SSL Report:
www.ecovidrio.es
(104.45.58.167)
Assessed on: Wed, 10 Sep 2025 04:28:43 UTC
| Clear cache
Summary
0
20
40
60
80
100
Certificate
Protocol Support
Key Exchange
Cipher Strength
Visit our documentation page
for more information, configuration guides, and books. Known issues are documented
here.
This server does not support Forward Secrecy with the reference browsers.
Grade capped to B.
MORE INFO »
This server supports TLS 1.3. MORE INFO »
Certificate #1: RSA 2048 bits (SHA256withRSA)

Server Key and Certificate #1
|
|
Subject |
ecovidrio.es
Fingerprint SHA256: 9817d660a8baf446bd535084ad1827d4bbb1314b3612e499f91eb7ba9f7cd890 Pin SHA256: zN0SWzGi9z10W6cTdoXCX1s1RHYerze8XTUzc1ECpz4= |
Common names | ecovidrio.es |
Alternative names | ecovidrio.es www.ecovidrio.es |
Serial Number | 0f862305251e5625fc5d0e73782478cd |
Valid from | Thu, 07 Nov 2024 00:00:00 UTC |
Valid until | Mon, 08 Dec 2025 23:59:59 UTC (expires in 2 months and 28 days) |
Key | RSA 2048 bits (e 65537) |
Weak key (Debian) | No |
Issuer | Don Dominio / MrDomain RSA DV CA
AIA: http://crt.usertrust.com/DonDominioMrDomainRSADVCA.crt |
Signature algorithm | SHA256withRSA |
Extended Validation | No |
Certificate Transparency | Yes (certificate) |
OCSP Must Staple | No |
Revocation information |
CRL, OCSP CRL: http://crl.usertrust.com/DonDominioMrDomainRSADVCA.crl OCSP: http://ocsp.usertrust.com |
Revocation status | Good (not revoked)
CRL ERROR: IOException occurred |
DNS CAA | No (more info) |
Trusted | Yes
Mozilla Apple Android Java Windows |


![]() ![]() |
Configuration

Protocols | |
TLS 1.3 | Yes |
TLS 1.2 | Yes |
TLS 1.1 | No |
TLS 1.0 | No |
SSL 3 | No |
SSL 2 | No |

Cipher Suites | ||
![]() ![]() # TLS 1.3 (server has no preference)
|
||
TLS_AES_128_GCM_SHA256 (0x1301 )
ECDH x25519 (eq. 3072 bits RSA) FS
|
128 | |
TLS_AES_256_GCM_SHA384 (0x1302 )
ECDH x25519 (eq. 3072 bits RSA) FS
|
256 | |
TLS_CHACHA20_POLY1305_SHA256 (0x1303 )
ECDH x25519 (eq. 3072 bits RSA) FS
|
256 | |
![]() ![]() # TLS 1.2 (server has no preference)
|
||
TLS_RSA_WITH_AES_128_CBC_SHA (0x2f )
WEAK
|
128 | |
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33 )
DH 2048 bits FS
WEAK
|
128 | |
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (0x41 )
WEAK
|
128 | |
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (0x45 )
DH 2048 bits FS
WEAK
|
128 | |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013 )
ECDH secp521r1 (eq. 15360 bits RSA) FS
WEAK
|
128 | |
TLS_RSA_WITH_AES_128_CBC_SHA256 (0x3c )
WEAK
|
128 | |
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x67 )
DH 2048 bits FS
WEAK
|
128 | |
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x9c )
WEAK
|
128 | |
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x9e )
DH 2048 bits FS
|
128 | |
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0xba )
WEAK
|
128 | |
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0xbe )
DH 2048 bits FS
WEAK
|
128 | |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027 )
ECDH secp521r1 (eq. 15360 bits RSA) FS
WEAK
|
128 | |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f )
ECDH secp521r1 (eq. 15360 bits RSA) FS
|
128 | |
TLS_RSA_WITH_ARIA_128_GCM_SHA256 (0xc050 )
WEAK
|
128 | |
TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (0xc052 )
DH 2048 bits FS
|
128 | |
TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (0xc060 )
ECDH secp521r1 (eq. 15360 bits RSA) FS
|
128 | |
TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0xc076 )
ECDH secp521r1 (eq. 15360 bits RSA) FS
WEAK
|
128 | |
TLS_RSA_WITH_AES_128_CCM (0xc09c )
WEAK
|
128 | |
TLS_DHE_RSA_WITH_AES_128_CCM (0xc09e )
DH 2048 bits FS
|
128 | |
TLS_RSA_WITH_AES_128_CCM_8 (0xc0a0 )
WEAK
|
128 | |
TLS_DHE_RSA_WITH_AES_128_CCM_8 (0xc0a2 )
DH 2048 bits FS
|
128 | |
TLS_RSA_WITH_AES_256_CBC_SHA (0x35 )
WEAK
|
256 | |
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x39 )
DH 2048 bits FS
WEAK
|
256 | |
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (0x84 )
WEAK
|
256 | |
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (0x88 )
DH 2048 bits FS
WEAK
|
256 | |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014 )
ECDH secp521r1 (eq. 15360 bits RSA) FS
WEAK
|
256 | |
TLS_RSA_WITH_AES_256_CBC_SHA256 (0x3d )
WEAK
|
256 | |
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x6b )
DH 2048 bits FS
WEAK
|
256 | |
TLS_RSA_WITH_AES_256_GCM_SHA384 (0x9d )
WEAK
|
256 | |
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x9f )
DH 2048 bits FS
|
256 | |
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (0xc0 )
WEAK
|
256 | |
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (0xc4 )
DH 2048 bits FS
WEAK
|
256 | |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028 )
ECDH secp521r1 (eq. 15360 bits RSA) FS
WEAK
|
256 | |
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030 )
ECDH secp521r1 (eq. 15360 bits RSA) FS
|
256 | |
TLS_RSA_WITH_ARIA_256_GCM_SHA384 (0xc051 )
WEAK
|
256 | |
TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (0xc053 )
DH 2048 bits FS
|
256 | |
TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (0xc061 )
ECDH secp521r1 (eq. 15360 bits RSA) FS
|
256 | |
TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (0xc077 )
ECDH secp521r1 (eq. 15360 bits RSA) FS
WEAK
|
256 | |
TLS_RSA_WITH_AES_256_CCM (0xc09d )
WEAK
|
256 | |
TLS_DHE_RSA_WITH_AES_256_CCM (0xc09f )
DH 2048 bits FS
|
256 | |
TLS_RSA_WITH_AES_256_CCM_8 (0xc0a1 )
WEAK
|
256 | |
TLS_DHE_RSA_WITH_AES_256_CCM_8 (0xc0a3 )
DH 2048 bits FS
|
256 | |
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca8 )
ECDH secp521r1 (eq. 15360 bits RSA) FS
|
256 | |
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xccaa )
DH 2048 bits FS
|
256 |

Handshake Simulation | |||
Android 4.4.2 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS |
Android 5.0.0 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDH secp521r1 FS |
Android 6.0 | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
Android 7.0 | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS |
Android 8.0 | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ECDH x25519 FS |
Android 8.1 | - | TLS 1.3 | TLS_CHACHA20_POLY1305_SHA256 ECDH x25519 FS |
Android 9.0 | - | TLS 1.3 | TLS_CHACHA20_POLY1305_SHA256 ECDH x25519 FS |
BingPreview Jan 2015 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS |
Chrome 49 / XP SP3 | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
Chrome 69 / Win 7 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS |
Chrome 70 / Win 10 | - | TLS 1.3 | TLS_AES_128_GCM_SHA256 ECDH x25519 FS |
Chrome 80 / Win 10 R | - | TLS 1.3 | TLS_AES_128_GCM_SHA256 ECDH x25519 FS |
Firefox 31.3.0 ESR / Win 7 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
Firefox 47 / Win 7 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
Firefox 49 / XP SP3 | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
Firefox 62 / Win 7 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS |
Firefox 73 / Win 10 R | - | TLS 1.3 | TLS_AES_128_GCM_SHA256 ECDH x25519 FS |
Googlebot Feb 2018 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH x25519 FS |
IE 11 / Win 7 R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
IE 11 / Win 8.1 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
IE 11 / Win Phone 8.1 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_RSA_WITH_AES_128_CBC_SHA256 No FS |
IE 11 / Win Phone 8.1 Update R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
IE 11 / Win 10 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Edge 15 / Win 10 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
Edge 16 / Win 10 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
Edge 18 / Win 10 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
Edge 13 / Win Phone 10 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Java 8u161 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
Java 11.0.3 | - | TLS 1.3 | TLS_AES_128_GCM_SHA256 ECDH secp256r1 FS |
Java 12.0.1 | - | TLS 1.3 | TLS_AES_128_GCM_SHA256 ECDH secp256r1 FS |
OpenSSL 1.0.1l R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS |
OpenSSL 1.0.2s R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
OpenSSL 1.1.0k R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH x25519 FS |
OpenSSL 1.1.1c R | - | TLS 1.3 | TLS_AES_256_GCM_SHA384 ECDH x25519 FS |
Safari 6 / iOS 6.0.1 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
Safari 7 / iOS 7.1 R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
Safari 7 / OS X 10.9 R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
Safari 8 / iOS 8.4 R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
Safari 8 / OS X 10.10 R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDH secp256r1 FS |
Safari 9 / iOS 9 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 9 / OS X 10.11 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 10 / iOS 10 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 10 / OS X 10.12 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Safari 12.1.2 / MacOS 10.14.6 Beta R | - | TLS 1.3 | TLS_CHACHA20_POLY1305_SHA256 ECDH x25519 FS |
Safari 12.1.1 / iOS 12.3.1 R | - | TLS 1.3 | TLS_CHACHA20_POLY1305_SHA256 ECDH x25519 FS |
Apple ATS 9 / iOS 9 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS |
Yahoo Slurp Jan 2015 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp384r1 FS |
YandexBot Jan 2015 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp521r1 FS |
![]() ![]() # Not simulated clients (Protocol mismatch)
|
|||
Android 2.3.7 No SNI 2 |
Protocol mismatch (not simulated) |
||
Android 4.0.4 |
Protocol mismatch (not simulated) |
||
Android 4.1.1 |
Protocol mismatch (not simulated) |
||
Android 4.2.2 |
Protocol mismatch (not simulated) |
||
Android 4.3 |
Protocol mismatch (not simulated) |
||
Baidu Jan 2015 |
Protocol mismatch (not simulated) |
||
IE 6 / XP No FS 1 No SNI 2 |
Protocol mismatch (not simulated) |
||
IE 7 / Vista |
Protocol mismatch (not simulated) |
||
IE 8 / XP No FS 1 No SNI 2 |
Protocol mismatch (not simulated) |
||
IE 8-10 / Win 7 R |
Protocol mismatch (not simulated) |
||
IE 10 / Win Phone 8.0 |
Protocol mismatch (not simulated) |
||
Java 6u45 No SNI 2 |
Protocol mismatch (not simulated) |
||
Java 7u25 |
Protocol mismatch (not simulated) |
||
OpenSSL 0.9.8y |
Protocol mismatch (not simulated) |
||
Safari 5.1.9 / OS X 10.6.8 |
Protocol mismatch (not simulated) |
||
Safari 6.0.4 / OS X 10.8.4 R |
Protocol mismatch (not simulated) |
||
(1) Clients that do not support Forward Secrecy (FS) are excluded when determining support for it. | |||
(2) No support for virtual SSL hosting (SNI). Connects to the default site if the server uses SNI. | |||
(3) Only first connection attempt simulated. Browsers sometimes retry with a lower protocol version. | |||
(R) Denotes a reference browser or client, with which we expect better effective security. | |||
(All) We use defaults, but some platforms do not use their best protocols and features (e.g., Java 6 & 7, older IE). | |||
(All) Certificate trust is not checked in handshake simulation, we only perform TLS handshake. |

Protocol Details | |
Secure Renegotiation | Supported |
Secure Client-Initiated Renegotiation | No |
Insecure Client-Initiated Renegotiation | No |
BEAST attack | Mitigated server-side (more info) |
POODLE (SSLv3) | No, SSL 3 not supported (more info) |
POODLE (TLS) | No (more info) |
Zombie POODLE | No (more info)
TLS 1.2 : 0x002f
|
GOLDENDOODLE | No (more info)
TLS 1.2 : 0x002f
|
OpenSSL 0-Length | No (more info)
TLS 1.2 : 0x002f
|
Sleeping POODLE | No (more info)
TLS 1.2 : 0x002f
|
Downgrade attack prevention | Yes, TLS_FALLBACK_SCSV supported (more info) |
SSL/TLS compression | No |
RC4 | No |
Heartbeat (extension) | No |
Heartbleed (vulnerability) | No (more info) |
Ticketbleed (vulnerability) | No (more info) |
OpenSSL CCS vuln. (CVE-2014-0224) | No (more info) |
OpenSSL Padding Oracle vuln. (CVE-2016-2107) |
No (more info) |
ROBOT (vulnerability) | No (more info) |
Forward Secrecy | With some browsers (more info) |
ALPN | Yes http/1.1 |
NPN | No |
Session resumption (caching) | Yes |
Session resumption (tickets) | Yes |
OCSP stapling | No |
Strict Transport Security (HSTS) | No |
HSTS Preloading | Not in: Chrome Edge Firefox IE |
Public Key Pinning (HPKP) | No (more info) |
Public Key Pinning Report-Only | No |
Public Key Pinning (Static) | No (more info) |
Long handshake intolerance | No |
TLS extension intolerance | No |
TLS version intolerance | No |
Incorrect SNI alerts | No |
Uses common DH primes | No |
DH public server param (Ys) reuse | No |
ECDH public server param reuse | No |
Supported Named Groups | secp256r1, secp384r1, secp521r1, x25519, x448 (Server has no preference) |
SSL 2 handshake compatibility | No |
0-RTT enabled | No |

![]() ![]() |
1 https://www.ecovidrio.es/
(HTTP/1.1 200 OK)
| 1 | |
Date | Wed, 10 Sep 2025 04:26:54 GMT | |
Server | Apache/2.4.52 (Ubuntu) | |
Cache-Control | must-revalidate, no-cache, private | |
X-Drupal-Dynamic-Cache | UNCACHEABLE | |
X-UA-Compatible | IE=edge | |
Content-language | es | |
X-Content-Type-Options | nosniff | |
X-Frame-Options | SAMEORIGIN | |
X-Drupal-Cache-Tags | block_content:1 block_content:2 block_content:3 block_content_view block_view config:block.block.accesoportalprivadoenheaderblock config:block.block.administracionespublicas config:block.block.administracionespublicaspreheader config:block.block.alternadordeidioma config:block.block.alternadordeidioma_2 config:block.block.contact config:block.block.contacto config:block.block.ecovidrio_breadcrumbs config:block.block.ecovidrio_content config:block.block.ecovidrio_footer config:block.block.ecovidrio_help config:block.block.ecovidrio_local_actions config:block.block.ecovidrio_local_tasks config:block.block.ecovidrio_main_menu config:block.block.ecovidrio_messages config:block.block.ecovidrio_page_title config:block.block.ecovidrio_powered config:block.block.ecovidrio_tools config:block.block.empresasadheridas config:block.block.empresasadheridaspreheader config:block.block.footerennosotros config:block.block.footerenthirdcolumn config:block.block.footeresnosotros config:block.block.footeresthirdcolumn config:block.block.footerredessociales config:block.block.formulariodebusquedacabecera config:block.block.formulariodebusquedacabeceraen config:block.block.juntadirectiva config:block.block.juntadirectivapreheader config:block.block.menuheaderen config:block.block.menuheaderes config:block.block.menupreheaderen config:block.block.menupreheaderenmobile config:block.block.menupreheaderes config:block.block.menupreheaderes_2 config:block.block.postfootermenuen config:block.block.postfootermenues config:block.block.views_block__admp_noticias_related_content_block_1 config:block.block.views_block__empresas_adheridas_related_content_block_1 config:block.block.views_block__movilizations_related_content_block_1 config:block.block.views_block__notas_de_prensa_related_content_block_1 config:block_list config:configurable_language_list config:easy_breadcrumb.settings config:filter.format.basic_html config:filter.format.full_html config:google_analytics.settings config:image.style.webp config:paragraphs.settings config:system.menu.footer-es---nosotros config:system.menu.footer-es---third-column config:system.menu.menu-header-es config:system.menu.menu-pre-header-es config:system.menu.post-footer-menu-es config:user.role.anonymous file:125 file:126 file:127 file:128 file:129 file:165 file:177 file:281 file:282 file:283 file:284 http_response node:11 node:118 node:119 node:12 node:120 node:131 node:134 node:135 node:136 node:14 node:144 node:145 node:146 node:17 node:18 node:19 node:192 node:193 node:194 node:195 node:22 node:238 node:240 node:2507 node:2588 node:279 node:3274 node:3284 node:3288 node:68 node:86 node:87 node_view paragraph:834 paragraph:835 paragraph:836 paragraph:837 paragraph:838 paragraph:839 paragraph:840 paragraph:843 paragraph:844 paragraph:845 paragraph:846 paragraph:847 paragraph:848 paragraph:849 paragraph:850 paragraph:851 paragraph:852 paragraph:853 paragraph:854 paragraph:855 paragraph:856 paragraph:857 paragraph:858 paragraph:859 paragraph:860 paragraph:861 paragraph:862 paragraph:863 paragraph:864 paragraph:865 paragraph:866 paragraph:867 paragraph:868 paragraph:869 paragraph:870 paragraph_view rendered user:0 user:1 user:3919 user:5558 user_view | |
X-Drupal-Cache-Contexts | cookies:big_pipe_nojs languages route session.exists theme timezone url.path url.query_args:_wrapper_format url.site user.node_grants:view user.permissions user.roles | |
X-Drupal-Cache-Max-Age | 0 (Uncacheable) | |
Expires | Sun, 19 Nov 1978 05:00:00 GMT | |
X-Generator | Drupal 9 (https://www.drupal.org) | |
Vary | Accept-Encoding | |
Connection | close | |
Transfer-Encoding | chunked | |
Content-Type | text/html; charset=UTF-8 |

Miscellaneous | |
Test date | Wed, 10 Sep 2025 04:26:44 UTC |
Test duration | 119.719 seconds |
HTTP status code | 200 |
HTTP server signature | Apache/2.4.52 (Ubuntu) |
Server hostname | - |
SSL Report v2.4.1