54/100 SECURITY SCORE

Certificate Information

Subject
C=US, UNKNOWN={:asn1_OPENTYPE, <<19, 5, 57, 50, 48, 57, 51>>}, ST=California, L=La Jolla, UNKNOWN={:asn1_OPENTYPE, <<19, 17, 57, 53, 48, 48, 32, 71, 105, 108, 109, 97, 110, 32, 68, 114, 105, 118, 101>>}, O=University of California, San Diego, OU=UCSD, CN=ns-auth3.ucsd.edu
Issuer
C=US, ST=MI, L=Ann Arbor, O=Internet2, OU=InCommon, CN=InCommon RSA Server CA
Valid From
June 23, 2020
Valid Until
June 23, 2022 Expired
Public Key
RSA 2048 bit Adequate
Signature Algorithm
SHA256-RSA
SHA-256 Fingerprint
00:B2:07:95:CD:6A:20:77:CB:67:C2:ED:90:DB:EC:59:06:6E:32:1B:84:9E:60:B7:88:83:A2:5F:6A:44:9C:AA
Alternative Names

Security Configuration

TLS Protocols
TLS 1.0 TLS 1.1 TLS 1.2
Forward Secrecy
Limited (Check cipher configuration)
Warnings
  • TLS 1.3 is not supported (recommended)
  • TLS 1.1 is deprecated and should be disabled
  • TLS 1.0 is deprecated and should be disabled

CAA Records (Certificate Authority Authorization)

CAA Records
Not Configured (Any CA can issue certificates)
CAA Issues
  • No CAA records configured - any CA can issue certificates
Recommendations
  • Implement CAA records to restrict which CAs can issue certificates for your domain
  • This adds an extra layer of security against unauthorized certificate issuance
  • Example: Add CAA record 'example.com. CAA 0 issue "letsencrypt.org"'
  • Consider adding 'iodef' record to receive security incident reports