Open
Cached
·
just now
54/100
SECURITY SCORE
Certificate Information
Subject
C=US, UNKNOWN={:asn1_OPENTYPE, <<19, 5, 57, 50, 48, 57, 51>>}, ST=California, L=La Jolla, UNKNOWN={:asn1_OPENTYPE, <<19, 17, 57, 53, 48, 48, 32, 71, 105, 108, 109, 97, 110, 32, 68, 114, 105, 118, 101>>}, O=University of California, San Diego, OU=UCSD, CN=ns-auth2.ucsd.edu
Issuer
C=US, ST=MI, L=Ann Arbor, O=Internet2, OU=InCommon, CN=InCommon RSA Server CA
Valid From
June 23, 2020
Valid Until
June 23, 2022
Expired
Public Key
RSA
2048 bit
Adequate
Signature Algorithm
SHA256-RSA
SHA-256 Fingerprint
DE:C9:26:2E:EA:4F:81:3D:E7:85:D0:72:F5:D1:FF:EA:A3:40:5D:96:B3:55:B3:E4:AD:64:29:5B:83:08:2A:10
Alternative Names
Security Configuration
TLS Protocols
TLS 1.0
TLS 1.1
TLS 1.2
Forward Secrecy
Limited
(Check cipher configuration)
Warnings
- • TLS 1.3 is not supported (recommended)
- • TLS 1.1 is deprecated and should be disabled
- • TLS 1.0 is deprecated and should be disabled
CAA Records (Certificate Authority Authorization)
CAA Records
Not Configured
(Any CA can issue certificates)
CAA Issues
- • No CAA records configured - any CA can issue certificates
Recommendations
- • Implement CAA records to restrict which CAs can issue certificates for your domain
- • This adds an extra layer of security against unauthorized certificate issuance
- • Example: Add CAA record 'example.com. CAA 0 issue "letsencrypt.org"'
- • Consider adding 'iodef' record to receive security incident reports