2.swmed.org recommender.swmed.edu recommender.swmed.org recommender2.swmed.edu recommender2.swmed.org recruitment.swmed.edu recruitment.swmed.org recruitment2.swmed.edu recruitment2.swmed.org resume.swmed.edu resume.swmed.org resume2.swmed.edu resume2.swmed.org studentdirectory.swmed.edu studentdirectory.swmed.org studentdirectory2.swmed.edu studentdirectory2.swmed.org studentsystem.swmed.edu studentsystem.swmed.org studentsystem2.swmed.edu studentsystem2.swmed.org vendor.swmed.edu vendor.swmed.org vendor2.swmed.edu vendor2.swmed.org |
Serial Number | 00bece8008feb2ae552596cbd87014089d |
Valid from | Tue, 04 Feb 2025 00:00:00 UTC |
Valid until | Wed, 04 Feb 2026 23:59:59 UTC (expires in 5 months and 9 days) |
Key | RSA 4096 bits (e 65537) |
Weak key (Debian) | No |
Issuer | InCommon RSA Server CA 2
AIA: http://crt.sectigo.com/InCommonRSAServerCA2.crt |
Signature algorithm | SHA384withRSA |
Extended Validation | No |
Certificate Transparency | Yes (certificate) |
OCSP Must Staple | No |
Revocation information |
CRL, OCSP CRL: http://crl.sectigo.com/InCommonRSAServerCA2.crl OCSP: http://ocsp.sectigo.com |
Revocation status | Good (not revoked)
CRL ERROR: IOException occurred |
DNS CAA | No (more info) |
Trusted | Yes
Mozilla Apple Android Java Windows |


![]() ![]() |
Configuration

Protocols | |
TLS 1.3 | No |
TLS 1.2 | Yes |
TLS 1.1 | Yes |
TLS 1.0 | Yes |
SSL 3 | No |
SSL 2 | No |

Cipher Suites | ||
![]() ![]() # TLS 1.2 (suites in server-preferred order)
|
||
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030 )
ECDH x25519 (eq. 3072 bits RSA) FS
|
256 | |
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x9f )
DH 2048 bits FS
|
256 | |
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca8 )
ECDH x25519 (eq. 3072 bits RSA) FS
|
256P | |
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xccaa )
DH 2048 bits FS
|
256P | |
TLS_DHE_RSA_WITH_AES_256_CCM_8 (0xc0a3 )
DH 2048 bits FS
|
256 | |
TLS_DHE_RSA_WITH_AES_256_CCM (0xc09f )
DH 2048 bits FS
|
256 | |
TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (0xc061 )
ECDH x25519 (eq. 3072 bits RSA) FS
|
256 | |
TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (0xc053 )
DH 2048 bits FS
|
256 | |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028 )
ECDH x25519 (eq. 3072 bits RSA) FS
WEAK
|
256 | |
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x6b )
DH 2048 bits FS
WEAK
|
256 | |
TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (0xc077 )
ECDH x25519 (eq. 3072 bits RSA) FS
WEAK
|
256 | |
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (0xc4 )
DH 2048 bits FS
WEAK
|
256 | |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014 )
ECDH x25519 (eq. 3072 bits RSA) FS
WEAK
|
256 | |
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x39 )
DH 2048 bits FS
WEAK
|
256 | |
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (0x88 )
DH 2048 bits FS
WEAK
|
256 | |
TLS_RSA_WITH_AES_256_GCM_SHA384 (0x9d )
WEAK
|
256 | |
TLS_RSA_WITH_AES_256_CCM_8 (0xc0a1 )
WEAK
|
256 | |
TLS_RSA_WITH_AES_256_CCM (0xc09d )
WEAK
|
256 | |
TLS_RSA_WITH_ARIA_256_GCM_SHA384 (0xc051 )
WEAK
|
256 | |
TLS_RSA_WITH_AES_256_CBC_SHA256 (0x3d )
WEAK
|
256 | |
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (0xc0 )
WEAK
|
256 | |
TLS_RSA_WITH_AES_256_CBC_SHA (0x35 )
WEAK
|
256 | |
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (0x84 )
WEAK
|
256 | |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f )
ECDH x25519 (eq. 3072 bits RSA) FS
|
128 | |
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x9e )
DH 2048 bits FS
|
128 | |
TLS_DHE_RSA_WITH_AES_128_CCM_8 (0xc0a2 )
DH 2048 bits FS
|
128 | |
TLS_DHE_RSA_WITH_AES_128_CCM (0xc09e )
DH 2048 bits FS
|
128 | |
TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (0xc060 )
ECDH x25519 (eq. 3072 bits RSA) FS
|
128 | |
TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (0xc052 )
DH 2048 bits FS
|
128 | |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027 )
ECDH x25519 (eq. 3072 bits RSA) FS
WEAK
|
128 | |
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x67 )
DH 2048 bits FS
WEAK
|
128 | |
TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0xc076 )
ECDH x25519 (eq. 3072 bits RSA) FS
WEAK
|
128 | |
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0xbe )
DH 2048 bits FS
WEAK
|
128 | |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013 )
ECDH x25519 (eq. 3072 bits RSA) FS
WEAK
|
128 | |
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33 )
DH 2048 bits FS
WEAK
|
128 | |
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (0x45 )
DH 2048 bits FS
WEAK
|
128 | |
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x9c )
WEAK
|
128 | |
TLS_RSA_WITH_AES_128_CCM_8 (0xc0a0 )
WEAK
|
128 | |
TLS_RSA_WITH_AES_128_CCM (0xc09c )
WEAK
|
128 | |
TLS_RSA_WITH_ARIA_128_GCM_SHA256 (0xc050 )
WEAK
|
128 | |
TLS_RSA_WITH_AES_128_CBC_SHA256 (0x3c )
WEAK
|
128 | |
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0xba )
WEAK
|
128 | |
TLS_RSA_WITH_AES_128_CBC_SHA (0x2f )
WEAK
|
128 | |
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (0x41 )
WEAK
|
128 | |
TLS_ECDHE_RSA_WITH_RC4_128_SHA (0xc011 )
ECDH x25519 (eq. 3072 bits RSA) FS
INSECURE
|
128 | |
TLS_RSA_WITH_RC4_128_SHA (0x5 )
INSECURE
|
128 | |
![]() ![]() # TLS 1.1 (suites in server-preferred order)
|
||
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014 )
ECDH x25519 (eq. 3072 bits RSA) FS
WEAK
|
256 | |
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x39 )
DH 2048 bits FS
WEAK
|
256 | |
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (0x88 )
DH 2048 bits FS
WEAK
|
256 | |
TLS_RSA_WITH_AES_256_CBC_SHA (0x35 )
WEAK
|
256 | |
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (0x84 )
WEAK
|
256 | |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013 )
ECDH x25519 (eq. 3072 bits RSA) FS
WEAK
|
128 | |
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33 )
DH 2048 bits FS
WEAK
|
128 | |
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (0x45 )
DH 2048 bits FS
WEAK
|
128 | |
TLS_RSA_WITH_AES_128_CBC_SHA (0x2f )
WEAK
|
128 | |
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (0x41 )
WEAK
|
128 | |
TLS_ECDHE_RSA_WITH_RC4_128_SHA (0xc011 )
ECDH x25519 (eq. 3072 bits RSA) FS
INSECURE
|
128 | |
TLS_RSA_WITH_RC4_128_SHA (0x5 )
INSECURE
|
128 | |
![]() ![]() # TLS 1.0 (suites in server-preferred order)
|
||
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014 )
ECDH x25519 (eq. 3072 bits RSA) FS
WEAK
|
256 | |
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x39 )
DH 2048 bits FS
WEAK
|
256 | |
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (0x88 )
DH 2048 bits FS
WEAK
|
256 | |
TLS_RSA_WITH_AES_256_CBC_SHA (0x35 )
WEAK
|
256 | |
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (0x84 )
WEAK
|
256 | |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013 )
ECDH x25519 (eq. 3072 bits RSA) FS
WEAK
|
128 | |
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33 )
DH 2048 bits FS
WEAK
|
128 | |
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (0x45 )
DH 2048 bits FS
WEAK
|
128 | |
TLS_RSA_WITH_AES_128_CBC_SHA (0x2f )
WEAK
|
128 | |
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (0x41 )
WEAK
|
128 | |
TLS_ECDHE_RSA_WITH_RC4_128_SHA (0xc011 )
ECDH x25519 (eq. 3072 bits RSA) FS
INSECURE
|
128 | |
TLS_RSA_WITH_RC4_128_SHA (0x5 )
INSECURE
|
128 | |
(P) This server prefers ChaCha20 suites with clients that don't have AES-NI (e.g., Android devices) |

Handshake Simulation | |||
Android 2.3.7 No SNI 2 | RSA 4096 (SHA384) | TLS 1.0 | TLS_DHE_RSA_WITH_AES_128_CBC_SHA DH 2048 FS |
Android 4.0.4 | RSA 4096 (SHA384) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
Android 4.1.1 | RSA 4096 (SHA384) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
Android 4.2.2 | RSA 4096 (SHA384) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
Android 4.3 | RSA 4096 (SHA384) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
Android 4.4.2 | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Android 5.0.0 | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
Android 6.0 | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
Android 7.0 | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS |
Android 8.0 | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS |
Android 8.1 | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS |
Android 9.0 | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS |
Baidu Jan 2015 | RSA 4096 (SHA384) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
BingPreview Jan 2015 | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Chrome 49 / XP SP3 | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ECDH secp256r1 FS |
Chrome 69 / Win 7 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
Chrome 70 / Win 10 | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
Chrome 80 / Win 10 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
Firefox 31.3.0 ESR / Win 7 | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
Firefox 47 / Win 7 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ECDH secp256r1 FS |
Firefox 49 / XP SP3 | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Firefox 62 / Win 7 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
Firefox 73 / Win 10 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
Googlebot Feb 2018 | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
IE 7 / Vista | RSA 4096 (SHA384) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
IE 8 / XP No FS 1 No SNI 2 | RSA 4096 (SHA384) | TLS 1.0 | TLS_RSA_WITH_RC4_128_SHA RC4 |
IE 8-10 / Win 7 R | RSA 4096 (SHA384) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
IE 11 / Win 7 R | RSA 4096 (SHA384) | TLS 1.2 | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 2048 FS |
IE 11 / Win 8.1 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 2048 FS |
IE 10 / Win Phone 8.0 | RSA 4096 (SHA384) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
IE 11 / Win Phone 8.1 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
IE 11 / Win Phone 8.1 Update R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 2048 FS |
IE 11 / Win 10 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Edge 15 / Win 10 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
Edge 16 / Win 10 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
Edge 18 / Win 10 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
Edge 13 / Win Phone 10 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Java 6u45 No SNI 2 |
Client does not support DH parameters > 1024 bits RSA 4096 (SHA384) | TLS 1.0 | TLS_DHE_RSA_WITH_AES_128_CBC_SHA | DH 2048 |
||
Java 7u25 | RSA 4096 (SHA384) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
Java 8u161 | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Java 11.0.3 | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Java 12.0.1 | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
OpenSSL 0.9.8y | RSA 4096 (SHA384) | TLS 1.0 | TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 2048 FS |
OpenSSL 1.0.1l R | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
OpenSSL 1.0.2s R | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
OpenSSL 1.1.0k R | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
OpenSSL 1.1.1c R | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
Safari 5.1.9 / OS X 10.6.8 | RSA 4096 (SHA384) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
Safari 6 / iOS 6.0.1 | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
Safari 6.0.4 / OS X 10.8.4 R | RSA 4096 (SHA384) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp256r1 FS |
Safari 7 / iOS 7.1 R | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
Safari 7 / OS X 10.9 R | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
Safari 8 / iOS 8.4 R | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
Safari 8 / OS X 10.10 R | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
Safari 9 / iOS 9 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 9 / OS X 10.11 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 10 / iOS 10 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 10 / OS X 10.12 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 12.1.2 / MacOS 10.14.6 Beta R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS |
Safari 12.1.1 / iOS 12.3.1 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS |
Apple ATS 9 / iOS 9 R | RSA 4096 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Yahoo Slurp Jan 2015 | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
YandexBot Jan 2015 | RSA 4096 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
![]() ![]() # Not simulated clients (Protocol mismatch)
|
|||
IE 6 / XP No FS 1 No SNI 2 |
Protocol mismatch (not simulated) |
||
(1) Clients that do not support Forward Secrecy (FS) are excluded when determining support for it. | |||
(2) No support for virtual SSL hosting (SNI). Connects to the default site if the server uses SNI. | |||
(3) Only first connection attempt simulated. Browsers sometimes retry with a lower protocol version. | |||
(R) Denotes a reference browser or client, with which we expect better effective security. | |||
(All) We use defaults, but some platforms do not use their best protocols and features (e.g., Java 6 & 7, older IE). | |||
(All) Certificate trust is not checked in handshake simulation, we only perform TLS handshake. |

Protocol Details | |
Secure Renegotiation | Supported |
Secure Client-Initiated Renegotiation | No |
Insecure Client-Initiated Renegotiation | No |
BEAST attack |
Not mitigated server-side (more info)
TLS 1.0: 0xc014
|
POODLE (SSLv3) | No, SSL 3 not supported (more info) |
POODLE (TLS) | No (more info) |
Zombie POODLE | No (more info)
TLS 1.2 : 0xc014
|
GOLDENDOODLE | No (more info)
TLS 1.2 : 0xc014
|
OpenSSL 0-Length | No (more info)
TLS 1.2 : 0xc014
|
Sleeping POODLE | No (more info)
TLS 1.2 : 0xc014
|
Downgrade attack prevention | Yes, TLS_FALLBACK_SCSV supported (more info) |
SSL/TLS compression | No |
RC4 | Yes INSECURE (more info) |
Heartbeat (extension) | No |
Heartbleed (vulnerability) | No (more info) |
Ticketbleed (vulnerability) | No (more info) |
OpenSSL CCS vuln. (CVE-2014-0224) | No (more info) |
OpenSSL Padding Oracle vuln. (CVE-2016-2107) |
No (more info) |
ROBOT (vulnerability) | No (more info) |
Forward Secrecy | Yes (with most browsers) ROBUST (more info) |
ALPN | Yes http/1.1 |
NPN | No |
Session resumption (caching) | No (IDs empty) |
Session resumption (tickets) | No |
OCSP stapling | No |
Strict Transport Security (HSTS) | No |
HSTS Preloading | Not in: Chrome Edge Firefox IE |
Public Key Pinning (HPKP) | No (more info) |
Public Key Pinning Report-Only | No |
Public Key Pinning (Static) | No (more info) |
Long handshake intolerance | No |
TLS extension intolerance | No |
TLS version intolerance | No |
Incorrect SNI alerts | No |
Uses common DH primes | No |
DH public server param (Ys) reuse | No |
ECDH public server param reuse | No |
Supported Named Groups | x25519, secp256r1, x448, secp521r1, secp384r1 (server preferred order) |
SSL 2 handshake compatibility | Yes |

![]() ![]() |
1 https://my.swmed.edu/
(HTTP/1.1 200 OK)
| 1 | |
Connection | close | |
Date | Tue, 26 Aug 2025 21:11:15 GMT | |
Accept-Ranges | bytes | |
Content-Length | 1565 | |
Content-Type | text/html;charset=utf-8 | |
Last-Modified | Wed, 08 May 2024 16:38:50 GMT | |
X-ORACLE-DMS-ECID | dac8dda7-d4dd-47a4-be4f-8eecd7b3fb9a-0026261e | |
X-ORACLE-DMS-RID | 0 | |
Origin-Agent-Cluster | ?0 | |
X-UA-Compatible | IE=9; IE=8; IE=7; IE=EDGE |

Miscellaneous | |
Test date | Tue, 26 Aug 2025 21:11:07 UTC |
Test duration | 128.499 seconds |
HTTP status code | 200 |
HTTP server signature | - |
Server hostname | sderp1.swmed.edu |
SSL Report v2.4.1