SSL Report:
tracing.clasquin.com
(91.151.78.153)
Assessed on: Wed, 10 Sep 2025 15:44:18 UTC
| Clear cache
Summary
0
20
40
60
80
100
Certificate
Protocol Support
Key Exchange
Cipher Strength
Visit our documentation page
for more information, configuration guides, and books. Known issues are documented
here.
This server supports weak Diffie-Hellman (DH) key exchange parameters. Grade capped to B.
MORE INFO »
This server's certificate chain is incomplete. Grade capped to B.
This server does not support TLS 1.3. MORE INFO »
HTTP Strict Transport Security (HSTS) with long duration deployed on this server.
MORE INFO »
Certificate #1: RSA 2048 bits (SHA384withRSA)

Server Key and Certificate #1
|
|
Subject |
*.clasquin.com
Fingerprint SHA256: 43371562983baca200f1e2762104f171bade2bacb77b1c2b87c52a74a673ffc8 Pin SHA256: yoDO/LRo2VkNM6b33x/z1lBjYPc+d8CmoVOU7jiBJWs= |
Common names | *.clasquin.com |
Alternative names | *.clasquin.com clasquin.com |
Serial Number | 56cb04473177483fb46964f7af9d63a5 |
Valid from | Tue, 22 Oct 2024 00:00:00 UTC |
Valid until | Sun, 16 Nov 2025 23:59:59 UTC (expires in 2 months and 6 days) |
Key | RSA 2048 bits (e 65537) |
Weak key (Debian) | No |
Issuer | Corporation Service Company RSA OV SSL CA
AIA: http://crt.sectigo.com/CorporationServiceCompanyRSAOVSSLCA.crt |
Signature algorithm | SHA384withRSA |
Extended Validation | No |
Certificate Transparency | Yes (certificate) |
OCSP Must Staple | No |
Revocation information |
CRL, OCSP CRL: http://crl.sectigo.com/CorporationServiceCompanyRSAOVSSLCA.crl OCSP: http://ocsp.sectigo.com |
Revocation status | Good (not revoked) |
DNS CAA | No (more info) |
Trusted | Yes
Mozilla Apple Android Java Windows |

Additional Certificates (if supplied)
|
|
Certificates provided | 1 (1819 bytes) |
Chain issues | Incomplete |

![]() ![]() |
Configuration

Protocols | |
TLS 1.3 | No |
TLS 1.2 | Yes |
TLS 1.1 | No |
TLS 1.0 | No |
SSL 3 | No |
SSL 2 | No |

Cipher Suites | ||
![]() ![]() # TLS 1.2 (suites in server-preferred order)
|
||
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030 )
ECDH secp521r1 (eq. 15360 bits RSA) FS
|
256 | |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f )
ECDH secp521r1 (eq. 15360 bits RSA) FS
|
128 | |
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x9f )
DH 1024 bits FS
WEAK
|
256 | |
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x9e )
DH 1024 bits FS
WEAK
|
128 |

Handshake Simulation | |||
Android 4.4.2 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS |
Android 5.0.0 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp521r1 FS |
Android 6.0 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
Android 7.0 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Android 8.0 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Android 8.1 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Android 9.0 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
BingPreview Jan 2015 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS |
Chrome 49 / XP SP3 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
Chrome 69 / Win 7 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Chrome 70 / Win 10 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Chrome 80 / Win 10 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Firefox 31.3.0 ESR / Win 7 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
Firefox 47 / Win 7 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
Firefox 49 / XP SP3 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Firefox 62 / Win 7 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Firefox 73 / Win 10 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Googlebot Feb 2018 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
IE 11 / Win 7 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS |
IE 11 / Win 8.1 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS |
IE 11 / Win Phone 8.1 R |
Server sent fatal alert: handshake_failure |
||
IE 11 / Win Phone 8.1 Update R | RSA 2048 (SHA384) | TLS 1.2 | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS |
IE 11 / Win 10 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Edge 15 / Win 10 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Edge 16 / Win 10 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Edge 18 / Win 10 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Edge 13 / Win Phone 10 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Java 8u161 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Java 11.0.3 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Java 12.0.1 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
OpenSSL 1.0.1l R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS |
OpenSSL 1.0.2s R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
OpenSSL 1.1.0k R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
OpenSSL 1.1.1c R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 6 / iOS 6.0.1 |
Server sent fatal alert: handshake_failure |
||
Safari 7 / iOS 7.1 R |
Server sent fatal alert: handshake_failure |
||
Safari 7 / OS X 10.9 R |
Server sent fatal alert: handshake_failure |
||
Safari 8 / iOS 8.4 R |
Server sent fatal alert: handshake_failure |
||
Safari 8 / OS X 10.10 R |
Server sent fatal alert: handshake_failure |
||
Safari 9 / iOS 9 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 9 / OS X 10.11 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 10 / iOS 10 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 10 / OS X 10.12 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 12.1.2 / MacOS 10.14.6 Beta R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 12.1.1 / iOS 12.3.1 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Apple ATS 9 / iOS 9 R | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Yahoo Slurp Jan 2015 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp384r1 FS |
YandexBot Jan 2015 | RSA 2048 (SHA384) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS |
![]() ![]() # Not simulated clients (Protocol mismatch)
|
|||
Android 2.3.7 No SNI 2 |
Protocol mismatch (not simulated) |
||
Android 4.0.4 |
Protocol mismatch (not simulated) |
||
Android 4.1.1 |
Protocol mismatch (not simulated) |
||
Android 4.2.2 |
Protocol mismatch (not simulated) |
||
Android 4.3 |
Protocol mismatch (not simulated) |
||
Baidu Jan 2015 |
Protocol mismatch (not simulated) |
||
IE 6 / XP No FS 1 No SNI 2 |
Protocol mismatch (not simulated) |
||
IE 7 / Vista |
Protocol mismatch (not simulated) |
||
IE 8 / XP No FS 1 No SNI 2 |
Protocol mismatch (not simulated) |
||
IE 8-10 / Win 7 R |
Protocol mismatch (not simulated) |
||
IE 10 / Win Phone 8.0 |
Protocol mismatch (not simulated) |
||
Java 6u45 No SNI 2 |
Protocol mismatch (not simulated) |
||
Java 7u25 |
Protocol mismatch (not simulated) |
||
OpenSSL 0.9.8y |
Protocol mismatch (not simulated) |
||
Safari 5.1.9 / OS X 10.6.8 |
Protocol mismatch (not simulated) |
||
Safari 6.0.4 / OS X 10.8.4 R |
Protocol mismatch (not simulated) |
||
(1) Clients that do not support Forward Secrecy (FS) are excluded when determining support for it. | |||
(2) No support for virtual SSL hosting (SNI). Connects to the default site if the server uses SNI. | |||
(3) Only first connection attempt simulated. Browsers sometimes retry with a lower protocol version. | |||
(R) Denotes a reference browser or client, with which we expect better effective security. | |||
(All) We use defaults, but some platforms do not use their best protocols and features (e.g., Java 6 & 7, older IE). | |||
(All) Certificate trust is not checked in handshake simulation, we only perform TLS handshake. |

Protocol Details | |
Secure Renegotiation | Supported |
Secure Client-Initiated Renegotiation | Yes |
Insecure Client-Initiated Renegotiation | No |
BEAST attack | Mitigated server-side (more info) |
POODLE (SSLv3) | No, SSL 3 not supported (more info) |
POODLE (TLS) | No (more info) |
Zombie POODLE | No (more info) |
GOLDENDOODLE | No (more info) |
OpenSSL 0-Length | No (more info) |
Sleeping POODLE | No (more info) |
Downgrade attack prevention | Unknown (requires support for at least two protocols, excl. SSL2) |
SSL/TLS compression | No |
RC4 | No |
Heartbeat (extension) | No |
Heartbleed (vulnerability) | No (more info) |
Ticketbleed (vulnerability) | No (more info) |
OpenSSL CCS vuln. (CVE-2014-0224) | No (more info) |
OpenSSL Padding Oracle vuln. (CVE-2016-2107) |
No (more info) |
ROBOT (vulnerability) | No (more info) |
Forward Secrecy | Weak key exchange WEAK |
ALPN | No |
NPN | No |
Session resumption (caching) | No (IDs assigned but not accepted) |
Session resumption (tickets) | No |
OCSP stapling | No |
Strict Transport Security (HSTS) | Yes
max-age=31536000; includeSubDomains |
HSTS Preloading | Not in: Chrome Edge Firefox IE |
Public Key Pinning (HPKP) | No (more info) |
Public Key Pinning Report-Only | No |
Public Key Pinning (Static) | No (more info) |
Long handshake intolerance | No |
TLS extension intolerance | No |
TLS version intolerance | No |
Incorrect SNI alerts | No |
Uses common DH primes | Yes Replace with custom DH parameters if possible (more info) |
DH public server param (Ys) reuse | No |
ECDH public server param reuse | No |
Supported Named Groups | secp256r1, secp384r1, secp521r1 (Server has no preference) |
SSL 2 handshake compatibility | No |

![]() ![]() |
1 https://tracing.clasquin.com/
(HTTP/1.1 302 Found)
| 1 | |
Connection | close | |
Location | /wabam |
2 https://tracing.clasquin.com/wabam
(HTTP/1.1 302 Found)
| 2 | |
Connection | close | |
Cache-Control | no-store, no-cache | |
X-Content-Type-Options | nosniff | |
X-XSS-Protection | 1; mode=block | |
X-Frame-Options | DENY | |
Pragma | no-cache | |
Strict-Transport-Security | max-age=31536000; includeSubDomains | |
X-Robots-Tag | none, noimageindex | |
Location | /wabam/ |
3 https://tracing.clasquin.com/wabam/
(HTTP/1.1 307 Temporary Redirect)
| 3 | |
Connection | close | |
Cache-Control | no-store, no-cache | |
X-Content-Type-Options | nosniff | |
Content-Security-Policy | default-src 'self' blob:; base-uri 'none'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; connect-src 'self' ws: wss:; style-src 'unsafe-inline' 'self'; img-src data: blob: 'self'; font-src 'self' data:; form-action 'self' https:; frame-ancestors 'self'; navigate-to 'self'; object-src 'none'; block-all-mixed-content; | |
X-XSS-Protection | 1; mode=block | |
X-Frame-Options | DENY | |
Pragma | no-cache | |
Strict-Transport-Security | max-age=31536000; includeSubDomains | |
X-Robots-Tag | none, noimageindex | |
Set-Cookie | JSESSIONID=node0sq3wyxkk0dau8u690wub5qq76713.node0; Path=/wabam; Secure; HttpOnly;SameSite=Strict | |
Expires | Thu, 01 Jan 1970 00:00:00 GMT | |
Location | /wabam/CLASQUIN?domain=clasquin.com | |
Content-Length | 0 |
4 https://tracing.clasquin.com/wabam/CLASQUIN?domain=clasquin.com
(HTTP/1.1 307 Temporary Redirect)
| 4 | |
Connection | close | |
Cache-Control | no-store, no-cache | |
X-Content-Type-Options | nosniff | |
Content-Security-Policy | default-src 'self' blob:; base-uri 'none'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; connect-src 'self' ws: wss:; style-src 'unsafe-inline' 'self'; img-src data: blob: 'self'; font-src 'self' data:; form-action 'self' https:; frame-ancestors 'self'; navigate-to 'self'; object-src 'none'; block-all-mixed-content; | |
X-XSS-Protection | 1; mode=block | |
X-Frame-Options | DENY | |
Pragma | no-cache | |
Strict-Transport-Security | max-age=31536000; includeSubDomains | |
X-Robots-Tag | none, noimageindex | |
Set-Cookie | _i=SYM01:07e8297eefed8a0485f8461b0435b4ce52ea86343227cd91ff42096f811c3c4322d6a1b9af107bc2b9c2956272c5a64ca7ae9c7c4e99b43063b386b7c53b0f51; Path=/wabam; HttpOnly;Secure | |
Expires | Thu, 01 Jan 1970 00:00:00 GMT | |
Location | https://login.microsoftonline.com/284f9bfd-0cdc-4e26-90b5-b148475f3d69/saml2?SAMLRequest=jVbbkqrIEn33Kzrcj4bNReRi7O4TCKggqIgg8HKigOKiQCEFon792Hbvnu6Zc2b2YyarVq1aWZnUTwyKnK4mYtuk5RaeWoibJxFjWDcZKiVU4raAtQXrcxZCe6u%2F9NOmqfCEIJoahFmZPIc5wKc2K59DVEwYZkR0IAAFIemiZdrqigB35v9EqABZ%2BfIV23%2BS73tlJXjb6E%2FaHCX370UW1gijuEFlnpXwDU%2FQPBMLQRwNyTAKhwyk2aFABuNhQDE8w43jUcQKxOM4%2FacZqkP4ONNLPwY5hv0nVX7p%2FxfQFOQhx4QjmqHjgBXGVBSNggBQFMuzAneHYdxCtcQNKJuXPk3S4yEpDClyR40nzGhCC880x%2Fr9JwfW%2BCGcfib7T5ciL%2FHk3cuXfluXEwRwhiclKCCeNOHEEg19codOqho1KER5%2F%2FXnAz55bFh%2FZfhnAvCrOP1XXIXDh9s%2Fia9crz8jPLGy5G5tW8MP5gi%2Fe3y3uOu65270jOqEoEmSJEiBuGMinCU%2F%2Bp9rYaSWMXqEEihRmYUgz26PYhmwSVH0JOYJqrMmLf4PMUVQ5BvxEF7CYUgx5Y8%2B8V3abxORzC%2BFwwLV8EeNwRCngB6zH5RbGMMaliF8srfqS%2F%2FHvxf6sWxXgxLHqC7w9%2FBfJX0zDZZnmKMKRkP862Qfsn6f8H%2BbRfxdo5wl97b5Tee%2BybwbRn3oeidxQN7C15aI6tpjkF4E9lo1r9n1stj5nB0dvJeHgK%2FgR%2BLT7PfwL7fls7rvK4LLgQstbRuesLZql%2FPNgOkSanZZxwJnpi6vcE2o04NIOFuxQBy3RbDgTYcppdjS0oObtijkziLLXl1yi9hqQGjTdCqPjdHVIm1b5LdGEOWJs2Huo8ZM8lMFGbooEGNyGZ0YrOw5zECrmD1P7Rd8NqV1J5gZ1aXDhA%2Bwz8tJMhdrlvJGgwsgOxZuSCcTyym1Lez5rqH2GzecQ5SfbrswERadEJHhuunychbHhybbLTu8rYxutDKybTAYR83eX22bem2NXSeRb%2FJGG21djOZ8uor2wOecA5zypzwyu4WkZ0tz2l4CjRkLVd6G8xPgipHhcvToPJ4K64yWiI4iXQEO5jphtX5ixG6UbOZd9%2FLyaf0Xr9%2FsX8LrZyncMSnIoAGfgfQ2OeJ7Kzfw1VBVqZIlSfSuidipUzFRlXK8UVpZXE2T4yk9ZnOhI6eiiWeiLNrGVu0U0ZMd05RlMb%2BFc6OJ6Fnm7cmut0jDlXEwu7WsMIYcUsbNuO0fueR77vDPREmiZD1DJOeSdZpbajCSTeWuwBZFRp3KnfgGWIrortaUaiUKWH9NzgaxZENluZumYsWvi8Ngr2myt92MwTLsddGaDmlOYysl5wf8UYdNk6k3WapOgne9rorBLdJkNCjoo6Iyldd0fF66Hi1Hd7Ni4zhb3ufFwdnfbnrRW7d1zinu2uckf4nqbn1LOWJ2UL3L0p8pCrfaHRX%2BGEr5aOfqQeBkA661N7vrVvfOGzpTEjeyrg11jXIF9Wy02ivk7ULQzm2XKlLEXm%2FwOtN4HmeLssD11fZnWxYmAHjoyrIZXyQEXmsJrY%2Fqa3dkLmfrNFPydGfZPXPpmQdlfXR3jus7DXl0Cz6T1%2FL9x6l0t3DhM1lzsHipCB1xux9E650yzorjUdzKJjcLdjnPzpgLBosNT%2FTExJiKotLJpqctka%2Bm53Almoo%2BNcV7v9wLIuamIhoBGXDNMWZPAnkqzp0U6Nq6PR8PvBHubLQVcmzdDj3PkOBo313CRTZ2lQCBEJszHkre2ZXkRG%2Ba0jks%2FYtq2UfCHiOwz87pmrF8zzE7a6RQizofUAzTnbkk75lq5Mi%2BrV0cST9Eq9m6oYzKMzdZmUeXuWPQ0zkf4NpaUjrB5tTxrM9ncbbI5ZyUTlrDtqhZXjCzO9ALvqfVc31kgGAgl4oXFEgziPSMtQ1RTG1jQEszZdlKJ6gMmIUwdrhRkOYBgK5%2FzRScWXHQOenhXBCVHIN9D4Bz7Ja3sQTU%2FTHwbRkpU3050FaVDzyR3BuE7Zc3tKiQP4%2BiasdIcBFzjVjtw1MpnFkeUBoUmfe%2B%2Fmuvfibfu5n42uff5sDrx0vg%2B4Pu9Q8%3D | |
Content-Length | 0 |

Miscellaneous | |
Test date | Wed, 10 Sep 2025 15:43:16 UTC |
Test duration | 62.372 seconds |
HTTP status code | 307 |
HTTP forwarding | https://login.microsoftonline.com |
HTTP server signature | - |
Server hostname | undef-78-153.as12826.cloud |
SSL Report v2.4.1