してみるテストロゴ
Apache 2.4系でHTTP/2サーバを構築してみるテスト。

Your browser's TLS/HTTP Connection info.


On this page you can check the cryptographic method that your browser presented when initiating a TLS connection and shared cryptographic method with the server.
If you are intentionally presented a vulnerable encryption method, try to update your browser software.

Summary

Request TimeMon Nov 19 07:45:44 2018
Request Time(UTC)Sun, 18 Nov 2018 22:45:44 GMT
Client IP54.226.209.201
User-AgentCCBot/2.0 (https://commoncrawl.org/faq/)
TLS ProtocolTLSv1.2
HTTP VersionHTTP/1.1
Secure renegotiationEnable
Session-id cyclereused
Cipher suiteECDHE-ECDSA-AES128-GCM-SHA256

Key exchange

Server Supported ECDHE/DHE Groups
X25519
P-256
X448
P-521
P-384
ECDHE/DHE Groups from client
Shared ECDHE/DHE Groups

Signature

Because reuse session-id, no signature algorythm.

Cipher suite

Server supported cipher list
ECDHE-ECDSA-AES128-CCM8
ECDHE-ECDSA-AES128-CCM
ECDHE-ECDSA-AES128-GCM-SHA256
ECDHE-ECDSA-CHACHA20-POLY1305
ECDHE-RSA-AES128-GCM-SHA256
ECDHE-RSA-CHACHA20-POLY1305
ECDHE-ECDSA-AES128-SHA256
ECDHE-RSA-AES128-SHA256
Cipher list from client
ECDHE-RSA-AES256-SHA
AES256-SHA
ECDHE-RSA-AES128-SHA
AES128-SHA
ECDHE-ECDSA-AES256-GCM-SHA384
ECDHE-ECDSA-AES128-GCM-SHA256
ECDHE-RSA-AES256-GCM-SHA384
AES256-GCM-SHA384
ECDHE-RSA-AES128-GCM-SHA256
AES128-GCM-SHA256
Shared cipher list

HTTP Request

METHODGET
URI/tls_check
HTTP VersionHTTP/1.1

HTTP Request headers

Accepttext/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encodinggzip
ConnectionKeep-Alive
Hosthttp2.try-and-test.net
If-Modified-SinceSat, 18 Aug 2018 18:24:33 CEST
User-AgentCCBot/2.0 (https://commoncrawl.org/faq/)
NEXT >> トップページに戻る

(C)Copyrights 2015-2018, non-standard programmer

このサイトは、あくまでも私の個人的体験を、綴ったものです。 軽く参考程度にご利用ください。