SSL Report:
www.amazon.com
(54.230.72.14)
Assessed on: Sat, 06 Jan 2018 17:18:02 UTC
| HIDDEN
| Clear cache
Summary
0
20
40
60
80
100
Certificate
Protocol Support
Key Exchange
Cipher Strength
Visit our documentation page
for more information, configuration guides, and books. Known issues are documented
here.
This server's certificate will be distrusted by Google and Mozilla from September 2018.
MORE INFO »
HTTP Strict Transport Security (HSTS) with long duration deployed on this server.
MORE INFO »
Certificate #1: RSA 2048 bits (SHA256withRSA)
|
Server Key and Certificate #1
|
|
| Subject |
www.amazon.com
Fingerprint SHA256: 4dcf7a0226d6e196f2da27e1a1dd579f65c5552b9256511abeee0b2ad4f96344 Pin SHA256: bt9OQRqVDT1WJU4iYbIMDoBrItmyImKb1egbPO5gy70= |
| Common names | www.amazon.com |
| Alternative names | amazon.com amzn.com uedata.amazon.com us.amazon.com www.amazon.com www.amzn.com corporate.amazon.com buybox.amazon.com iphone.amazon.com yp.amazon.com home.amazon.com origin-www.amazon.com buckeye-retail-website.amazon.com huddles.amazon.com |
| Serial Number | 282e96b36b76d6d85246edbb31b20c98 |
| Valid from | Wed, 20 Sep 2017 00:00:00 UTC |
| Valid until | Fri, 21 Sep 2018 23:59:59 UTC (expires in 8 months and 15 days) |
| Key | RSA 2048 bits (e 65537) |
| Weak key (Debian) | No |
| Issuer | Symantec Class 3 Secure Server CA - G4 AIA: http://ss.symcb.com/ss.crt |
| Signature algorithm | SHA256withRSA |
| Extended Validation | No |
| Certificate Transparency | Yes (certificate) |
| OCSP Must Staple | No |
| Revocation information |
CRL, OCSP CRL: http://ss.symcb.com/ss.crl OCSP: http://ss.symcd.com |
| Revocation status | Good (not revoked) |
| DNS CAA | No (more info) |
| Trusted | Yes
Mozilla Apple Android Java Windows |
|
|
Configuration
| Protocols | |||
| TLS 1.3 | No | ||
| TLS 1.2 | Yes | ||
| TLS 1.1 | Yes | ||
| TLS 1.0 | Yes | ||
| SSL 3 | No | ||
| SSL 2 | No | ||
| For TLS 1.3 tests, we currently support draft version 18. | |||
| Cipher Suites | ||
|
# TLS 1.2 (suites in server-preferred order)
|
||
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
ECDH secp256r1 (eq. 3072 bits RSA) FS
|
128 | |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)
ECDH secp256r1 (eq. 3072 bits RSA) FS
|
128 | |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
ECDH secp256r1 (eq. 3072 bits RSA) FS
|
128 | |
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
ECDH secp256r1 (eq. 3072 bits RSA) FS
|
256 | |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)
ECDH secp256r1 (eq. 3072 bits RSA) FS
|
256 | |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
ECDH secp256r1 (eq. 3072 bits RSA) FS
|
256 | |
TLS_RSA_WITH_AES_128_GCM_SHA256 (0x9c)
|
128 | |
TLS_RSA_WITH_AES_256_GCM_SHA384 (0x9d)
|
256 | |
TLS_RSA_WITH_AES_128_CBC_SHA256 (0x3c)
|
128 | |
TLS_RSA_WITH_AES_256_CBC_SHA (0x35)
|
256 | |
TLS_RSA_WITH_AES_128_CBC_SHA (0x2f)
|
128 | |
TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa)
WEAK
|
112 | |
|
# TLS 1.1 (suites in server-preferred order)
|
||
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
ECDH secp256r1 (eq. 3072 bits RSA) FS
|
128 | |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
ECDH secp256r1 (eq. 3072 bits RSA) FS
|
256 | |
TLS_RSA_WITH_AES_256_CBC_SHA (0x35)
|
256 | |
TLS_RSA_WITH_AES_128_CBC_SHA (0x2f)
|
128 | |
TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa)
WEAK
|
112 | |
|
# TLS 1.0 (suites in server-preferred order)
|
||
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
ECDH secp256r1 (eq. 3072 bits RSA) FS
|
128 | |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
ECDH secp256r1 (eq. 3072 bits RSA) FS
|
256 | |
TLS_RSA_WITH_AES_256_CBC_SHA (0x35)
|
256 | |
TLS_RSA_WITH_AES_128_CBC_SHA (0x2f)
|
128 | |
TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa)
WEAK
|
112 | |
| Handshake Simulation | |||
| Android 2.3.7 No SNI 2 | RSA 2048 (SHA256) | TLS 1.0 | TLS_RSA_WITH_AES_128_CBC_SHA No FS |
| Android 4.0.4 | RSA 2048 (SHA256) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Android 4.1.1 | RSA 2048 (SHA256) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Android 4.2.2 | RSA 2048 (SHA256) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Android 4.3 | RSA 2048 (SHA256) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Android 4.4.2 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Android 5.0.0 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Android 6.0 | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Android 7.0 | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Baidu Jan 2015 | RSA 2048 (SHA256) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| BingPreview Jan 2015 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Chrome 49 / XP SP3 | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Chrome 57 / Win 7 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Firefox 31.3.0 ESR / Win 7 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Firefox 47 / Win 7 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Firefox 49 / XP SP3 | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Firefox 53 / Win 7 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Googlebot Feb 2015 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| IE 7 / Vista | RSA 2048 (SHA256) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| IE 8 / XP No FS 1 No SNI 2 | RSA 2048 (SHA256) | TLS 1.0 | TLS_RSA_WITH_3DES_EDE_CBC_SHA |
| IE 8-10 / Win 7 R | RSA 2048 (SHA256) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| IE 11 / Win 7 R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| IE 11 / Win 8.1 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| IE 10 / Win Phone 8.0 | RSA 2048 (SHA256) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| IE 11 / Win Phone 8.1 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| IE 11 / Win Phone 8.1 Update R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| IE 11 / Win 10 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Edge 13 / Win 10 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Edge 13 / Win Phone 10 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Java 6u45 No SNI 2 | RSA 2048 (SHA256) | TLS 1.0 | TLS_RSA_WITH_AES_128_CBC_SHA No FS |
| Java 7u25 | RSA 2048 (SHA256) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Java 8u31 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| OpenSSL 0.9.8y | RSA 2048 (SHA256) | TLS 1.0 | TLS_RSA_WITH_AES_256_CBC_SHA No FS |
| OpenSSL 1.0.1l R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| OpenSSL 1.0.2e R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Safari 5.1.9 / OS X 10.6.8 | RSA 2048 (SHA256) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Safari 6 / iOS 6.0.1 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| Safari 6.0.4 / OS X 10.8.4 R | RSA 2048 (SHA256) | TLS 1.0 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Safari 7 / iOS 7.1 R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| Safari 7 / OS X 10.9 R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| Safari 8 / iOS 8.4 R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| Safari 8 / OS X 10.10 R | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| Safari 9 / iOS 9 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Safari 9 / OS X 10.11 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Safari 10 / iOS 10 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Safari 10 / OS X 10.12 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Apple ATS 9 / iOS 9 R | RSA 2048 (SHA256) | TLS 1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Yahoo Slurp Jan 2015 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| YandexBot Jan 2015 | RSA 2048 (SHA256) | TLS 1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
|
# Not simulated clients (Protocol mismatch)
|
|||
| IE 6 / XP No FS 1 No SNI 2 |
Protocol mismatch (not simulated) |
||
| (1) Certificate trust is not checked in handshake simulation, we only perform TLS handshake. | |||
| (2) Clients that do not support Forward Secrecy (FS) are excluded when determining support for it. | |||
| (3) No support for virtual SSL hosting (SNI). Connects to the default site if the server uses SNI. | |||
| (4) Only first connection attempt simulated. Browsers sometimes retry with a lower protocol version. | |||
| (R) Denotes a reference browser or client, with which we expect better effective security. | |||
| (All) We use defaults, but some platforms do not use their best protocols and features (e.g., Java 6 & 7, older IE). | |||
| Protocol Details | ||||||
| DROWN | No, server keys and hostname not seen elsewhere with SSLv2
|
|||||
| Secure Renegotiation | Supported | |||||
| Secure Client-Initiated Renegotiation | No | |||||
| Insecure Client-Initiated Renegotiation | No | |||||
| BEAST attack |
Not mitigated server-side (more info)
TLS 1.0: 0xc013
|
|||||
| POODLE (SSLv3) | No, SSL 3 not supported (more info) | |||||
| POODLE (TLS) | No (more info) | |||||
| Downgrade attack prevention | Yes, TLS_FALLBACK_SCSV supported (more info) | |||||
| SSL/TLS compression | No | |||||
| RC4 | No | |||||
| Heartbeat (extension) | No | |||||
| Heartbleed (vulnerability) | No (more info) | |||||
| Ticketbleed (vulnerability) | No (more info) | |||||
| OpenSSL CCS vuln. (CVE-2014-0224) | No (more info) | |||||
| OpenSSL Padding Oracle vuln. (CVE-2016-2107) |
No (more info) | |||||
| ROBOT (vulnerability) | No (more info) | |||||
| Forward Secrecy | With modern browsers (more info) | |||||
| ALPN | Yes http/1.1 | |||||
| NPN | Yes http/1.1 | |||||
| Session resumption (caching) | No (IDs empty) | |||||
| Session resumption (tickets) | Yes | |||||
| OCSP stapling | Yes | |||||
| Strict Transport Security (HSTS) | Yes max-age=47474747; includeSubDomains; preload |
|||||
| HSTS Preloading | Chrome Edge Firefox IE | |||||
| Public Key Pinning (HPKP) | No (more info) | |||||
| Public Key Pinning Report-Only | No | |||||
| Public Key Pinning (Static) | No (more info) | |||||
| Long handshake intolerance | No | |||||
| TLS extension intolerance | No | |||||
| TLS version intolerance | No | |||||
| Incorrect SNI alerts | No | |||||
| Uses common DH primes | No, DHE suites not supported | |||||
| DH public server param (Ys) reuse | No, DHE suites not supported | |||||
| ECDH public server param reuse | No | |||||
| Supported Named Groups | secp256r1, secp521r1, brainpoolP512r1, brainpoolP384r1, secp384r1, brainpoolP256r1, secp256k1, sect571r1, sect571k1, sect409k1, sect409r1, sect283k1, sect283r1 (server preferred order) | |||||
| SSL 2 handshake compatibility | Yes | |||||
|
|
|
1 https://www.amazon.com/
(HTTP/1.1 200 OK)
| 1 | |
| Content-Type | text/html;charset=UTF-8 | |
| Transfer-Encoding | chunked | |
| Connection | close | |
| Server | Server | |
| Date | Sat, 06 Jan 2018 17:15:54 GMT | |
| Set-Cookie | skin=noskin; path=/; domain=.amazon.com | |
| Strict-Transport-Security | max-age=47474747; includeSubDomains; preload | |
| Vary | Accept-Encoding,User-Agent | |
| Content-Language | en-US | |
| X-Frame-Options | SAMEORIGIN | |
| X-UA-Compatible | IE=edge | |
| Cache-Control | no-cache | |
| Pragma | no-cache | |
| Expires | -1 | |
| Set-Cookie | session-id=145-7546369-7955602; Domain=.amazon.com; Expires=Tue, 01-Jan-2036 08:00:01 GMT; Path=/ | |
| Set-Cookie | session-id-time=2082787201l; Domain=.amazon.com; Expires=Tue, 01-Jan-2036 08:00:01 GMT; Path=/ | |
| X-Cache | Miss from cloudfront | |
| Via | 1.1 265d860cffd31a8360ce40dda3afbace.cloudfront.net (CloudFront) | |
| X-Amz-Cf-Id | -Omg6HAnah8Ag7a67btnM2MntdkJE-0wKvnAoxtrnVisfaOibKvLcQ== | |
| Miscellaneous | |
| Test date | Sat, 06 Jan 2018 17:15:40 UTC |
| Test duration | 142.146 seconds |
| HTTP status code | 200 |
| HTTP server signature | Server |
| Server hostname | server-54-230-72-14.hkg50.r.cloudfront.net |
SSL Report v1.30.5
