SSL Report: www.henri-de-borniol.fr (20.74.24.8)
Assessed on:  Sun, 08 Jun 2025 14:23:35 UTC | Clear cache

Due to a recently discovered bug in Apple's code, your browser is exposed to MITM attacks. Click here for more information.

Summary
Overall Rating
B
0
20
40
60
80
100
Certificate
 
Protocol Support
 
Key Exchange
 
Cipher Strength
 

Visit our documentation page for more information, configuration guides, and books. Known issues are documented here.
This server's certificate chain is incomplete. Grade capped to B.
This server does not support TLS 1.3.  MORE INFO »
This site works only in browsers with SNI support.
Certificate #1: RSA 2048 bits (SHA384withRSA)
Server Key and Certificate #1
Subject www.henri-de-borniol.fr
Fingerprint SHA256: 504db07637c40d7e7215dbd60c6f22fedf17ce817d50446b21130a948d27ea8f
Pin SHA256: uMExCNYcc44XpH0kX2QP5R1TIgu1nD86yITFzwHUm0I=
Common names www.henri-de-borniol.fr
Alternative names www.henri-de-borniol.fr www.pompes-funebres-alliance-funeraire.fr www.pompes-funebres-bordeaux.fr www.pompes-funebres-chevet-maurice.fr www.pompes-funebres-cretois.fr www.pompes-funebres-de-la-malmaison.fr www.pompes-funebres-in-memoris.fr www.pompes-funebres-libres-didier-lahaye.fr www.pompes-funebres-margely.fr www.pompes-funebres-memoria.fr www.pompes-funebres-moussou.fr www.pompes-funebres-stranart.fr www.robaut-prestations.com
Serial Number 45ca56786092318d7af498dad5bb75ef
Valid from Thu, 05 Sep 2024 00:00:00 UTC
Valid until Thu, 25 Sep 2025 23:59:59 UTC (expires in 3 months and 17 days)
Key RSA 2048 bits (e 65537)
Weak key (Debian) No
Issuer Gandi RSA Domain Validation Secure Server CA 3
AIA: http://crt.sectigo.com/GandiRSADomainValidationSecureServerCA3.crt
Signature algorithm SHA384withRSA
Extended Validation No
Certificate Transparency Yes (certificate)
OCSP Must Staple No
Revocation information OCSP
OCSP: http://ocsp.sectigo.com
Revocation status Good (not revoked)
DNS CAA No (more info)
Trusted Yes
Mozilla  Apple  Android  Java  Windows 


Additional Certificates (if supplied)
Certificates provided 1 (2092 bytes)
Chain issues Incomplete


Certification Paths
Path #1: Trusted
1 Sent by server www.henri-de-borniol.fr
Fingerprint SHA256: 504db07637c40d7e7215dbd60c6f22fedf17ce817d50446b21130a948d27ea8f
Pin SHA256: uMExCNYcc44XpH0kX2QP5R1TIgu1nD86yITFzwHUm0I=

RSA 2048 bits (e 65537) / SHA384withRSA
2 Extra download Gandi RSA Domain Validation Secure Server CA 3
Fingerprint SHA256: f0104ff17274608f1a18a1e1eabf8e68a51f500a87e2efa22ecb622763fef4cf
Pin SHA256: CFtSlX6OU4eENrKNiHtx6zY8UV7/SoMM63hXbHdXgjs=

RSA 3072 bits (e 65537) / SHA384withRSA
3 In trust store USERTrust RSA Certification Authority   Self-signed
Fingerprint SHA256: e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
Pin SHA256: x4QzPSC810K5/cMjb05Qm4k3Bw5zBn4lTdO/nEW/Td4=

RSA 4096 bits (e 65537) / SHA384withRSA
Path #2: Trusted
1 Sent by server www.henri-de-borniol.fr
Fingerprint SHA256: 504db07637c40d7e7215dbd60c6f22fedf17ce817d50446b21130a948d27ea8f
Pin SHA256: uMExCNYcc44XpH0kX2QP5R1TIgu1nD86yITFzwHUm0I=

RSA 2048 bits (e 65537) / SHA384withRSA
2 Extra download Gandi RSA Domain Validation Secure Server CA 3
Fingerprint SHA256: f0104ff17274608f1a18a1e1eabf8e68a51f500a87e2efa22ecb622763fef4cf
Pin SHA256: CFtSlX6OU4eENrKNiHtx6zY8UV7/SoMM63hXbHdXgjs=

RSA 3072 bits (e 65537) / SHA384withRSA
3 Extra download USERTrust RSA Certification Authority
Fingerprint SHA256: 68b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b
Pin SHA256: x4QzPSC810K5/cMjb05Qm4k3Bw5zBn4lTdO/nEW/Td4=

RSA 4096 bits (e 65537) / SHA384withRSA
4 In trust store AAA Certificate Services   Self-signed
Fingerprint SHA256: d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4
Pin SHA256: vRU+17BDT2iGsXvOi76E7TQMcTLXAqj0+jGPdW7L1vM=

RSA 2048 bits (e 65537) / SHA1withRSA
Weak or insecure signature, but no impact on root certificate
Path #1: Trusted
1 Sent by server www.henri-de-borniol.fr
Fingerprint SHA256: 504db07637c40d7e7215dbd60c6f22fedf17ce817d50446b21130a948d27ea8f
Pin SHA256: uMExCNYcc44XpH0kX2QP5R1TIgu1nD86yITFzwHUm0I=

RSA 2048 bits (e 65537) / SHA384withRSA
2 Extra download Gandi RSA Domain Validation Secure Server CA 3
Fingerprint SHA256: f0104ff17274608f1a18a1e1eabf8e68a51f500a87e2efa22ecb622763fef4cf
Pin SHA256: CFtSlX6OU4eENrKNiHtx6zY8UV7/SoMM63hXbHdXgjs=

RSA 3072 bits (e 65537) / SHA384withRSA
3 In trust store USERTrust RSA Certification Authority   Self-signed
Fingerprint SHA256: e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
Pin SHA256: x4QzPSC810K5/cMjb05Qm4k3Bw5zBn4lTdO/nEW/Td4=

RSA 4096 bits (e 65537) / SHA384withRSA
Path #2: Trusted
1 Sent by server www.henri-de-borniol.fr
Fingerprint SHA256: 504db07637c40d7e7215dbd60c6f22fedf17ce817d50446b21130a948d27ea8f
Pin SHA256: uMExCNYcc44XpH0kX2QP5R1TIgu1nD86yITFzwHUm0I=

RSA 2048 bits (e 65537) / SHA384withRSA
2 Extra download Gandi RSA Domain Validation Secure Server CA 3
Fingerprint SHA256: f0104ff17274608f1a18a1e1eabf8e68a51f500a87e2efa22ecb622763fef4cf
Pin SHA256: CFtSlX6OU4eENrKNiHtx6zY8UV7/SoMM63hXbHdXgjs=

RSA 3072 bits (e 65537) / SHA384withRSA
3 Extra download USERTrust RSA Certification Authority
Fingerprint SHA256: 68b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b
Pin SHA256: x4QzPSC810K5/cMjb05Qm4k3Bw5zBn4lTdO/nEW/Td4=

RSA 4096 bits (e 65537) / SHA384withRSA
4 In trust store AAA Certificate Services   Self-signed
Fingerprint SHA256: d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4
Pin SHA256: vRU+17BDT2iGsXvOi76E7TQMcTLXAqj0+jGPdW7L1vM=

RSA 2048 bits (e 65537) / SHA1withRSA
Weak or insecure signature, but no impact on root certificate
Path #1: Trusted
1 Sent by server www.henri-de-borniol.fr
Fingerprint SHA256: 504db07637c40d7e7215dbd60c6f22fedf17ce817d50446b21130a948d27ea8f
Pin SHA256: uMExCNYcc44XpH0kX2QP5R1TIgu1nD86yITFzwHUm0I=

RSA 2048 bits (e 65537) / SHA384withRSA
2 Extra download Gandi RSA Domain Validation Secure Server CA 3
Fingerprint SHA256: f0104ff17274608f1a18a1e1eabf8e68a51f500a87e2efa22ecb622763fef4cf
Pin SHA256: CFtSlX6OU4eENrKNiHtx6zY8UV7/SoMM63hXbHdXgjs=

RSA 3072 bits (e 65537) / SHA384withRSA
3 In trust store USERTrust RSA Certification Authority   Self-signed
Fingerprint SHA256: e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
Pin SHA256: x4QzPSC810K5/cMjb05Qm4k3Bw5zBn4lTdO/nEW/Td4=

RSA 4096 bits (e 65537) / SHA384withRSA
Path #2: Trusted
1 Sent by server www.henri-de-borniol.fr
Fingerprint SHA256: 504db07637c40d7e7215dbd60c6f22fedf17ce817d50446b21130a948d27ea8f
Pin SHA256: uMExCNYcc44XpH0kX2QP5R1TIgu1nD86yITFzwHUm0I=

RSA 2048 bits (e 65537) / SHA384withRSA
2 Extra download Gandi RSA Domain Validation Secure Server CA 3
Fingerprint SHA256: f0104ff17274608f1a18a1e1eabf8e68a51f500a87e2efa22ecb622763fef4cf
Pin SHA256: CFtSlX6OU4eENrKNiHtx6zY8UV7/SoMM63hXbHdXgjs=

RSA 3072 bits (e 65537) / SHA384withRSA
3 Extra download USERTrust RSA Certification Authority
Fingerprint SHA256: 68b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b
Pin SHA256: x4QzPSC810K5/cMjb05Qm4k3Bw5zBn4lTdO/nEW/Td4=

RSA 4096 bits (e 65537) / SHA384withRSA
4 In trust store AAA Certificate Services   Self-signed
Fingerprint SHA256: d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4
Pin SHA256: vRU+17BDT2iGsXvOi76E7TQMcTLXAqj0+jGPdW7L1vM=

RSA 2048 bits (e 65537) / SHA1withRSA
Weak or insecure signature, but no impact on root certificate
Path #1: Trusted
1 Sent by server www.henri-de-borniol.fr
Fingerprint SHA256: 504db07637c40d7e7215dbd60c6f22fedf17ce817d50446b21130a948d27ea8f
Pin SHA256: uMExCNYcc44XpH0kX2QP5R1TIgu1nD86yITFzwHUm0I=

RSA 2048 bits (e 65537) / SHA384withRSA
2 Extra download Gandi RSA Domain Validation Secure Server CA 3
Fingerprint SHA256: f0104ff17274608f1a18a1e1eabf8e68a51f500a87e2efa22ecb622763fef4cf
Pin SHA256: CFtSlX6OU4eENrKNiHtx6zY8UV7/SoMM63hXbHdXgjs=

RSA 3072 bits (e 65537) / SHA384withRSA
3 In trust store USERTrust RSA Certification Authority   Self-signed
Fingerprint SHA256: e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
Pin SHA256: x4QzPSC810K5/cMjb05Qm4k3Bw5zBn4lTdO/nEW/Td4=

RSA 4096 bits (e 65537) / SHA384withRSA
Path #2: Trusted
1 Sent by server www.henri-de-borniol.fr
Fingerprint SHA256: 504db07637c40d7e7215dbd60c6f22fedf17ce817d50446b21130a948d27ea8f
Pin SHA256: uMExCNYcc44XpH0kX2QP5R1TIgu1nD86yITFzwHUm0I=

RSA 2048 bits (e 65537) / SHA384withRSA
2 Extra download Gandi RSA Domain Validation Secure Server CA 3
Fingerprint SHA256: f0104ff17274608f1a18a1e1eabf8e68a51f500a87e2efa22ecb622763fef4cf
Pin SHA256: CFtSlX6OU4eENrKNiHtx6zY8UV7/SoMM63hXbHdXgjs=

RSA 3072 bits (e 65537) / SHA384withRSA
3 Extra download USERTrust RSA Certification Authority
Fingerprint SHA256: 68b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b
Pin SHA256: x4QzPSC810K5/cMjb05Qm4k3Bw5zBn4lTdO/nEW/Td4=

RSA 4096 bits (e 65537) / SHA384withRSA
4 In trust store AAA Certificate Services   Self-signed
Fingerprint SHA256: d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4
Pin SHA256: vRU+17BDT2iGsXvOi76E7TQMcTLXAqj0+jGPdW7L1vM=

RSA 2048 bits (e 65537) / SHA1withRSA
Weak or insecure signature, but no impact on root certificate
Path #1: Trusted
1 Sent by server www.henri-de-borniol.fr
Fingerprint SHA256: 504db07637c40d7e7215dbd60c6f22fedf17ce817d50446b21130a948d27ea8f
Pin SHA256: uMExCNYcc44XpH0kX2QP5R1TIgu1nD86yITFzwHUm0I=

RSA 2048 bits (e 65537) / SHA384withRSA
2 Extra download Gandi RSA Domain Validation Secure Server CA 3
Fingerprint SHA256: f0104ff17274608f1a18a1e1eabf8e68a51f500a87e2efa22ecb622763fef4cf
Pin SHA256: CFtSlX6OU4eENrKNiHtx6zY8UV7/SoMM63hXbHdXgjs=

RSA 3072 bits (e 65537) / SHA384withRSA
3 In trust store USERTrust RSA Certification Authority   Self-signed
Fingerprint SHA256: e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
Pin SHA256: x4QzPSC810K5/cMjb05Qm4k3Bw5zBn4lTdO/nEW/Td4=

RSA 4096 bits (e 65537) / SHA384withRSA
Path #2: Trusted
1 Sent by server www.henri-de-borniol.fr
Fingerprint SHA256: 504db07637c40d7e7215dbd60c6f22fedf17ce817d50446b21130a948d27ea8f
Pin SHA256: uMExCNYcc44XpH0kX2QP5R1TIgu1nD86yITFzwHUm0I=

RSA 2048 bits (e 65537) / SHA384withRSA
2 Extra download Gandi RSA Domain Validation Secure Server CA 3
Fingerprint SHA256: f0104ff17274608f1a18a1e1eabf8e68a51f500a87e2efa22ecb622763fef4cf
Pin SHA256: CFtSlX6OU4eENrKNiHtx6zY8UV7/SoMM63hXbHdXgjs=

RSA 3072 bits (e 65537) / SHA384withRSA
3 Extra download USERTrust RSA Certification Authority
Fingerprint SHA256: 68b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b
Pin SHA256: x4QzPSC810K5/cMjb05Qm4k3Bw5zBn4lTdO/nEW/Td4=

RSA 4096 bits (e 65537) / SHA384withRSA
4 In trust store AAA Certificate Services   Self-signed
Fingerprint SHA256: d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4
Pin SHA256: vRU+17BDT2iGsXvOi76E7TQMcTLXAqj0+jGPdW7L1vM=

RSA 2048 bits (e 65537) / SHA1withRSA
Weak or insecure signature, but no impact on root certificate

Click here to expand

Certificate #2: RSA 2048 bits (SHA256withRSA)
Server Key and Certificate #1
Subject *.ogf.fr
Fingerprint SHA256: 3ef69c39a1780b3924ef6d3781fb32f98430260e0f99cbbd3bf286e54de3c151
Pin SHA256: z/SlbYDau1ixme/4TLxIRIDPnTMNkd20Cr/NSBFgc6Y=
Common names *.ogf.fr
Alternative names *.ogf.fr ogf.fr   MISMATCH
Serial Number 0d90ec1da6ada81d8b8b0133f90b99d0
Valid from Thu, 24 Oct 2024 00:00:00 UTC
Valid until Thu, 23 Oct 2025 23:59:59 UTC (expires in 4 months and 15 days)
Key RSA 2048 bits (e 65537)
Weak key (Debian) No
Issuer GandiCert
AIA: http://cacerts.digicert.com/GandiCert.crt
Signature algorithm SHA256withRSA
Extended Validation No
Certificate Transparency Yes (certificate)
OCSP Must Staple No
Revocation information CRL, OCSP
CRL: http://crl3.digicert.com/GandiCert.crl
OCSP: http://ocsp.digicert.com
Revocation status Good (not revoked)
Trusted No   NOT TRUSTED
Mozilla  Apple  Android  Java  Windows 


Additional Certificates (if supplied)
Certificates provided 1 (1804 bytes)
Chain issues Incomplete


Certification Paths
Path #1: Not trusted (invalid certificate [Fingerprint SHA256: 3ef69c39a1780b3924ef6d3781fb32f98430260e0f99cbbd3bf286e54de3c151])
1 Sent by server *.ogf.fr
Fingerprint SHA256: 3ef69c39a1780b3924ef6d3781fb32f98430260e0f99cbbd3bf286e54de3c151
Pin SHA256: z/SlbYDau1ixme/4TLxIRIDPnTMNkd20Cr/NSBFgc6Y=

RSA 2048 bits (e 65537) / SHA256withRSA
2 Extra download GandiCert
Fingerprint SHA256: 3337d4e4b4ef6a94f04915d2e86b1f8f47a3c83667da2519d9b95ae7270affe1
Pin SHA256: 0dflgFofXiuLoZvgRpP8N9xrpDTgZ7c1xbmTjIxym7o=

RSA 4096 bits (e 65537) / SHA256withRSA
3 In trust store DigiCert Global Root G2   Self-signed
Fingerprint SHA256: cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
Pin SHA256: i7WTqTvh0OioIruIfFR4kMPnBqrS2rdiVPl/s2uC/CY=

RSA 2048 bits (e 65537) / SHA256withRSA
Path #1: Not trusted (invalid certificate [Fingerprint SHA256: 3ef69c39a1780b3924ef6d3781fb32f98430260e0f99cbbd3bf286e54de3c151])
1 Sent by server *.ogf.fr
Fingerprint SHA256: 3ef69c39a1780b3924ef6d3781fb32f98430260e0f99cbbd3bf286e54de3c151
Pin SHA256: z/SlbYDau1ixme/4TLxIRIDPnTMNkd20Cr/NSBFgc6Y=

RSA 2048 bits (e 65537) / SHA256withRSA
2 Extra download GandiCert
Fingerprint SHA256: 3337d4e4b4ef6a94f04915d2e86b1f8f47a3c83667da2519d9b95ae7270affe1
Pin SHA256: 0dflgFofXiuLoZvgRpP8N9xrpDTgZ7c1xbmTjIxym7o=

RSA 4096 bits (e 65537) / SHA256withRSA
3 In trust store DigiCert Global Root G2   Self-signed
Fingerprint SHA256: cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
Pin SHA256: i7WTqTvh0OioIruIfFR4kMPnBqrS2rdiVPl/s2uC/CY=

RSA 2048 bits (e 65537) / SHA256withRSA
Path #1: Not trusted (invalid certificate [Fingerprint SHA256: 3ef69c39a1780b3924ef6d3781fb32f98430260e0f99cbbd3bf286e54de3c151])
1 Sent by server *.ogf.fr
Fingerprint SHA256: 3ef69c39a1780b3924ef6d3781fb32f98430260e0f99cbbd3bf286e54de3c151
Pin SHA256: z/SlbYDau1ixme/4TLxIRIDPnTMNkd20Cr/NSBFgc6Y=

RSA 2048 bits (e 65537) / SHA256withRSA
2 Extra download GandiCert
Fingerprint SHA256: 3337d4e4b4ef6a94f04915d2e86b1f8f47a3c83667da2519d9b95ae7270affe1
Pin SHA256: 0dflgFofXiuLoZvgRpP8N9xrpDTgZ7c1xbmTjIxym7o=

RSA 4096 bits (e 65537) / SHA256withRSA
3 In trust store DigiCert Global Root G2   Self-signed
Fingerprint SHA256: cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
Pin SHA256: i7WTqTvh0OioIruIfFR4kMPnBqrS2rdiVPl/s2uC/CY=

RSA 2048 bits (e 65537) / SHA256withRSA
Path #1: Not trusted (invalid certificate [Fingerprint SHA256: 3ef69c39a1780b3924ef6d3781fb32f98430260e0f99cbbd3bf286e54de3c151])
1 Sent by server *.ogf.fr
Fingerprint SHA256: 3ef69c39a1780b3924ef6d3781fb32f98430260e0f99cbbd3bf286e54de3c151
Pin SHA256: z/SlbYDau1ixme/4TLxIRIDPnTMNkd20Cr/NSBFgc6Y=

RSA 2048 bits (e 65537) / SHA256withRSA
2 Extra download GandiCert
Fingerprint SHA256: 3337d4e4b4ef6a94f04915d2e86b1f8f47a3c83667da2519d9b95ae7270affe1
Pin SHA256: 0dflgFofXiuLoZvgRpP8N9xrpDTgZ7c1xbmTjIxym7o=

RSA 4096 bits (e 65537) / SHA256withRSA
3 In trust store DigiCert Global Root G2   Self-signed
Fingerprint SHA256: cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
Pin SHA256: i7WTqTvh0OioIruIfFR4kMPnBqrS2rdiVPl/s2uC/CY=

RSA 2048 bits (e 65537) / SHA256withRSA
Path #1: Not trusted (invalid certificate [Fingerprint SHA256: 3ef69c39a1780b3924ef6d3781fb32f98430260e0f99cbbd3bf286e54de3c151])
1 Sent by server *.ogf.fr
Fingerprint SHA256: 3ef69c39a1780b3924ef6d3781fb32f98430260e0f99cbbd3bf286e54de3c151
Pin SHA256: z/SlbYDau1ixme/4TLxIRIDPnTMNkd20Cr/NSBFgc6Y=

RSA 2048 bits (e 65537) / SHA256withRSA
2 Extra download GandiCert
Fingerprint SHA256: 3337d4e4b4ef6a94f04915d2e86b1f8f47a3c83667da2519d9b95ae7270affe1
Pin SHA256: 0dflgFofXiuLoZvgRpP8N9xrpDTgZ7c1xbmTjIxym7o=

RSA 4096 bits (e 65537) / SHA256withRSA
3 In trust store DigiCert Global Root G2   Self-signed
Fingerprint SHA256: cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
Pin SHA256: i7WTqTvh0OioIruIfFR4kMPnBqrS2rdiVPl/s2uC/CY=

RSA 2048 bits (e 65537) / SHA256withRSA

Click here to expand

Click here to expand

Configuration
Protocols
TLS 1.3 No
TLS 1.2 Yes*
TLS 1.1 No
TLS 1.0 No
SSL 3 No
SSL 2 No
(*) Experimental: Server negotiated using No-SNI


Cipher Suites
# TLS 1.2 (suites in server-preferred order)
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)   ECDH secp256r1 (eq. 3072 bits RSA)   FS 256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)   ECDH secp256r1 (eq. 3072 bits RSA)   FS 128
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)   ECDH secp256r1 (eq. 3072 bits RSA)   FS   WEAK 128
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)   ECDH secp256r1 (eq. 3072 bits RSA)   FS   WEAK 256
TLS_RSA_WITH_AES_256_GCM_SHA384 (0x9d)   WEAK 256
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x9c)   WEAK 128
TLS_RSA_WITH_AES_256_CBC_SHA256 (0x3d)   WEAK 256
TLS_RSA_WITH_AES_128_CBC_SHA256 (0x3c)   WEAK 128
TLS_RSA_WITH_AES_256_CBC_SHA (0x35)   WEAK 256
TLS_RSA_WITH_AES_128_CBC_SHA (0x2f)   WEAK 128


Handshake Simulation
Android 4.4.2 RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Android 5.0.0 RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256   ECDH secp256r1  FS
Android 6.0 RSA 2048 (SHA384)   TLS 1.2 > http/1.1   TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256   ECDH secp256r1  FS
Android 7.0 RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Android 8.0 RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Android 8.1 RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Android 9.0 RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
BingPreview Jan 2015 RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Chrome 49 / XP SP3 RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256   ECDH secp256r1  FS
Chrome 69 / Win 7  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Chrome 70 / Win 10 RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Chrome 80 / Win 10  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Firefox 31.3.0 ESR / Win 7 RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256   ECDH secp256r1  FS
Firefox 47 / Win 7  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256   ECDH secp256r1  FS
Firefox 49 / XP SP3 RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Firefox 62 / Win 7  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Firefox 73 / Win 10  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Googlebot Feb 2018 RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
IE 11 / Win 7  R RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA   ECDH secp256r1  FS
IE 11 / Win 8.1  R RSA 2048 (SHA384)   TLS 1.2 > http/1.1   TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA   ECDH secp256r1  FS
IE 11 / Win Phone 8.1  R RSA 2048 (SHA384)   TLS 1.2 > http/1.1   TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA   ECDH secp256r1  FS
IE 11 / Win Phone 8.1 Update  R RSA 2048 (SHA384)   TLS 1.2 > http/1.1   TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA   ECDH secp256r1  FS
IE 11 / Win 10  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Edge 15 / Win 10  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Edge 16 / Win 10  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Edge 18 / Win 10  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Edge 13 / Win Phone 10  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Java 8u161 RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Java 11.0.3 RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Java 12.0.1 RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
OpenSSL 1.0.1l  R RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
OpenSSL 1.0.2s  R RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
OpenSSL 1.1.0k  R RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
OpenSSL 1.1.1c  R RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Safari 6 / iOS 6.0.1 RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA   ECDH secp256r1  FS
Safari 7 / iOS 7.1  R RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA   ECDH secp256r1  FS
Safari 7 / OS X 10.9  R RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA   ECDH secp256r1  FS
Safari 8 / iOS 8.4  R RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA   ECDH secp256r1  FS
Safari 8 / OS X 10.10  R RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA   ECDH secp256r1  FS
Safari 9 / iOS 9  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Safari 9 / OS X 10.11  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Safari 10 / iOS 10  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Safari 10 / OS X 10.12  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Safari 12.1.2 / MacOS 10.14.6 Beta  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Safari 12.1.1 / iOS 12.3.1  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Apple ATS 9 / iOS 9  R RSA 2048 (SHA384)   TLS 1.2 > h2   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
Yahoo Slurp Jan 2015 RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
YandexBot Jan 2015 RSA 2048 (SHA384)   TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384   ECDH secp256r1  FS
# Not simulated clients (Protocol mismatch)
Android 2.3.7   No SNI 2 Protocol mismatch (not simulated)
Android 4.0.4 Protocol mismatch (not simulated)
Android 4.1.1 Protocol mismatch (not simulated)
Android 4.2.2 Protocol mismatch (not simulated)
Android 4.3 Protocol mismatch (not simulated)
Baidu Jan 2015 Protocol mismatch (not simulated)
IE 6 / XP   No FS 1   No SNI 2 Protocol mismatch (not simulated)
IE 7 / Vista Protocol mismatch (not simulated)
IE 8 / XP   No FS 1   No SNI 2 Protocol mismatch (not simulated)
IE 8-10 / Win 7  R Protocol mismatch (not simulated)
IE 10 / Win Phone 8.0 Protocol mismatch (not simulated)
Java 6u45   No SNI 2 Protocol mismatch (not simulated)
Java 7u25 Protocol mismatch (not simulated)
OpenSSL 0.9.8y Protocol mismatch (not simulated)
Safari 5.1.9 / OS X 10.6.8 Protocol mismatch (not simulated)
Safari 6.0.4 / OS X 10.8.4  R Protocol mismatch (not simulated)

Click here to expand

(1) Clients that do not support Forward Secrecy (FS) are excluded when determining support for it.
(2) No support for virtual SSL hosting (SNI). Connects to the default site if the server uses SNI.
(3) Only first connection attempt simulated. Browsers sometimes retry with a lower protocol version.
(R) Denotes a reference browser or client, with which we expect better effective security.
(All) We use defaults, but some platforms do not use their best protocols and features (e.g., Java 6 & 7, older IE).
(All) Certificate trust is not checked in handshake simulation, we only perform TLS handshake.


Protocol Details
Secure Renegotiation Supported
Secure Client-Initiated Renegotiation No
Insecure Client-Initiated Renegotiation No
BEAST attack Mitigated server-side (more info)  
POODLE (SSLv3) No, SSL 3 not supported (more info)
POODLE (TLS) No (more info)
Zombie POODLE No (more info)   TLS 1.2 : 0xc013
GOLDENDOODLE No (more info)   TLS 1.2 : 0xc013
OpenSSL 0-Length No (more info)   TLS 1.2 : 0xc013
Sleeping POODLE No (more info)   TLS 1.2 : 0xc013
Downgrade attack prevention Unknown (requires support for at least two protocols, excl. SSL2)
SSL/TLS compression No
RC4 No
Heartbeat (extension) Yes
Heartbleed (vulnerability) No (more info)
Ticketbleed (vulnerability) No (more info)
OpenSSL CCS vuln. (CVE-2014-0224) No (more info)
OpenSSL Padding Oracle vuln.
(CVE-2016-2107)
No (more info)
ROBOT (vulnerability) No (more info)
Forward Secrecy Yes (with most browsers)   ROBUST (more info)
ALPN Yes   h2 http/1.1
NPN Yes   h2 http/1.1
Session resumption (caching) No (IDs assigned but not accepted)
Session resumption (tickets) Yes
OCSP stapling No
Strict Transport Security (HSTS) No
HSTS Preloading Not in: Chrome  Edge  Firefox  IE 
Public Key Pinning (HPKP) No (more info)
Public Key Pinning Report-Only No
Public Key Pinning (Static) No (more info)
Long handshake intolerance No
TLS extension intolerance No
TLS version intolerance No
Incorrect SNI alerts No
Uses common DH primes No, DHE suites not supported
DH public server param (Ys) reuse No, DHE suites not supported
ECDH public server param reuse No
Supported Named Groups secp256r1, secp521r1, brainpoolP512r1, brainpoolP384r1, secp384r1, brainpoolP256r1, secp256k1, sect571r1, sect571k1, sect409k1, sect409r1, sect283k1, sect283r1 (server preferred order)
SSL 2 handshake compatibility Yes


HTTP Requests
1 https://www.henri-de-borniol.fr/  (HTTP/1.1 200 OK)
1
Date Sun, 08 Jun 2025 14:22:18 GMT
Content-Type text/html; charset=UTF-8
Content-Length 90054
Connection close
Cache-Control max-age=86400, public
Content-language fr
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
Expires Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified Sat, 07 Jun 2025 22:07:18 GMT
X-Grace 10
X-TTL 2629746
X-Tag 1k2y 1k70 1k7t 1k6j 1k6d 1k61 1k5s 1k5o 1k8u 1kc8 1k6l 1k7x 1k9z 1kbd 1cj 2x 1k65 2x5m 2x5m29 1c49 1c2l 1c2n 2x77 1k8l 2x7v 2x7v4p 1c1p 1c1q 1c3c 1c3g 1c3e 1c3a 1c4b 1c27 1c1k 1c2q 1c3j 1c3r 1c3v 1c3m 1cp 1c2p 1cl 1c3i 1cv 1c15 1c10 t4h 2j 1c46 6d 2y 1b1 1c45 1f5g 1f5f 1f5e 2m 1f5d 1kis 1kft 1kea 1kdt 1c44 1f4t 1khc 1kf3 1kdk 1kcd 1c43 1c42 1f3u 1khc 1ked 1kcd 1kcu 1f3k 1f5i 1kb9 1ci 1f5u 1f4s 1f4r 1fi 1fh 2x6v 2x5a 2x5m4p 4q 333 332 2l 4z 1k6v 2x4h 2p 1k9y 2x3g 2x3g4s
X-Adv-Varnish Cache-enabled
X-Drupal-Cache HIT
X-Cacheable YES
X-Varnish 9381281 9232444
Age 54410
ETag W/"1749334038-gzip"
X-Varnish-Cache HIT
X-Cache-TTL-Remaining 2575336.246
X-Cache-Age 54410
X-Cache-Hits 13
Vary X-Bin,Accept-Encoding, Cookie
Accept-Ranges bytes


Miscellaneous
Test date Sun, 08 Jun 2025 14:21:28 UTC
Test duration 126.862 seconds
HTTP status code 200
HTTP server signature -
Server hostname -


SSL Report v2.4.0