[카테고리:] 미분류

  • naver.how SSL Labs 점검 결과

    주말을 맞이하여, naver.how 에 대하여 ssllabs.com 점검을 실시했다.

    #보안점검

    SSL Labs logo

    Home Projects Qualys Free Trial Contact

    You are here:  Home > Projects > SSL Server Test > naver.how

    SSL Report: naver.how (211.57.200.115)

    Assessed on:  Sun, 09 Mar 2025 14:17:58 UTC | Clear cache

    Scan Another »

    Summary

    Overall Rating

    A

    0

    20

    40

    60

    80

    100

    Certificate

    Protocol Support

    Key Exchange

    Cipher Strength

    Visit our documentation page for more information, configuration guides, and books. Known issues are documented here.

    This server supports TLS 1.3.

    Certificate #1: EC 256 bits (SHA384withECDSA)

    Server Key and Certificate #1
    Subjectnaver.how
    Fingerprint SHA256: 3ceca662fe26a7d91a339b371ae25b84c0b384d759ac7168db2e0721eb3cc8bf
    Pin SHA256: 1nDC4TNdhQCioExNmXIqTHXsdF9mO1InwysAKEz42LY=
    Common namesnaver.how
    Alternative namescp.naver.how naver.how
    Serial Number04b4e9206175b4e0be977618c410abfb1e3d
    Valid fromSat, 18 Jan 2025 14:54:44 UTC
    Valid untilFri, 18 Apr 2025 14:54:43 UTC (expires in 1 month and 9 days)
    KeyEC 256 bits
    Weak key (Debian)No
    IssuerE5
    AIA: http://e5.i.lencr.org/
    Signature algorithmSHA384withECDSA
    Extended ValidationNo
    Certificate TransparencyYes (certificate)
    OCSP Must StapleNo
    Revocation informationOCSP
    OCSP: http://e5.o.lencr.org
    Revocation statusGood (not revoked)
    DNS CAANo (more info)
    TrustedYes
    Mozilla  Apple  Android  Java  Windows 

    Additional Certificates (if supplied)
    Certificates provided2 (2016 bytes)
    Chain issuesNone
    #2
    SubjectE5
    Fingerprint SHA256: 5dfdb3cf31b26f23d87c09f3a0cef642f64069a9fb7cfe29270bb5dc0f1e16bb
    Pin SHA256: NYbU7PBwV4y9J67c4guWTki8FJ+uudrXL0a4V4aRcrg=
    Valid untilFri, 12 Mar 2027 23:59:59 UTC (expires in 2 years)
    KeyEC 384 bits
    IssuerISRG Root X1
    Signature algorithmSHA256withRSA

    Certification Paths

    Click here to expand

    Configuration

    Protocols
    TLS 1.3Yes
    TLS 1.2Yes
    TLS 1.1No
    TLS 1.0No
    SSL 3No
    SSL 2No

    Cipher Suites
    TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)   ECDH x25519 (eq. 3072 bits RSA)   FS256
    TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca9)   ECDH x25519 (eq. 3072 bits RSA)   FS256
    TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (0xc0af)   ECDH x25519 (eq. 3072 bits RSA)   FS256
    TLS_ECDHE_ECDSA_WITH_AES_256_CCM (0xc0ad)   ECDH x25519 (eq. 3072 bits RSA)   FS256
    TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (0xc05d)   ECDH x25519 (eq. 3072 bits RSA)   FS256
    TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)   ECDH x25519 (eq. 3072 bits RSA)   FS128
    TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (0xc0ae)   ECDH x25519 (eq. 3072 bits RSA)   FS128
    TLS_ECDHE_ECDSA_WITH_AES_128_CCM (0xc0ac)   ECDH x25519 (eq. 3072 bits RSA)   FS128
    TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (0xc05c)   ECDH x25519 (eq. 3072 bits RSA)   FS128
    TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xc024)   ECDH x25519 (eq. 3072 bits RSA)   FS   WEAK256
    TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (0xc073)   ECDH x25519 (eq. 3072 bits RSA)   FS   WEAK256
    TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xc023)   ECDH x25519 (eq. 3072 bits RSA)   FS   WEAK128
    TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (0xc072)   ECDH x25519 (eq. 3072 bits RSA)   FS   WEAK128
    TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)   ECDH x25519 (eq. 3072 bits RSA)   FS   WEAK256
    TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)   ECDH x25519 (eq. 3072 bits RSA)   FS   WEAK128

    Handshake Simulation
    Click here to expand
    (1) Clients that do not support Forward Secrecy (FS) are excluded when determining support for it.
    (2) No support for virtual SSL hosting (SNI). Connects to the default site if the server uses SNI.
    (3) Only first connection attempt simulated. Browsers sometimes retry with a lower protocol version.
    (R) Denotes a reference browser or client, with which we expect better effective security.
    (All) We use defaults, but some platforms do not use their best protocols and features (e.g., Java 6 & 7, older IE).
    (All) Certificate trust is not checked in handshake simulation, we only perform TLS handshake.

    Protocol Details
    Secure RenegotiationSupported
    Secure Client-Initiated RenegotiationNo
    Insecure Client-Initiated RenegotiationNo
    BEAST attackMitigated server-side (more info)  
    POODLE (SSLv3)No, SSL 3 not supported (more info)
    POODLE (TLS)No (more info)
    Zombie POODLENo (more info)   TLS 1.2 : 0xc023
    GOLDENDOODLENo (more info)   TLS 1.2 : 0xc023
    OpenSSL 0-LengthNo (more info)   TLS 1.2 : 0xc023
    Sleeping POODLENo (more info)   TLS 1.2 : 0xc023
    Downgrade attack preventionYes, TLS_FALLBACK_SCSV supported (more info)
    SSL/TLS compressionNo
    RC4No
    Heartbeat (extension)No
    Heartbleed (vulnerability)No (more info)
    Ticketbleed (vulnerability)No (more info)
    OpenSSL CCS vuln. (CVE-2014-0224)No (more info)
    OpenSSL Padding Oracle vuln.
    (CVE-2016-2107)
    No (more info)
    ROBOT (vulnerability)No (more info)
    Forward SecrecyYes (with most browsers)   ROBUST (more info)
    ALPNYes   http/1.1
    NPNNo
    Session resumption (caching)No (IDs assigned but not accepted)
    Session resumption (tickets)Yes
    OCSP staplingNo
    Strict Transport Security (HSTS)No
    HSTS PreloadingNot in: Chrome  Edge  Firefox  IE 
    Public Key Pinning (HPKP)No (more info)
    Public Key Pinning Report-OnlyNo
    Public Key Pinning (Static)No (more info)
    Long handshake intoleranceNo
    TLS extension intoleranceNo
    TLS version intoleranceNo
    Incorrect SNI alertsNo
    Uses common DH primesNo, DHE suites not supported
    DH public server param (Ys) reuseNo, DHE suites not supported
    ECDH public server param reuseNo
    Supported Named Groupsx25519, secp256r1 (server preferred order)
    SSL 2 handshake compatibilityNo
    0-RTT enabledNo

    HTTP Requests
    1 http://211.57.200.57/wp/  (HTTP/1.1 200 OK)

    Miscellaneous
    Test dateSun, 09 Mar 2025 14:16:10 UTC
    Test duration107.958 seconds
    HTTP status code200
    HTTP server signaturenginx/1.24.0 (Ubuntu)
    Server hostname

    SSL Report v2.3.1

    Copyright © 2009-2025 Qualys, Inc. All Rights Reserved. Privacy Policy.Terms and Conditions
    Try Qualys for free! Experience the award-winning Qualys Cloud Platform and the entire collection of Qualys Cloud Apps, including certificate security solutions.

    요건 https://www.immuniweb.com/ 테스트 결과