Closed sindarina closed 9 years ago
Notified via email: info@diditbetter.com
Poked on Twitter: https://twitter.com/isvsecwatch/status/595336965270155265
Most likely a box with IIS default settings, which aren't very secure. Suggestions for improvement here; https://github.com/isvsecwatch/httpstracker/blob/master/server-tips-iis.md
No change.
No change. Re-notified via email; info@diditbetter.com
No change.
No change.
No change, still broken.
A new RC4 attack, NOMORE, was released today; http://www.rc4nomore.com/
Please update your systems.
No change, still a big red F.
Target: store.diditbetter.com:443
prio ciphersuite protocols pubkey_size signature_algorithm trusted ticket_hint ocsp_staple pfs_keysize
1 AES128-SHA TLSv1 2048 sha256WithRSAEncryption True None True
2 AES256-SHA TLSv1 2048 sha256WithRSAEncryption True None True
3 RC4-SHA SSLv3,TLSv1 2048 sha256WithRSAEncryption True None True
4 DES-CBC3-SHA SSLv3,TLSv1 2048 sha256WithRSAEncryption True None True
5 ECDHE-RSA-AES128-SHA TLSv1 2048 sha256WithRSAEncryption True None True ECDH,P-256,256bits
6 ECDHE-RSA-AES256-SHA TLSv1 2048 sha256WithRSAEncryption True None True ECDH,P-256,256bits
7 RC4-MD5 SSLv2,SSLv3,TLSv1 2048 sha256WithRSAEncryption True None True
8 DES-CBC3-MD5 SSLv2 2048 sha256WithRSAEncryption False None False
OCSP stapling: supported
Server side cipher ordering
Unchanged, completely unresponsive. Closing as unresolved.
SSL Server Test Results https://www.ssllabs.com/ssltest/analyze.html?d=store.diditbetter.com (F)
Cipherscan Results
Cipherscan Analysis