SSL/TLS Security Assessment of e-vo.ru

Similar documents
SSL/TLS Server Test of

SSL/TLS Server Test of grupoconsultorefe.com

SSL Report: printware.co.uk ( )

SSL Report: ( )

SSL Report: cartridgeworld.co.uk ( )

SSL Report: bourdiol.xyz ( )

SSL Report: sharplesgroup.com ( )

High-Tech Bridge s Free SSL Server Test API Developer Documentation Version v1.2 24th of January 2018

Findings for

TLS1.2 IS DEAD BE READY FOR TLS1.3

TLS 1.1 Security fixes and TLS extensions RFC4346

Requirements from the. Functional Package for Transport Layer Security (TLS)

Scan Report Executive Summary

SSL Visibility and Troubleshooting

Install the ExtraHop session key forwarder on a Windows server

feature HTTPS Posture Assessment Ideal Configuration

Scan Report Executive Summary

SSL/TLS: Still Alive? Pascal Junod // HEIG-VD

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

SSL / TLS. Crypto in the Ugly Real World. Malvin Gattinger

CIS 5373 Systems Security

IBM Education Assistance for z/os V2R1

Scan Report Executive Summary. Part 2. Component Compliance Summary Component (IP Address, domain, etc.):

SSL Server Rating Guide

Ecosystem at Large

Version: $Revision: 1142 $

But where'd that extra "s" come from, and what does it mean?

Coming of Age: A Longitudinal Study of TLS Deployment

State of TLS usage current and future. Dave Thompson

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

32c3. December 28, Nick goto fail;

UNCLASSIFIED INFORMATION TECHNOLOGY SECURITY GUIDANCE

Network Security: TLS/SSL. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Defeating All Man-in-the-Middle Attacks

Xerox Product Security

Scan Report Executive Summary. Part 2. Component Compliance Summary Component (IP Address, domain, etc.):ekk.worldtravelink.com

The State of TLS in httpd 2.4. William A. Rowe Jr.

Your Apps and Evolving Network Security Standards

TLS Security and Future

VisiBroker for Visual Studio 2013

Network Security: TLS/SSL. Tuomas Aura T Network security Aalto University, Nov-Dec 2014

No Need for Black Chambers

Secure Socket Layer Health Assessment

CS 161 Computer Security

Datapath. Encryption

13/11/2014. Pa rt 2 S S L i m p a c t a n d o p t i m i s a t i o n. Pa rt 1 A b o u t S S L C e r t f i c a t e s. W h a t i s S S L / T L S

One Year of SSL Internet Measurement ACSAC 2012

Information Security CS 526

PROVING WHO YOU ARE TLS & THE PKI

Datapath. Encryption

Verifying Real-World Security Protocols from finding attacks to proving security theorems

SSL GOOD PRACTICE GUIDE

Installation and usage of SSL certificates: Your guide to getting it right

SSL/TLS Deployment Best Practices

Exposing The Misuse of The Foundation of Online Security

Attacks on SSL/TLS. Applied Cryptography. Andreas Hülsing (Slides mostly by Ruben Niederhagen) Dez. 6th, 2016

SECRETS OF THE ENCRYPTED INTERNET: WORLDWIDE CRYPTOGRAPHIC TRENDS

Scan Report Executive Summary

IHE Change Proposal. Tracking information: Change Proposal Status: Date of last update: Sep 13, 2018 Charles Parisot, Vassil Peytchev, John Moehrke

INFORMATION SUPPLEMENT. Use of SSL/Early TLS for POS POI Terminal Connections. Date: June 2018 Author: PCI Security Standards Council

Securing Connections for IBM Traveler Apps. Bill Wimer STSM for IBM Collaboration Solutions December 13, 2016

Legacy of Heartbleed: MITM and Revoked Certificates. Alexey Busygin NeoBIT

BIG-IP System: SSL Administration. Version

Security Improvements on Cast Iron

CSE484 Final Study Guide

APPLICATION & INFRASTRUCTURE SECURITY CONTROLS

High -Tech Bridge s Web Server Security Service API Developer Documentation Version v1.3 February 13 th 2018

SSL Accelerated Services. Feature Description

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

BIG-IP System: SSL Administration. Version

Chapter 4: Securing TCP connections

Norbert Muehr (Siemens PLM GTAC EMEA)

E-commerce security: SSL/TLS, SET and others. 4.1

Progressively Securing RIOT-OS!

WAP Security. Helsinki University of Technology S Security of Communication Protocols

Key Considerations in Deploying an SSL Solution

Bugzilla ID: Bugzilla Summary:

Secure channel, VPN and IPsec. stole some slides from Merike Kaeo

COSC 301 Network Management. Lecture 15: SSL/TLS and HTTPS

FireEye CM Series: CM-4400, CM-7400, CM-9400

Transport Level Security

Comodo Certificate Manager Software Version 5.0

MTAT Applied Cryptography

Securing Communications with your Apache HTTP Server. Lars Eilebrecht

HTTPS is Fast and Hassle-free with Cloudflare

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report. Pulse Secure, LLC

Security Protocols and Infrastructures. Winter Term 2015/2016

SSL/ TLS Cipher Suite Analysis and strong Cipher Enablement

DROWN - Breaking TLS using SSLv2

Cryptography MIS

Scan Report Executive Summary

Security Association Creation

Lecture 10: Communications Security

Secure Internet Communication

A Technology Brief on SSL/TLS Traffic

Performance implication of elliptic curve TLS

Security Protocols and Infrastructures. Winter Term 2010/2011

About FIPS, NGE, and AnyConnect

Security Protocols and Infrastructures

Cyber Security Advisory

Transcription:

SSL/TLS Security Assessment of e-vo.ru Test SSL/TLS implementation of any service on any port for compliance with industry best-practices, NIST guidelines and PCI DSS requirements. The server configuration seems to be good, but is not entirely compliant with NIST guidelines Information The server prefers cipher suites supporting Perfect-Forward-Secrecy 1

RSA CERTIFICATE INFORMATION Trusted Common Name Subject Alternative Names Transparency Extended Validation Valid From Valid To Y e s *.e-vo.ru sha256withrsaencryption DNS:*.edi.su, DNS:edi.su No No April 26th 2015, 11:47 CEST July 25th 2018, 23:37 CEST CERTIFICATE CHAIN *.edi.su Server certificate SHA256 PIN Expires in sha256withrsaencryption 0ca05f7bcba55f87d84b1347e7bf9b9b4e03e6d72b8b3bbcfbddb7dbee8394d2 e642sikm0vijp1nun5ne8sg42uj3ei6bwsnlp829bxk= 731 days RapidSSL SHA256 CA - G3 Intermediate CA SHA256 PIN Expires in sha256withrsaencryption 6e37822b18adbba04ed1ed6f1d2b14f9a4d268516dd949736146f64d645e0617 6X0iNAQtPIjXKEVcqZBwyMcRwq1yW60549axatu3oDE= 2,126 days GeoTrust Global CA SHA256 PIN Expires in Self-signed sha1withrsaencryption ad8255ac5a2894e7bbf034870d25d635418e8c74f7b936ae1ea29055dc81e2e9 h6801m+z8v3zbgkrhpq6l29esgfzhj89c1syucoqmqu= 2,127 days Root CA 2

Reference: NIST Special Publication 800-52 Revision 1 - Section 3 DIFFIE-HELLMAN PARAMETER SIZE The size of your Diffie-Hellman (DH) parameter: 2048 bits SUPPORTED ELLIPTIC CURVES List of all elliptic curves supported by the server: P-256 (prime256v1) (256 bits) SUPPORTED PROTOCOLS List of all SSL/TLS protocols supported by the server: TLSv1.0 TLSv1.1 TLSv1.2 SUPPORTED CIPHERS List of all cipher suites supported by the server: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA MISSING MANDATORY CIPHERS The support of these ciphers is mandatory according to NIST: TLS_RSA_WITH_3DES_EDE_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_128_GCM_SHA256 SERVER DOES NOT SUPPORT OCSP STAPLING The server does not support OCSP stapling. Its support allows better verification of the certificate validation status. 3

Reference: PCI DSS 3.1 - Requirements 2.3 and 4.1 DIFFIE-HELLMAN PARAMETER SIZE The size of your Diffie-Hellman (DH) parameter: 2048 bits SUPPORTED ELLIPTIC CURVES List of all elliptic curves supported by the server: P-256 (prime256v1) (256 bits) SUPPORTED PROTOCOLS List of all SSL/TLS protocols supported by the server: TLSv1.0 TLSv1.1 TLSv1.2 Deprecated. Dropped in June 2018 SUPPORTED CIPHERS List of all cipher suites supported by the server: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA POODLE The server is not vulnerable to POODLE over TLS. CVE-2016-2107 The server is not vulnerable to OpenSSL padding-oracle flaw (CVE-2016-2107). SERVER DOES NOT SUPPORT CLIENT-INITIATED INSECURE RENEGOTIATION 4

The server does not support client-initiated insecure renegotiation. HEARTBLEED The server version of OpenSSL is not vulnerable to Heartbleed attack. CVE-2014-0224 The server is not vulnerable to CVE-2014-0224 (OpenSSL CCS flaw). CERTIFICATE HAS BEEN SIGNED FOR MORE THAN 3 YEARS The RSA certificate provided has been validated for more than 3 years. This means that the private key of the server will remain the same for more than 3 years. NIST guidelines suggest limiting certificate validity to 3 years maximum. Misconfiguration or weakness CERTIFICATE IS NOT EV The RSA certificate provided is NOT an Extended Validation (EV) certificate. Information SERVER SUPPORTS TLSV1.2 The server supports TLSv1.2 which is the only SSL/TLS protocol that currently has no known flaws or exploitable weaknesses. SERVER PREFERS PFS ENABLED CIPHER SUITES For TLS family of protocols, the server prefers cipher suite(s) providing Perfect Forward Secrecy (PFS). HTTP SITE DOES REDIRECT The HTTP version of the website redirects to the HTTPS version. SERVER DOES NOT PROVIDE HSTS The server does not send the HTTP-Strict-Transport-Security. We advise to enable it to enforce the user to browse the website in HTTPS. Misconfiguration or weakness SERVER DOES NOT PROVIDE HPKP The server does not send HTTP-Public-Key-Pinning header. We advise to enable HPKP in order to avoid Man-In-The-Middle attacks. 5

Information SERVER SUPPORTS TLS FALLBACK SCSV EXTENSION The server supports TLS_FALLBACK_SCSV extension for protocol downgrade attack prevention. SERVER DOES NOT SUPPORT CLIENT-INITIATED SECURE RENEGOTIATION The server does not support client-initiated secure renegotiation. SECURE RENEGOCIATION SUPPORTED The server supports secure server-initiated renegotiation. TLS COMPRESSION SUPPORT TLS compression is not supported by the server. SERVER PREFERRED CIPHER SUITES Preferred cipher suite for each protocol supported (except SSLv2). Expected configuration are ciphers allowed by PCI DSS and enabling PFS: TLSv1.0 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLSv1.1 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLSv1.2 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 6