SSL/TLS Capabilities of Your Browser
User Agent: CCBot/2.0 (

Other User Agents »

Protocol Support
Please wait, checking protocol support...
FREAK Vulnerability (Experimental)
Please wait, checking if your user agent is vulnerable...
For more information about the FREAK attack, please go to
To test manually, click here. Your user agent is not vulnerable if it fails to connect to the site.
POODLE Vulnerability
Please wait, checking if your user agent is vulnerable...
For more information about the POODLE attack, please read this blog post.
SSL 2 Protocol Support
Your user agent supports SSL 2. You should upgrade.
SSL 2 is a very old, obsolete, and insecure version of the SSL protocol. You can usually disable this protocol version in configuration, but modern clients don't support it at all. This really means that you should upgrade your software to a better version.
iOS and OS X TLS Authentication Vulnerability
Please wait, checking if your user agent is vulnerable...
To test manually, click here. If your user agent refuses to connect, you are not vulnerable. This test requires a connection to the SSL Labs server on port 10443. A strict outbound firewall might interfere. You should test Safari running on iOS or OS X. Chrome and Firefox are not vulnerable, even when running on a vulnerable operating system. MORE »
Protocol Features
TLS 1.2 No
TLS 1.1 No
TLS 1.0 Yes*
SSL 3 Yes*
SSL 2 No
(*) Without JavaScript, this test reliably detects only the highest supported protocol.

Cipher Suites (in order of preference)
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)   Forward Secrecy 256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)   Forward Secrecy 256
TLS_RSA_WITH_AES_256_CBC_SHA (0x35) 256
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (0xc00f) 256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x39)   Forward Secrecy 256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA (0x38)   Forward Secrecy2 256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)   Forward Secrecy 128
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)   Forward Secrecy 128
TLS_RSA_WITH_AES_128_CBC_SHA (0x2f) 128
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (0xc00e) 128
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33)   Forward Secrecy 128
TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x32)   Forward Secrecy2 128
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (0xc007)   WEAK 128
TLS_ECDHE_RSA_WITH_RC4_128_SHA (0xc011)   WEAK 128
TLS_RSA_WITH_RC4_128_SHA (0x5)   WEAK 128
TLS_ECDH_ECDSA_WITH_RC4_128_SHA (0xc002)   WEAK 128
TLS_ECDH_RSA_WITH_RC4_128_SHA (0xc00c)   WEAK 128
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc008)   Forward Secrecy 112
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (0xc012)   Forward Secrecy 112
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0x16)   Forward Secrecy 112
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0x13)   Forward Secrecy2 112
TLS_RSA_WITH_RC4_128_MD5 (0x4)   WEAK 128
(1) When a browser supports SSL 2, its SSL 2-only suites are shown only on the very first connection to this site. To see the suites, close all browser windows, then open this exact page directly. Don't refresh.
(2) Cannot be used for Forward Secrecy because they require DSA keys, which are effectively limited to 1024 bits.

Protocol Details
Server Name Indication (SNI) Yes
Secure Renegotiation Yes
TLS compression No
Session tickets No
OCSP stapling No
Signature algorithms -
Elliptic curves secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1
Next Protocol Negotiation No
Application Layer Protocol Negotiation No
SSL 2 handshake compatibility No