yawast 0.7.0.beta1 → 0.7.0.beta2

Sign up to get free protection for your applications and to get access to all the features.
Files changed (50) hide show
  1. checksums.yaml +4 -4
  2. data/.rubocop.yml +12 -0
  3. data/CHANGELOG.md +5 -1
  4. data/Gemfile +2 -2
  5. data/README.md +8 -1
  6. data/Rakefile +1 -1
  7. data/bin/yawast +8 -0
  8. data/lib/commands/cms.rb +2 -0
  9. data/lib/commands/dns.rb +3 -3
  10. data/lib/commands/head.rb +2 -0
  11. data/lib/commands/scan.rb +2 -0
  12. data/lib/commands/ssl.rb +2 -0
  13. data/lib/commands/utils.rb +5 -3
  14. data/lib/scanner/core.rb +34 -26
  15. data/lib/scanner/generic.rb +33 -130
  16. data/lib/scanner/plugins/applications/cms/generic.rb +20 -0
  17. data/lib/scanner/plugins/applications/generic/password_reset.rb +180 -0
  18. data/lib/scanner/plugins/dns/caa.rb +30 -12
  19. data/lib/scanner/plugins/dns/generic.rb +38 -1
  20. data/lib/scanner/plugins/http/directory_search.rb +14 -12
  21. data/lib/scanner/plugins/http/file_presence.rb +21 -13
  22. data/lib/scanner/plugins/http/generic.rb +95 -0
  23. data/lib/scanner/plugins/servers/apache.rb +23 -23
  24. data/lib/scanner/plugins/servers/generic.rb +25 -0
  25. data/lib/scanner/plugins/servers/iis.rb +6 -6
  26. data/lib/scanner/plugins/servers/nginx.rb +3 -1
  27. data/lib/scanner/plugins/servers/python.rb +3 -1
  28. data/lib/scanner/plugins/spider/spider.rb +7 -7
  29. data/lib/scanner/plugins/ssl/ssl.rb +14 -14
  30. data/lib/scanner/plugins/ssl/ssl_labs/analyze.rb +14 -13
  31. data/lib/scanner/plugins/ssl/ssl_labs/info.rb +6 -4
  32. data/lib/scanner/plugins/ssl/sweet32.rb +68 -63
  33. data/lib/scanner/ssl.rb +33 -36
  34. data/lib/scanner/ssl_labs.rb +373 -110
  35. data/lib/scanner/vuln_scan.rb +27 -0
  36. data/lib/shared/http.rb +31 -27
  37. data/lib/shared/output.rb +7 -15
  38. data/lib/shared/uri.rb +14 -14
  39. data/lib/string_ext.rb +10 -4
  40. data/lib/uri_ext.rb +1 -1
  41. data/lib/util.rb +28 -0
  42. data/lib/version.rb +3 -1
  43. data/lib/yawast.rb +12 -2
  44. data/test/data/ssl_labs_analyze_data_cam_hmhreservations_com.json +1933 -0
  45. data/test/test_scan_cms.rb +2 -2
  46. data/test/test_ssl_labs_analyze.rb +15 -0
  47. data/yawast.gemspec +8 -5
  48. metadata +75 -28
  49. data/lib/scanner/cms.rb +0 -14
  50. data/lib/scanner/php.rb +0 -19
@@ -0,0 +1,27 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Yawast
4
+ module Scanner
5
+ class VulnScan
6
+ def self.scan(uri, options, head)
7
+ puts 'Performing vulnerability scan (this will take a while)...'
8
+
9
+ # server specific checks
10
+ Yawast::Scanner::Plugins::Servers::Apache.check_all(uri)
11
+ Yawast::Scanner::Plugins::Servers::Iis.check_all(uri, head)
12
+
13
+ # checks for interesting files
14
+ Yawast::Scanner::Plugins::Http::FilePresence.check_all uri, options.files
15
+
16
+ # generic header checks
17
+ Yawast::Scanner::Plugins::Http::Generic.check_propfind(uri)
18
+ Yawast::Scanner::Plugins::Http::Generic.check_options(uri)
19
+ Yawast::Scanner::Plugins::Http::Generic.check_trace(uri)
20
+
21
+ # check for issues with the password reset form
22
+ Yawast::Scanner::Plugins::Applications::Generic::PasswordReset.setup
23
+ Yawast::Scanner::Plugins::Applications::Generic::PasswordReset.check_resp_user_enum
24
+ end
25
+ end
26
+ end
27
+ end
data/lib/shared/http.rb CHANGED
@@ -1,3 +1,5 @@
1
+ # frozen_string_literal: true
2
+
1
3
  require 'securerandom'
2
4
  require 'json'
3
5
  require 'oj'
@@ -24,7 +26,7 @@ module Yawast
24
26
  req = get_http(uri)
25
27
  req.use_ssl = uri.scheme == 'https'
26
28
  req.head(uri, get_headers)
27
- rescue
29
+ rescue # rubocop:disable Style/RescueStandardError
28
30
  # if we get here, the HEAD failed - but GET may work
29
31
  # so we silently fail back to using GET instead
30
32
  req = get_http(uri)
@@ -44,17 +46,16 @@ module Yawast
44
46
  body = res.read_body
45
47
  code = res.code
46
48
 
47
- Yawast::Shared::Output.log_json 'debug', 'http_get', uri, Oj.dump(res)
48
- rescue
49
+ Yawast::Shared::Output.log_json 'debug', 'http_get', uri, Oj.dump(res, Oj.default_options)
50
+ rescue # rubocop:disable Style/RescueStandardError, Lint/HandleExceptions
49
51
  # do nothing for now
50
52
  end
51
53
 
52
- body
53
- return {:body => body, :code => code}
54
+ {body: body, code: code}
54
55
  end
55
56
 
56
57
  def self.get(uri, headers = nil)
57
- return get_with_code(uri, headers)[:body]
58
+ get_with_code(uri, headers)[:body]
58
59
  end
59
60
 
60
61
  def self.get_json(uri)
@@ -63,9 +64,9 @@ module Yawast
63
64
  begin
64
65
  req = get_http(uri)
65
66
  req.use_ssl = uri.scheme == 'https'
66
- res = req.request_get(uri, 'User-Agent' => "YAWAST/#{Yawast::VERSION}")
67
+ res = req.request_get(uri, {'User-Agent' => "YAWAST/#{Yawast::VERSION}"})
67
68
  body = res.read_body
68
- rescue
69
+ rescue # rubocop:disable Style/RescueStandardError, Lint/HandleExceptions
69
70
  # do nothing for now
70
71
  end
71
72
 
@@ -73,15 +74,18 @@ module Yawast
73
74
  end
74
75
 
75
76
  def self.put(uri, body, headers = nil)
77
+ ret = nil
78
+
76
79
  begin
77
80
  req = get_http(uri)
78
81
  req.use_ssl = uri.scheme == 'https'
79
82
  res = req.request_put(uri, body, get_headers(headers))
80
- rescue
83
+ ret = res.read_body
84
+ rescue # rubocop:disable Style/RescueStandardError, Lint/HandleExceptions
81
85
  # do nothing for now
82
86
  end
83
87
 
84
- res.read_body
88
+ ret
85
89
  end
86
90
 
87
91
  def self.get_status_code(uri)
@@ -89,17 +93,17 @@ module Yawast
89
93
  req.use_ssl = uri.scheme == 'https'
90
94
  res = req.head(uri, get_headers)
91
95
 
92
- Yawast::Shared::Output.log_json 'debug', 'http_get_status_code', uri, Oj.dump(res)
96
+ Yawast::Shared::Output.log_json 'debug', 'http_get_status_code', uri, Oj.dump(res, Oj.default_options)
93
97
 
94
98
  res.code
95
99
  end
96
100
 
97
101
  def self.get_http(uri)
98
- if @proxy
99
- req = Net::HTTP.new(uri.host, uri.port, @proxy_host, @proxy_port)
100
- else
101
- req = Net::HTTP.new(uri.host, uri.port)
102
- end
102
+ req = if @proxy
103
+ Net::HTTP.new(uri.host, uri.port, @proxy_host, @proxy_port)
104
+ else
105
+ Net::HTTP.new(uri.host, uri.port)
106
+ end
103
107
 
104
108
  req
105
109
  end
@@ -107,27 +111,27 @@ module Yawast
107
111
  def self.check_not_found(uri, file)
108
112
  fake_uri = uri.copy
109
113
 
110
- if file
111
- fake_uri.path = "/#{SecureRandom.hex}.html"
112
- else
113
- fake_uri.path = "/#{SecureRandom.hex}/"
114
- end
114
+ fake_uri.path = if file
115
+ "/#{SecureRandom.hex}.html"
116
+ else
117
+ "/#{SecureRandom.hex}/"
118
+ end
115
119
 
116
120
  if Yawast::Shared::Http.get_status_code(fake_uri) != '404'
117
121
  # crazy 404 handling
118
122
  return false
119
123
  end
120
124
 
121
- return true
125
+ true
122
126
  end
123
127
 
124
128
  # noinspection RubyStringKeysInHashInspection
125
129
  def self.get_headers(extra_headers = nil)
126
- if @cookie == nil
127
- headers = { 'User-Agent' => HTTP_UA }
128
- else
129
- headers = { 'User-Agent' => HTTP_UA, 'Cookie' => @cookie }
130
- end
130
+ headers = if @cookie.nil?
131
+ {'User-Agent' => HTTP_UA}
132
+ else
133
+ {'User-Agent' => HTTP_UA, 'Cookie' => @cookie}
134
+ end
131
135
 
132
136
  headers.merge! extra_headers unless extra_headers.nil?
133
137
 
data/lib/shared/output.rb CHANGED
@@ -1,3 +1,5 @@
1
+ # frozen_string_literal: true
2
+
1
3
  require 'json'
2
4
  require 'base64'
3
5
 
@@ -22,9 +24,7 @@ module Yawast
22
24
  else
23
25
  # this means that it's a file, or doesn't exist
24
26
  # so, let's see if it exists, if so, warn
25
- if File.exist? @file
26
- puts 'WARNING: Output file already exists; it will be replaced.'
27
- end
27
+ puts 'WARNING: Output file already exists; it will be replaced.' if File.exist? @file
28
28
  end
29
29
 
30
30
  puts "Saving output to '#{@file}'"
@@ -56,9 +56,7 @@ module Yawast
56
56
 
57
57
  target = get_target super_parent, parent
58
58
 
59
- if target[key].nil?
60
- target[key] = []
61
- end
59
+ target[key] = [] if target[key].nil?
62
60
 
63
61
  # add value, after checking if it's already included
64
62
  target[key].push encode_utf8(value.to_s) unless target[key].include? encode_utf8(value.to_s)
@@ -98,17 +96,13 @@ module Yawast
98
96
  end
99
97
 
100
98
  unless super_parent.nil?
101
- if target[super_parent].nil?
102
- target[super_parent] = {}
103
- end
99
+ target[super_parent] = {} if target[super_parent].nil?
104
100
 
105
101
  target = target[super_parent]
106
102
  end
107
103
 
108
104
  unless parent.nil?
109
- if target[parent].nil?
110
- target[parent] = {}
111
- end
105
+ target[parent] = {} if target[parent].nil?
112
106
 
113
107
  target = target[parent]
114
108
  end
@@ -122,9 +116,7 @@ module Yawast
122
116
  escape_hash(v)
123
117
  else
124
118
  if v.is_a?(String)
125
- unless v.valid_encoding?
126
- hash[k] = Base64.encode64 v
127
- end
119
+ hash[k] = Base64.encode64 v unless v.valid_encoding?
128
120
  end
129
121
  end
130
122
  end
data/lib/shared/uri.rb CHANGED
@@ -1,39 +1,39 @@
1
+ # frozen_string_literal: true
2
+
1
3
  require 'ipaddress'
2
4
 
3
5
  module Yawast
4
6
  module Shared
5
7
  class Uri
6
8
  def self.extract_uri(url)
7
- #this might be buggy - actually, I know it is...
9
+ # this might be buggy - actually, I know it is...
8
10
  url = 'http://' + url unless url.include?('http://') || url.include?('https://')
9
11
 
10
- #make sure the path is at least a slash
12
+ # make sure the path is at least a slash
11
13
  uri = URI.parse(url)
12
14
  uri.path = '/' if uri.path == ''
13
15
 
14
- #this is buggy, but we don't handle files anyhow...
15
- #if the path doesn't end in a slash, add one.
16
- if uri.path[-1, 1] != '/'
17
- uri.path.concat '/'
18
- end
16
+ # this is buggy, but we don't handle files anyhow...
17
+ # if the path doesn't end in a slash, add one.
18
+ uri.path.concat '/' if uri.path[-1, 1] != '/'
19
19
 
20
- #see if we can resolve the host
20
+ # see if we can resolve the host
21
21
  # we don't really need it, it just serves as validation
22
22
  begin
23
23
  dns = Resolv::DNS.new
24
24
  dns.getaddress(uri.host)
25
- rescue => e
25
+ rescue => e # rubocop:disable Style/RescueStandardError
26
26
  if uri.host == 'localhost'
27
- #do nothing, in this case, we just don't care.
27
+ # do nothing, in this case, we just don't care.
28
28
  elsif IPAddress.valid? uri.host
29
- #in this case the host name is actually a IP, let it go through.
29
+ # in this case the host name is actually a IP, let it go through.
30
30
  else
31
- #we've passed all the exceptions, if we are here, it's a problem
32
- raise ArgumentError.new("Invalid URL (#{e.message})")
31
+ # we've passed all the exceptions, if we are here, it's a problem
32
+ raise ArgumentError, "Invalid URL (#{e.message})"
33
33
  end
34
34
  end
35
35
 
36
- return uri
36
+ uri
37
37
  end
38
38
  end
39
39
  end
data/lib/string_ext.rb CHANGED
@@ -1,13 +1,19 @@
1
+ # frozen_string_literal: true
2
+
1
3
  class String
2
- #see if string is numeric
4
+ # see if string is numeric
3
5
  def is_number?
4
- true if Float(self) rescue false
6
+ begin
7
+ true if Float(self)
8
+ rescue # rubocop:disable Style/RescueStandardError
9
+ false
10
+ end
5
11
  end
6
12
 
7
13
  def trim
8
- trimmed = self.strip
14
+ trimmed = strip
9
15
 
10
- if trimmed == nil
16
+ if trimmed.nil?
11
17
  self
12
18
  else
13
19
  trimmed
data/lib/uri_ext.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  module URI
2
2
  def copy
3
- URI.parse(self.to_s)
3
+ URI.parse(to_s)
4
4
  end
5
5
  end
data/lib/util.rb CHANGED
@@ -1,4 +1,7 @@
1
+ # frozen_string_literal: true
2
+
1
3
  require 'colorize'
4
+ require 'diffy'
2
5
 
3
6
  module Yawast
4
7
  class Utilities
@@ -25,5 +28,30 @@ module Yawast
25
28
  puts_msg('[I]'.green, msg)
26
29
  Yawast::Shared::Output.log_append_value 'messages', 'info', msg
27
30
  end
31
+
32
+ def self.puts_raw(msg = '')
33
+ puts msg
34
+
35
+ Yawast::Shared::Output.log_append_value 'messages', 'raw', msg if msg != ''
36
+ end
37
+
38
+ def self.prompt(msg)
39
+ puts
40
+ puts msg
41
+ print '> '
42
+ val = $stdin.gets.chomp.strip
43
+
44
+ Yawast::Shared::Output.log_append_value 'prompt', msg, val
45
+
46
+ val
47
+ end
48
+
49
+ def self.indent_text(msg)
50
+ msg.gsub!(/^/, "\t")
51
+ end
52
+
53
+ def self.diff_text(txt1, txt2)
54
+ indent_text(Diffy::Diff.new(txt1, txt2, {context: 1}).to_s(:color))
55
+ end
28
56
  end
29
57
  end
data/lib/version.rb CHANGED
@@ -1,3 +1,5 @@
1
+ # frozen_string_literal: true
2
+
1
3
  module Yawast
2
- VERSION = '0.7.0.beta1'
4
+ VERSION = '0.7.0.beta2'
3
5
  end
data/lib/yawast.rb CHANGED
@@ -1,3 +1,5 @@
1
+ # frozen_string_literal: true
2
+
1
3
  # Require all of the Ruby files in the given directory.
2
4
  #
3
5
  # path - The String relative path from here to the directory.
@@ -39,7 +41,7 @@ module Yawast
39
41
  puts ' Copyright (c) 2013-2019 Adam Caudill <adam@adamcaudill.com>'
40
42
  puts ' Support & Documentation: https://github.com/adamcaudill/yawast'
41
43
  puts " Ruby #{RUBY_VERSION}-p#{RUBY_PATCHLEVEL}; #{OpenSSL::OPENSSL_VERSION} (#{RUBY_PLATFORM})"
42
- puts " Started at #{Time.now.strftime("%Y-%m-%d %H:%M:%S %Z")}"
44
+ puts " Started at #{Time.now.strftime('%Y-%m-%d %H:%M:%S %Z')}"
43
45
 
44
46
  begin
45
47
  version = Yawast::Shared::Http.get_json(URI('https://rubygems.org/api/v1/versions/yawast/latest.json'))['version']
@@ -48,12 +50,20 @@ module Yawast
48
50
  puts " Latest Version: YAWAST v#{version} is the officially supported version, please update.".blue
49
51
  end
50
52
  rescue
51
- #we don't care, this is a best effort check
53
+ # we don't care, this is a best effort check
52
54
  end
53
55
 
54
56
  puts ''
55
57
  end
56
58
 
59
+ def self.options
60
+ @options
61
+ end
62
+
63
+ def self.options=(opts)
64
+ @options = opts
65
+ end
66
+
57
67
  STDOUT.sync = true
58
68
 
59
69
  trap 'SIGINT' do
@@ -0,0 +1,1933 @@
1
+ {
2
+ "host": "cam.hmhreservations.com",
3
+ "port": 443,
4
+ "protocol": "http",
5
+ "isPublic": false,
6
+ "status": "READY",
7
+ "startTime": 1552244041842,
8
+ "testTime": 1552244227179,
9
+ "engineVersion": "1.32.16",
10
+ "criteriaVersion": "2009p",
11
+ "endpoints": [
12
+ {
13
+ "ipAddress": "94.142.33.99",
14
+ "serverName": "ip94-142-33-99.zaindata.jo",
15
+ "statusMessage": "Ready",
16
+ "grade": "F",
17
+ "gradeTrustIgnored": "F",
18
+ "hasWarnings": false,
19
+ "isExceptional": false,
20
+ "progress": 100,
21
+ "duration": 185061,
22
+ "delegation": 1,
23
+ "details": {
24
+ "hostStartTime": 1552244041842,
25
+ "certChains": [
26
+ {
27
+ "id": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
28
+ "certIds": [
29
+ "962e0c57fa39e3ce5356d3ec1ccb6a0c2a01a353b5c46aedaaee74bf1fd655bb",
30
+ "93a07898d89b2cca166ba6f1f8a14138ce43828e491b831926bc8247d391cc72",
31
+ "9f43d52e808c20aff69e02faac205aac684e6975213d6620fac64bde5fcab4bc"
32
+ ],
33
+ "trustPaths": [
34
+ {
35
+ "certIds": [
36
+ "962e0c57fa39e3ce5356d3ec1ccb6a0c2a01a353b5c46aedaaee74bf1fd655bb",
37
+ "93a07898d89b2cca166ba6f1f8a14138ce43828e491b831926bc8247d391cc72",
38
+ "2ce1cb0bf9d2f9e102993fbe215152c3b2dd0cabde1c68e5319b839154dbb7f5"
39
+ ],
40
+ "trust": [
41
+ {
42
+ "rootStore": "Mozilla",
43
+ "isTrusted": true
44
+ }
45
+ ]
46
+ },
47
+ {
48
+ "certIds": [
49
+ "962e0c57fa39e3ce5356d3ec1ccb6a0c2a01a353b5c46aedaaee74bf1fd655bb",
50
+ "93a07898d89b2cca166ba6f1f8a14138ce43828e491b831926bc8247d391cc72",
51
+ "9f43d52e808c20aff69e02faac205aac684e6975213d6620fac64bde5fcab4bc",
52
+ "1465fa205397b876faa6f0a9958e5590e40fcc7faa4fb7c2c8677521fb5fb658"
53
+ ],
54
+ "trust": [
55
+ {
56
+ "rootStore": "Mozilla",
57
+ "isTrusted": true
58
+ }
59
+ ]
60
+ },
61
+ {
62
+ "certIds": [
63
+ "962e0c57fa39e3ce5356d3ec1ccb6a0c2a01a353b5c46aedaaee74bf1fd655bb",
64
+ "93a07898d89b2cca166ba6f1f8a14138ce43828e491b831926bc8247d391cc72",
65
+ "2ce1cb0bf9d2f9e102993fbe215152c3b2dd0cabde1c68e5319b839154dbb7f5"
66
+ ],
67
+ "trust": [
68
+ {
69
+ "rootStore": "Apple",
70
+ "isTrusted": true
71
+ }
72
+ ]
73
+ },
74
+ {
75
+ "certIds": [
76
+ "962e0c57fa39e3ce5356d3ec1ccb6a0c2a01a353b5c46aedaaee74bf1fd655bb",
77
+ "93a07898d89b2cca166ba6f1f8a14138ce43828e491b831926bc8247d391cc72",
78
+ "9f43d52e808c20aff69e02faac205aac684e6975213d6620fac64bde5fcab4bc",
79
+ "1465fa205397b876faa6f0a9958e5590e40fcc7faa4fb7c2c8677521fb5fb658"
80
+ ],
81
+ "trust": [
82
+ {
83
+ "rootStore": "Apple",
84
+ "isTrusted": true
85
+ }
86
+ ]
87
+ },
88
+ {
89
+ "certIds": [
90
+ "962e0c57fa39e3ce5356d3ec1ccb6a0c2a01a353b5c46aedaaee74bf1fd655bb",
91
+ "93a07898d89b2cca166ba6f1f8a14138ce43828e491b831926bc8247d391cc72",
92
+ "2ce1cb0bf9d2f9e102993fbe215152c3b2dd0cabde1c68e5319b839154dbb7f5"
93
+ ],
94
+ "trust": [
95
+ {
96
+ "rootStore": "Android",
97
+ "isTrusted": true
98
+ }
99
+ ]
100
+ },
101
+ {
102
+ "certIds": [
103
+ "962e0c57fa39e3ce5356d3ec1ccb6a0c2a01a353b5c46aedaaee74bf1fd655bb",
104
+ "93a07898d89b2cca166ba6f1f8a14138ce43828e491b831926bc8247d391cc72",
105
+ "9f43d52e808c20aff69e02faac205aac684e6975213d6620fac64bde5fcab4bc",
106
+ "1465fa205397b876faa6f0a9958e5590e40fcc7faa4fb7c2c8677521fb5fb658"
107
+ ],
108
+ "trust": [
109
+ {
110
+ "rootStore": "Android",
111
+ "isTrusted": true
112
+ }
113
+ ]
114
+ },
115
+ {
116
+ "certIds": [
117
+ "962e0c57fa39e3ce5356d3ec1ccb6a0c2a01a353b5c46aedaaee74bf1fd655bb",
118
+ "93a07898d89b2cca166ba6f1f8a14138ce43828e491b831926bc8247d391cc72",
119
+ "2ce1cb0bf9d2f9e102993fbe215152c3b2dd0cabde1c68e5319b839154dbb7f5"
120
+ ],
121
+ "trust": [
122
+ {
123
+ "rootStore": "Java",
124
+ "isTrusted": true
125
+ }
126
+ ]
127
+ },
128
+ {
129
+ "certIds": [
130
+ "962e0c57fa39e3ce5356d3ec1ccb6a0c2a01a353b5c46aedaaee74bf1fd655bb",
131
+ "93a07898d89b2cca166ba6f1f8a14138ce43828e491b831926bc8247d391cc72",
132
+ "9f43d52e808c20aff69e02faac205aac684e6975213d6620fac64bde5fcab4bc",
133
+ "1465fa205397b876faa6f0a9958e5590e40fcc7faa4fb7c2c8677521fb5fb658"
134
+ ],
135
+ "trust": [
136
+ {
137
+ "rootStore": "Java",
138
+ "isTrusted": true
139
+ }
140
+ ]
141
+ },
142
+ {
143
+ "certIds": [
144
+ "962e0c57fa39e3ce5356d3ec1ccb6a0c2a01a353b5c46aedaaee74bf1fd655bb",
145
+ "93a07898d89b2cca166ba6f1f8a14138ce43828e491b831926bc8247d391cc72",
146
+ "2ce1cb0bf9d2f9e102993fbe215152c3b2dd0cabde1c68e5319b839154dbb7f5"
147
+ ],
148
+ "trust": [
149
+ {
150
+ "rootStore": "Windows",
151
+ "isTrusted": true
152
+ }
153
+ ]
154
+ },
155
+ {
156
+ "certIds": [
157
+ "962e0c57fa39e3ce5356d3ec1ccb6a0c2a01a353b5c46aedaaee74bf1fd655bb",
158
+ "93a07898d89b2cca166ba6f1f8a14138ce43828e491b831926bc8247d391cc72",
159
+ "9f43d52e808c20aff69e02faac205aac684e6975213d6620fac64bde5fcab4bc",
160
+ "1465fa205397b876faa6f0a9958e5590e40fcc7faa4fb7c2c8677521fb5fb658"
161
+ ],
162
+ "trust": [
163
+ {
164
+ "rootStore": "Windows",
165
+ "isTrusted": true
166
+ }
167
+ ]
168
+ }
169
+ ],
170
+ "issues": 0,
171
+ "noSni": false
172
+ }
173
+ ],
174
+ "protocols": [
175
+ {
176
+ "id": 512,
177
+ "name": "SSL",
178
+ "version": "2.0",
179
+ "q": 0
180
+ },
181
+ {
182
+ "id": 768,
183
+ "name": "SSL",
184
+ "version": "3.0"
185
+ },
186
+ {
187
+ "id": 769,
188
+ "name": "TLS",
189
+ "version": "1.0"
190
+ },
191
+ {
192
+ "id": 771,
193
+ "name": "TLS",
194
+ "version": "1.2"
195
+ }
196
+ ],
197
+ "suites": [
198
+ {
199
+ "protocol": 512,
200
+ "list": [
201
+ {
202
+ "id": 65664,
203
+ "name": "SSL_CK_RC4_128_WITH_MD5",
204
+ "cipherStrength": 128,
205
+ "q": 0
206
+ },
207
+ {
208
+ "id": 458944,
209
+ "name": "SSL_CK_DES_192_EDE3_CBC_WITH_MD5",
210
+ "cipherStrength": 112,
211
+ "q": 0
212
+ }
213
+ ]
214
+ },
215
+ {
216
+ "protocol": 768,
217
+ "list": [
218
+ {
219
+ "id": 10,
220
+ "name": "TLS_RSA_WITH_3DES_EDE_CBC_SHA",
221
+ "cipherStrength": 112
222
+ },
223
+ {
224
+ "id": 5,
225
+ "name": "TLS_RSA_WITH_RC4_128_SHA",
226
+ "cipherStrength": 128,
227
+ "q": 0
228
+ },
229
+ {
230
+ "id": 4,
231
+ "name": "TLS_RSA_WITH_RC4_128_MD5",
232
+ "cipherStrength": 128,
233
+ "q": 0
234
+ }
235
+ ],
236
+ "preference": true
237
+ },
238
+ {
239
+ "protocol": 769,
240
+ "list": [
241
+ {
242
+ "id": 49172,
243
+ "name": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
244
+ "cipherStrength": 256,
245
+ "kxType": "ECDH",
246
+ "kxStrength": 3072,
247
+ "namedGroupBits": 256,
248
+ "namedGroupId": 23,
249
+ "namedGroupName": "secp256r1"
250
+ },
251
+ {
252
+ "id": 49171,
253
+ "name": "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
254
+ "cipherStrength": 128,
255
+ "kxType": "ECDH",
256
+ "kxStrength": 3072,
257
+ "namedGroupBits": 256,
258
+ "namedGroupId": 23,
259
+ "namedGroupName": "secp256r1"
260
+ },
261
+ {
262
+ "id": 57,
263
+ "name": "TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
264
+ "cipherStrength": 256,
265
+ "kxType": "DH",
266
+ "kxStrength": 1024,
267
+ "dhBits": 128,
268
+ "dhP": 128,
269
+ "dhG": 128,
270
+ "dhYs": 128
271
+ },
272
+ {
273
+ "id": 51,
274
+ "name": "TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
275
+ "cipherStrength": 128,
276
+ "kxType": "DH",
277
+ "kxStrength": 1024,
278
+ "dhBits": 128,
279
+ "dhP": 128,
280
+ "dhG": 128,
281
+ "dhYs": 128
282
+ },
283
+ {
284
+ "id": 53,
285
+ "name": "TLS_RSA_WITH_AES_256_CBC_SHA",
286
+ "cipherStrength": 256
287
+ },
288
+ {
289
+ "id": 47,
290
+ "name": "TLS_RSA_WITH_AES_128_CBC_SHA",
291
+ "cipherStrength": 128
292
+ },
293
+ {
294
+ "id": 10,
295
+ "name": "TLS_RSA_WITH_3DES_EDE_CBC_SHA",
296
+ "cipherStrength": 112
297
+ },
298
+ {
299
+ "id": 5,
300
+ "name": "TLS_RSA_WITH_RC4_128_SHA",
301
+ "cipherStrength": 128,
302
+ "q": 0
303
+ },
304
+ {
305
+ "id": 4,
306
+ "name": "TLS_RSA_WITH_RC4_128_MD5",
307
+ "cipherStrength": 128,
308
+ "q": 0
309
+ }
310
+ ],
311
+ "preference": true
312
+ },
313
+ {
314
+ "protocol": 771,
315
+ "list": [
316
+ {
317
+ "id": 49192,
318
+ "name": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
319
+ "cipherStrength": 256,
320
+ "kxType": "ECDH",
321
+ "kxStrength": 3072,
322
+ "namedGroupBits": 256,
323
+ "namedGroupId": 23,
324
+ "namedGroupName": "secp256r1"
325
+ },
326
+ {
327
+ "id": 49191,
328
+ "name": "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
329
+ "cipherStrength": 128,
330
+ "kxType": "ECDH",
331
+ "kxStrength": 3072,
332
+ "namedGroupBits": 256,
333
+ "namedGroupId": 23,
334
+ "namedGroupName": "secp256r1"
335
+ },
336
+ {
337
+ "id": 49172,
338
+ "name": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
339
+ "cipherStrength": 256,
340
+ "kxType": "ECDH",
341
+ "kxStrength": 3072,
342
+ "namedGroupBits": 256,
343
+ "namedGroupId": 23,
344
+ "namedGroupName": "secp256r1"
345
+ },
346
+ {
347
+ "id": 49171,
348
+ "name": "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
349
+ "cipherStrength": 128,
350
+ "kxType": "ECDH",
351
+ "kxStrength": 3072,
352
+ "namedGroupBits": 256,
353
+ "namedGroupId": 23,
354
+ "namedGroupName": "secp256r1"
355
+ },
356
+ {
357
+ "id": 159,
358
+ "name": "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384",
359
+ "cipherStrength": 256,
360
+ "kxType": "DH",
361
+ "kxStrength": 1024,
362
+ "dhBits": 128,
363
+ "dhP": 128,
364
+ "dhG": 128,
365
+ "dhYs": 128
366
+ },
367
+ {
368
+ "id": 158,
369
+ "name": "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256",
370
+ "cipherStrength": 128,
371
+ "kxType": "DH",
372
+ "kxStrength": 1024,
373
+ "dhBits": 128,
374
+ "dhP": 128,
375
+ "dhG": 128,
376
+ "dhYs": 128
377
+ },
378
+ {
379
+ "id": 57,
380
+ "name": "TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
381
+ "cipherStrength": 256,
382
+ "kxType": "DH",
383
+ "kxStrength": 1024,
384
+ "dhBits": 128,
385
+ "dhP": 128,
386
+ "dhG": 128,
387
+ "dhYs": 128
388
+ },
389
+ {
390
+ "id": 51,
391
+ "name": "TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
392
+ "cipherStrength": 128,
393
+ "kxType": "DH",
394
+ "kxStrength": 1024,
395
+ "dhBits": 128,
396
+ "dhP": 128,
397
+ "dhG": 128,
398
+ "dhYs": 128
399
+ },
400
+ {
401
+ "id": 157,
402
+ "name": "TLS_RSA_WITH_AES_256_GCM_SHA384",
403
+ "cipherStrength": 256
404
+ },
405
+ {
406
+ "id": 156,
407
+ "name": "TLS_RSA_WITH_AES_128_GCM_SHA256",
408
+ "cipherStrength": 128
409
+ },
410
+ {
411
+ "id": 61,
412
+ "name": "TLS_RSA_WITH_AES_256_CBC_SHA256",
413
+ "cipherStrength": 256
414
+ },
415
+ {
416
+ "id": 60,
417
+ "name": "TLS_RSA_WITH_AES_128_CBC_SHA256",
418
+ "cipherStrength": 128
419
+ },
420
+ {
421
+ "id": 53,
422
+ "name": "TLS_RSA_WITH_AES_256_CBC_SHA",
423
+ "cipherStrength": 256
424
+ },
425
+ {
426
+ "id": 47,
427
+ "name": "TLS_RSA_WITH_AES_128_CBC_SHA",
428
+ "cipherStrength": 128
429
+ },
430
+ {
431
+ "id": 10,
432
+ "name": "TLS_RSA_WITH_3DES_EDE_CBC_SHA",
433
+ "cipherStrength": 112
434
+ },
435
+ {
436
+ "id": 5,
437
+ "name": "TLS_RSA_WITH_RC4_128_SHA",
438
+ "cipherStrength": 128,
439
+ "q": 0
440
+ },
441
+ {
442
+ "id": 4,
443
+ "name": "TLS_RSA_WITH_RC4_128_MD5",
444
+ "cipherStrength": 128,
445
+ "q": 0
446
+ }
447
+ ],
448
+ "preference": true
449
+ }
450
+ ],
451
+ "namedGroups": {
452
+ "list": [
453
+ {
454
+ "id": 23,
455
+ "name": "secp256r1",
456
+ "bits": 256,
457
+ "namedGroupType": "EC"
458
+ },
459
+ {
460
+ "id": 24,
461
+ "name": "secp384r1",
462
+ "bits": 384,
463
+ "namedGroupType": "EC"
464
+ }
465
+ ],
466
+ "preference": true
467
+ },
468
+ "serverSignature": "Microsoft-IIS/7.5",
469
+ "prefixDelegation": false,
470
+ "nonPrefixDelegation": true,
471
+ "vulnBeast": true,
472
+ "sessionResumption": 2,
473
+ "compressionMethods": 0,
474
+ "supportsNpn": false,
475
+ "supportsAlpn": false,
476
+ "sessionTickets": 0,
477
+ "ocspStapling": true,
478
+ "staplingRevocationStatus": 2,
479
+ "sniRequired": false,
480
+ "httpStatusCode": 200,
481
+ "supportsRc4": true,
482
+ "rc4WithModern": false,
483
+ "rc4Only": false,
484
+ "forwardSecrecy": 4,
485
+ "supportsAead": true,
486
+ "protocolIntolerance": 0,
487
+ "miscIntolerance": 0,
488
+ "sims": {
489
+ "results": [
490
+ {
491
+ "client": {
492
+ "id": 56,
493
+ "name": "Android",
494
+ "version": "2.3.7",
495
+ "isReference": false
496
+ },
497
+ "errorCode": 0,
498
+ "attempts": 1,
499
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
500
+ "protocolId": 769,
501
+ "suiteId": 51,
502
+ "suiteName": "TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
503
+ "kxType": "DH",
504
+ "kxStrength": 8192,
505
+ "dhBits": 1024,
506
+ "dhP": 128,
507
+ "dhG": 128,
508
+ "dhYs": 128,
509
+ "keyAlg": "RSA",
510
+ "keySize": 2048,
511
+ "sigAlg": "SHA256withRSA"
512
+ },
513
+ {
514
+ "client": {
515
+ "id": 58,
516
+ "name": "Android",
517
+ "version": "4.0.4",
518
+ "isReference": false
519
+ },
520
+ "errorCode": 0,
521
+ "attempts": 1,
522
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
523
+ "protocolId": 769,
524
+ "suiteId": 49172,
525
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
526
+ "kxType": "ECDH",
527
+ "kxStrength": 3072,
528
+ "namedGroupBits": 256,
529
+ "namedGroupId": 23,
530
+ "namedGroupName": "secp256r1",
531
+ "keyAlg": "RSA",
532
+ "keySize": 2048,
533
+ "sigAlg": "SHA256withRSA"
534
+ },
535
+ {
536
+ "client": {
537
+ "id": 59,
538
+ "name": "Android",
539
+ "version": "4.1.1",
540
+ "isReference": false
541
+ },
542
+ "errorCode": 0,
543
+ "attempts": 1,
544
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
545
+ "protocolId": 769,
546
+ "suiteId": 49172,
547
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
548
+ "kxType": "ECDH",
549
+ "kxStrength": 3072,
550
+ "namedGroupBits": 256,
551
+ "namedGroupId": 23,
552
+ "namedGroupName": "secp256r1",
553
+ "keyAlg": "RSA",
554
+ "keySize": 2048,
555
+ "sigAlg": "SHA256withRSA"
556
+ },
557
+ {
558
+ "client": {
559
+ "id": 60,
560
+ "name": "Android",
561
+ "version": "4.2.2",
562
+ "isReference": false
563
+ },
564
+ "errorCode": 0,
565
+ "attempts": 1,
566
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
567
+ "protocolId": 769,
568
+ "suiteId": 49172,
569
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
570
+ "kxType": "ECDH",
571
+ "kxStrength": 3072,
572
+ "namedGroupBits": 256,
573
+ "namedGroupId": 23,
574
+ "namedGroupName": "secp256r1",
575
+ "keyAlg": "RSA",
576
+ "keySize": 2048,
577
+ "sigAlg": "SHA256withRSA"
578
+ },
579
+ {
580
+ "client": {
581
+ "id": 61,
582
+ "name": "Android",
583
+ "version": "4.3",
584
+ "isReference": false
585
+ },
586
+ "errorCode": 0,
587
+ "attempts": 1,
588
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
589
+ "protocolId": 769,
590
+ "suiteId": 49172,
591
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
592
+ "kxType": "ECDH",
593
+ "kxStrength": 3072,
594
+ "namedGroupBits": 256,
595
+ "namedGroupId": 23,
596
+ "namedGroupName": "secp256r1",
597
+ "keyAlg": "RSA",
598
+ "keySize": 2048,
599
+ "sigAlg": "SHA256withRSA"
600
+ },
601
+ {
602
+ "client": {
603
+ "id": 62,
604
+ "name": "Android",
605
+ "version": "4.4.2",
606
+ "isReference": false
607
+ },
608
+ "errorCode": 0,
609
+ "attempts": 1,
610
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
611
+ "protocolId": 771,
612
+ "suiteId": 49191,
613
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
614
+ "kxType": "ECDH",
615
+ "kxStrength": 3072,
616
+ "namedGroupBits": 256,
617
+ "namedGroupId": 23,
618
+ "namedGroupName": "secp256r1",
619
+ "keyAlg": "RSA",
620
+ "keySize": 2048,
621
+ "sigAlg": "SHA256withRSA"
622
+ },
623
+ {
624
+ "client": {
625
+ "id": 88,
626
+ "name": "Android",
627
+ "version": "5.0.0",
628
+ "isReference": false
629
+ },
630
+ "errorCode": 0,
631
+ "attempts": 1,
632
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
633
+ "protocolId": 771,
634
+ "suiteId": 49172,
635
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
636
+ "kxType": "ECDH",
637
+ "kxStrength": 3072,
638
+ "namedGroupBits": 256,
639
+ "namedGroupId": 23,
640
+ "namedGroupName": "secp256r1",
641
+ "keyAlg": "RSA",
642
+ "keySize": 2048,
643
+ "sigAlg": "SHA256withRSA"
644
+ },
645
+ {
646
+ "client": {
647
+ "id": 129,
648
+ "name": "Android",
649
+ "version": "6.0",
650
+ "isReference": false
651
+ },
652
+ "errorCode": 0,
653
+ "attempts": 1,
654
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
655
+ "protocolId": 771,
656
+ "suiteId": 49172,
657
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
658
+ "kxType": "ECDH",
659
+ "kxStrength": 3072,
660
+ "namedGroupBits": 256,
661
+ "namedGroupId": 23,
662
+ "namedGroupName": "secp256r1",
663
+ "keyAlg": "RSA",
664
+ "keySize": 2048,
665
+ "sigAlg": "SHA256withRSA"
666
+ },
667
+ {
668
+ "client": {
669
+ "id": 139,
670
+ "name": "Android",
671
+ "version": "7.0",
672
+ "isReference": false
673
+ },
674
+ "errorCode": 0,
675
+ "attempts": 1,
676
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
677
+ "protocolId": 771,
678
+ "suiteId": 49172,
679
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
680
+ "kxType": "ECDH",
681
+ "kxStrength": 3072,
682
+ "namedGroupBits": 256,
683
+ "namedGroupId": 23,
684
+ "namedGroupName": "secp256r1",
685
+ "keyAlg": "RSA",
686
+ "keySize": 2048,
687
+ "sigAlg": "SHA256withRSA"
688
+ },
689
+ {
690
+ "client": {
691
+ "id": 94,
692
+ "name": "Baidu",
693
+ "version": "Jan 2015",
694
+ "isReference": false
695
+ },
696
+ "errorCode": 0,
697
+ "attempts": 1,
698
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
699
+ "protocolId": 769,
700
+ "suiteId": 49172,
701
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
702
+ "kxType": "ECDH",
703
+ "kxStrength": 3072,
704
+ "namedGroupBits": 256,
705
+ "namedGroupId": 23,
706
+ "namedGroupName": "secp256r1",
707
+ "keyAlg": "RSA",
708
+ "keySize": 2048,
709
+ "sigAlg": "SHA256withRSA"
710
+ },
711
+ {
712
+ "client": {
713
+ "id": 91,
714
+ "name": "BingPreview",
715
+ "version": "Jan 2015",
716
+ "isReference": false
717
+ },
718
+ "errorCode": 0,
719
+ "attempts": 1,
720
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
721
+ "protocolId": 771,
722
+ "suiteId": 49192,
723
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
724
+ "kxType": "ECDH",
725
+ "kxStrength": 3072,
726
+ "namedGroupBits": 256,
727
+ "namedGroupId": 23,
728
+ "namedGroupName": "secp256r1",
729
+ "keyAlg": "RSA",
730
+ "keySize": 2048,
731
+ "sigAlg": "SHA256withRSA"
732
+ },
733
+ {
734
+ "client": {
735
+ "id": 136,
736
+ "name": "Chrome",
737
+ "platform": "XP SP3",
738
+ "version": "49",
739
+ "isReference": false
740
+ },
741
+ "errorCode": 0,
742
+ "attempts": 1,
743
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
744
+ "protocolId": 771,
745
+ "suiteId": 49172,
746
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
747
+ "kxType": "ECDH",
748
+ "kxStrength": 3072,
749
+ "namedGroupBits": 256,
750
+ "namedGroupId": 23,
751
+ "namedGroupName": "secp256r1",
752
+ "keyAlg": "RSA",
753
+ "keySize": 2048,
754
+ "sigAlg": "SHA256withRSA"
755
+ },
756
+ {
757
+ "client": {
758
+ "id": 152,
759
+ "name": "Chrome",
760
+ "platform": "Win 7",
761
+ "version": "69",
762
+ "isReference": true
763
+ },
764
+ "errorCode": 0,
765
+ "attempts": 1,
766
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
767
+ "protocolId": 771,
768
+ "suiteId": 49172,
769
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
770
+ "kxType": "ECDH",
771
+ "kxStrength": 3072,
772
+ "namedGroupBits": 256,
773
+ "namedGroupId": 23,
774
+ "namedGroupName": "secp256r1",
775
+ "keyAlg": "RSA",
776
+ "keySize": 2048,
777
+ "sigAlg": "SHA256withRSA"
778
+ },
779
+ {
780
+ "client": {
781
+ "id": 153,
782
+ "name": "Chrome",
783
+ "platform": "Win 10",
784
+ "version": "70",
785
+ "isReference": false
786
+ },
787
+ "errorCode": 0,
788
+ "attempts": 1,
789
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
790
+ "protocolId": 771,
791
+ "suiteId": 49172,
792
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
793
+ "kxType": "ECDH",
794
+ "kxStrength": 3072,
795
+ "namedGroupBits": 256,
796
+ "namedGroupId": 23,
797
+ "namedGroupName": "secp256r1",
798
+ "keyAlg": "RSA",
799
+ "keySize": 2048,
800
+ "sigAlg": "SHA256withRSA"
801
+ },
802
+ {
803
+ "client": {
804
+ "id": 84,
805
+ "name": "Firefox",
806
+ "platform": "Win 7",
807
+ "version": "31.3.0 ESR",
808
+ "isReference": false
809
+ },
810
+ "errorCode": 0,
811
+ "attempts": 1,
812
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
813
+ "protocolId": 771,
814
+ "suiteId": 49172,
815
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
816
+ "kxType": "ECDH",
817
+ "kxStrength": 3072,
818
+ "namedGroupBits": 256,
819
+ "namedGroupId": 23,
820
+ "namedGroupName": "secp256r1",
821
+ "keyAlg": "RSA",
822
+ "keySize": 2048,
823
+ "sigAlg": "SHA256withRSA"
824
+ },
825
+ {
826
+ "client": {
827
+ "id": 132,
828
+ "name": "Firefox",
829
+ "platform": "Win 7",
830
+ "version": "47",
831
+ "isReference": true
832
+ },
833
+ "errorCode": 0,
834
+ "attempts": 1,
835
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
836
+ "protocolId": 771,
837
+ "suiteId": 49172,
838
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
839
+ "kxType": "ECDH",
840
+ "kxStrength": 3072,
841
+ "namedGroupBits": 256,
842
+ "namedGroupId": 23,
843
+ "namedGroupName": "secp256r1",
844
+ "keyAlg": "RSA",
845
+ "keySize": 2048,
846
+ "sigAlg": "SHA256withRSA"
847
+ },
848
+ {
849
+ "client": {
850
+ "id": 137,
851
+ "name": "Firefox",
852
+ "platform": "XP SP3",
853
+ "version": "49",
854
+ "isReference": false
855
+ },
856
+ "errorCode": 0,
857
+ "attempts": 1,
858
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
859
+ "protocolId": 771,
860
+ "suiteId": 49172,
861
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
862
+ "kxType": "ECDH",
863
+ "kxStrength": 3072,
864
+ "namedGroupBits": 256,
865
+ "namedGroupId": 23,
866
+ "namedGroupName": "secp256r1",
867
+ "keyAlg": "RSA",
868
+ "keySize": 2048,
869
+ "sigAlg": "SHA256withRSA"
870
+ },
871
+ {
872
+ "client": {
873
+ "id": 151,
874
+ "name": "Firefox",
875
+ "platform": "Win 7",
876
+ "version": "62",
877
+ "isReference": true
878
+ },
879
+ "errorCode": 0,
880
+ "attempts": 1,
881
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
882
+ "protocolId": 771,
883
+ "suiteId": 49172,
884
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
885
+ "kxType": "ECDH",
886
+ "kxStrength": 3072,
887
+ "namedGroupBits": 256,
888
+ "namedGroupId": 23,
889
+ "namedGroupName": "secp256r1",
890
+ "keyAlg": "RSA",
891
+ "keySize": 2048,
892
+ "sigAlg": "SHA256withRSA"
893
+ },
894
+ {
895
+ "client": {
896
+ "id": 145,
897
+ "name": "Googlebot",
898
+ "version": "Feb 2018",
899
+ "isReference": false
900
+ },
901
+ "errorCode": 0,
902
+ "attempts": 1,
903
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
904
+ "protocolId": 771,
905
+ "suiteId": 49172,
906
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
907
+ "kxType": "ECDH",
908
+ "kxStrength": 3072,
909
+ "namedGroupBits": 256,
910
+ "namedGroupId": 23,
911
+ "namedGroupName": "secp256r1",
912
+ "keyAlg": "RSA",
913
+ "keySize": 2048,
914
+ "sigAlg": "SHA256withRSA"
915
+ },
916
+ {
917
+ "client": {
918
+ "id": 100,
919
+ "name": "IE",
920
+ "platform": "XP",
921
+ "version": "6",
922
+ "isReference": false
923
+ },
924
+ "errorCode": 0,
925
+ "attempts": 1,
926
+ "protocolId": 768,
927
+ "suiteId": 10,
928
+ "suiteName": "TLS_RSA_WITH_3DES_EDE_CBC_SHA",
929
+ "keyAlg": "RSA",
930
+ "keySize": 2048,
931
+ "sigAlg": "SHA256withRSA"
932
+ },
933
+ {
934
+ "client": {
935
+ "id": 19,
936
+ "name": "IE",
937
+ "platform": "Vista",
938
+ "version": "7",
939
+ "isReference": false
940
+ },
941
+ "errorCode": 0,
942
+ "attempts": 1,
943
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
944
+ "protocolId": 769,
945
+ "suiteId": 49172,
946
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
947
+ "kxType": "ECDH",
948
+ "kxStrength": 3072,
949
+ "namedGroupBits": 256,
950
+ "namedGroupId": 23,
951
+ "namedGroupName": "secp256r1",
952
+ "keyAlg": "RSA",
953
+ "keySize": 2048,
954
+ "sigAlg": "SHA256withRSA"
955
+ },
956
+ {
957
+ "client": {
958
+ "id": 101,
959
+ "name": "IE",
960
+ "platform": "XP",
961
+ "version": "8",
962
+ "isReference": false
963
+ },
964
+ "errorCode": 0,
965
+ "attempts": 1,
966
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
967
+ "protocolId": 769,
968
+ "suiteId": 10,
969
+ "suiteName": "TLS_RSA_WITH_3DES_EDE_CBC_SHA",
970
+ "keyAlg": "RSA",
971
+ "keySize": 2048,
972
+ "sigAlg": "SHA256withRSA"
973
+ },
974
+ {
975
+ "client": {
976
+ "id": 113,
977
+ "name": "IE",
978
+ "platform": "Win 7",
979
+ "version": "8-10",
980
+ "isReference": true
981
+ },
982
+ "errorCode": 0,
983
+ "attempts": 1,
984
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
985
+ "protocolId": 769,
986
+ "suiteId": 49172,
987
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
988
+ "kxType": "ECDH",
989
+ "kxStrength": 3072,
990
+ "namedGroupBits": 256,
991
+ "namedGroupId": 23,
992
+ "namedGroupName": "secp256r1",
993
+ "keyAlg": "RSA",
994
+ "keySize": 2048,
995
+ "sigAlg": "SHA256withRSA"
996
+ },
997
+ {
998
+ "client": {
999
+ "id": 143,
1000
+ "name": "IE",
1001
+ "platform": "Win 7",
1002
+ "version": "11",
1003
+ "isReference": true
1004
+ },
1005
+ "errorCode": 0,
1006
+ "attempts": 1,
1007
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1008
+ "protocolId": 771,
1009
+ "suiteId": 49192,
1010
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1011
+ "kxType": "ECDH",
1012
+ "kxStrength": 3072,
1013
+ "namedGroupBits": 256,
1014
+ "namedGroupId": 23,
1015
+ "namedGroupName": "secp256r1",
1016
+ "keyAlg": "RSA",
1017
+ "keySize": 2048,
1018
+ "sigAlg": "SHA256withRSA"
1019
+ },
1020
+ {
1021
+ "client": {
1022
+ "id": 134,
1023
+ "name": "IE",
1024
+ "platform": "Win 8.1",
1025
+ "version": "11",
1026
+ "isReference": true
1027
+ },
1028
+ "errorCode": 0,
1029
+ "attempts": 1,
1030
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1031
+ "protocolId": 771,
1032
+ "suiteId": 49192,
1033
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1034
+ "kxType": "ECDH",
1035
+ "kxStrength": 3072,
1036
+ "namedGroupBits": 256,
1037
+ "namedGroupId": 23,
1038
+ "namedGroupName": "secp256r1",
1039
+ "keyAlg": "RSA",
1040
+ "keySize": 2048,
1041
+ "sigAlg": "SHA256withRSA"
1042
+ },
1043
+ {
1044
+ "client": {
1045
+ "id": 64,
1046
+ "name": "IE",
1047
+ "platform": "Win Phone 8.0",
1048
+ "version": "10",
1049
+ "isReference": false
1050
+ },
1051
+ "errorCode": 0,
1052
+ "attempts": 1,
1053
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1054
+ "protocolId": 769,
1055
+ "suiteId": 49172,
1056
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
1057
+ "kxType": "ECDH",
1058
+ "kxStrength": 3072,
1059
+ "namedGroupBits": 256,
1060
+ "namedGroupId": 23,
1061
+ "namedGroupName": "secp256r1",
1062
+ "keyAlg": "RSA",
1063
+ "keySize": 2048,
1064
+ "sigAlg": "SHA256withRSA"
1065
+ },
1066
+ {
1067
+ "client": {
1068
+ "id": 65,
1069
+ "name": "IE",
1070
+ "platform": "Win Phone 8.1",
1071
+ "version": "11",
1072
+ "isReference": true
1073
+ },
1074
+ "errorCode": 0,
1075
+ "attempts": 1,
1076
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1077
+ "protocolId": 771,
1078
+ "suiteId": 49191,
1079
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
1080
+ "kxType": "ECDH",
1081
+ "kxStrength": 3072,
1082
+ "namedGroupBits": 256,
1083
+ "namedGroupId": 23,
1084
+ "namedGroupName": "secp256r1",
1085
+ "keyAlg": "RSA",
1086
+ "keySize": 2048,
1087
+ "sigAlg": "SHA256withRSA"
1088
+ },
1089
+ {
1090
+ "client": {
1091
+ "id": 106,
1092
+ "name": "IE",
1093
+ "platform": "Win Phone 8.1 Update",
1094
+ "version": "11",
1095
+ "isReference": true
1096
+ },
1097
+ "errorCode": 0,
1098
+ "attempts": 1,
1099
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1100
+ "protocolId": 771,
1101
+ "suiteId": 49192,
1102
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1103
+ "kxType": "ECDH",
1104
+ "kxStrength": 3072,
1105
+ "namedGroupBits": 256,
1106
+ "namedGroupId": 23,
1107
+ "namedGroupName": "secp256r1",
1108
+ "keyAlg": "RSA",
1109
+ "keySize": 2048,
1110
+ "sigAlg": "SHA256withRSA"
1111
+ },
1112
+ {
1113
+ "client": {
1114
+ "id": 131,
1115
+ "name": "IE",
1116
+ "platform": "Win 10",
1117
+ "version": "11",
1118
+ "isReference": true
1119
+ },
1120
+ "errorCode": 0,
1121
+ "attempts": 1,
1122
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1123
+ "protocolId": 771,
1124
+ "suiteId": 49192,
1125
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1126
+ "kxType": "ECDH",
1127
+ "kxStrength": 3072,
1128
+ "namedGroupBits": 256,
1129
+ "namedGroupId": 23,
1130
+ "namedGroupName": "secp256r1",
1131
+ "keyAlg": "RSA",
1132
+ "keySize": 2048,
1133
+ "sigAlg": "SHA256withRSA"
1134
+ },
1135
+ {
1136
+ "client": {
1137
+ "id": 144,
1138
+ "name": "Edge",
1139
+ "platform": "Win 10",
1140
+ "version": "15",
1141
+ "isReference": true
1142
+ },
1143
+ "errorCode": 0,
1144
+ "attempts": 1,
1145
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1146
+ "protocolId": 771,
1147
+ "suiteId": 49192,
1148
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1149
+ "kxType": "ECDH",
1150
+ "kxStrength": 3072,
1151
+ "namedGroupBits": 256,
1152
+ "namedGroupId": 23,
1153
+ "namedGroupName": "secp256r1",
1154
+ "keyAlg": "RSA",
1155
+ "keySize": 2048,
1156
+ "sigAlg": "SHA256withRSA"
1157
+ },
1158
+ {
1159
+ "client": {
1160
+ "id": 120,
1161
+ "name": "Edge",
1162
+ "platform": "Win Phone 10",
1163
+ "version": "13",
1164
+ "isReference": true
1165
+ },
1166
+ "errorCode": 0,
1167
+ "attempts": 1,
1168
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1169
+ "protocolId": 771,
1170
+ "suiteId": 49192,
1171
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1172
+ "kxType": "ECDH",
1173
+ "kxStrength": 3072,
1174
+ "namedGroupBits": 256,
1175
+ "namedGroupId": 23,
1176
+ "namedGroupName": "secp256r1",
1177
+ "keyAlg": "RSA",
1178
+ "keySize": 2048,
1179
+ "sigAlg": "SHA256withRSA"
1180
+ },
1181
+ {
1182
+ "client": {
1183
+ "id": 25,
1184
+ "name": "Java",
1185
+ "version": "6u45",
1186
+ "isReference": false
1187
+ },
1188
+ "errorCode": 0,
1189
+ "attempts": 1,
1190
+ "protocolId": 769,
1191
+ "suiteId": 51,
1192
+ "suiteName": "TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
1193
+ "kxType": "DH",
1194
+ "kxStrength": 8192,
1195
+ "dhBits": 1024,
1196
+ "dhP": -1,
1197
+ "dhG": -1,
1198
+ "dhYs": -1,
1199
+ "keyAlg": "RSA",
1200
+ "keySize": 2048,
1201
+ "sigAlg": "SHA256withRSA"
1202
+ },
1203
+ {
1204
+ "client": {
1205
+ "id": 26,
1206
+ "name": "Java",
1207
+ "version": "7u25",
1208
+ "isReference": false
1209
+ },
1210
+ "errorCode": 0,
1211
+ "attempts": 1,
1212
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1213
+ "protocolId": 769,
1214
+ "suiteId": 49171,
1215
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
1216
+ "kxType": "ECDH",
1217
+ "kxStrength": 3072,
1218
+ "namedGroupBits": 256,
1219
+ "namedGroupId": 23,
1220
+ "namedGroupName": "secp256r1",
1221
+ "keyAlg": "RSA",
1222
+ "keySize": 2048,
1223
+ "sigAlg": "SHA256withRSA"
1224
+ },
1225
+ {
1226
+ "client": {
1227
+ "id": 147,
1228
+ "name": "Java",
1229
+ "version": "8u161",
1230
+ "isReference": false
1231
+ },
1232
+ "errorCode": 0,
1233
+ "attempts": 1,
1234
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1235
+ "protocolId": 771,
1236
+ "suiteId": 49192,
1237
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1238
+ "kxType": "ECDH",
1239
+ "kxStrength": 3072,
1240
+ "namedGroupBits": 256,
1241
+ "namedGroupId": 23,
1242
+ "namedGroupName": "secp256r1",
1243
+ "keyAlg": "RSA",
1244
+ "keySize": 2048,
1245
+ "sigAlg": "SHA256withRSA"
1246
+ },
1247
+ {
1248
+ "client": {
1249
+ "id": 27,
1250
+ "name": "OpenSSL",
1251
+ "version": "0.9.8y",
1252
+ "isReference": false
1253
+ },
1254
+ "errorCode": 0,
1255
+ "attempts": 1,
1256
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1257
+ "protocolId": 769,
1258
+ "suiteId": 57,
1259
+ "suiteName": "TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
1260
+ "kxType": "DH",
1261
+ "kxStrength": 8192,
1262
+ "dhBits": 1024,
1263
+ "dhP": 128,
1264
+ "dhG": 128,
1265
+ "dhYs": 128,
1266
+ "keyAlg": "RSA",
1267
+ "keySize": 2048,
1268
+ "sigAlg": "SHA256withRSA"
1269
+ },
1270
+ {
1271
+ "client": {
1272
+ "id": 99,
1273
+ "name": "OpenSSL",
1274
+ "version": "1.0.1l",
1275
+ "isReference": true
1276
+ },
1277
+ "errorCode": 0,
1278
+ "attempts": 1,
1279
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1280
+ "protocolId": 771,
1281
+ "suiteId": 49192,
1282
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1283
+ "kxType": "ECDH",
1284
+ "kxStrength": 3072,
1285
+ "namedGroupBits": 256,
1286
+ "namedGroupId": 23,
1287
+ "namedGroupName": "secp256r1",
1288
+ "keyAlg": "RSA",
1289
+ "keySize": 2048,
1290
+ "sigAlg": "SHA256withRSA"
1291
+ },
1292
+ {
1293
+ "client": {
1294
+ "id": 121,
1295
+ "name": "OpenSSL",
1296
+ "version": "1.0.2e",
1297
+ "isReference": true
1298
+ },
1299
+ "errorCode": 0,
1300
+ "attempts": 1,
1301
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1302
+ "protocolId": 771,
1303
+ "suiteId": 49192,
1304
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1305
+ "kxType": "ECDH",
1306
+ "kxStrength": 3072,
1307
+ "namedGroupBits": 256,
1308
+ "namedGroupId": 23,
1309
+ "namedGroupName": "secp256r1",
1310
+ "keyAlg": "RSA",
1311
+ "keySize": 2048,
1312
+ "sigAlg": "SHA256withRSA"
1313
+ },
1314
+ {
1315
+ "client": {
1316
+ "id": 32,
1317
+ "name": "Safari",
1318
+ "platform": "OS X 10.6.8",
1319
+ "version": "5.1.9",
1320
+ "isReference": false
1321
+ },
1322
+ "errorCode": 0,
1323
+ "attempts": 1,
1324
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1325
+ "protocolId": 769,
1326
+ "suiteId": 49172,
1327
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
1328
+ "kxType": "ECDH",
1329
+ "kxStrength": 3072,
1330
+ "namedGroupBits": 256,
1331
+ "namedGroupId": 23,
1332
+ "namedGroupName": "secp256r1",
1333
+ "keyAlg": "RSA",
1334
+ "keySize": 2048,
1335
+ "sigAlg": "SHA256withRSA"
1336
+ },
1337
+ {
1338
+ "client": {
1339
+ "id": 33,
1340
+ "name": "Safari",
1341
+ "platform": "iOS 6.0.1",
1342
+ "version": "6",
1343
+ "isReference": false
1344
+ },
1345
+ "errorCode": 0,
1346
+ "attempts": 1,
1347
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1348
+ "protocolId": 771,
1349
+ "suiteId": 49192,
1350
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1351
+ "kxType": "ECDH",
1352
+ "kxStrength": 3072,
1353
+ "namedGroupBits": 256,
1354
+ "namedGroupId": 23,
1355
+ "namedGroupName": "secp256r1",
1356
+ "keyAlg": "RSA",
1357
+ "keySize": 2048,
1358
+ "sigAlg": "SHA256withRSA"
1359
+ },
1360
+ {
1361
+ "client": {
1362
+ "id": 34,
1363
+ "name": "Safari",
1364
+ "platform": "OS X 10.8.4",
1365
+ "version": "6.0.4",
1366
+ "isReference": true
1367
+ },
1368
+ "errorCode": 0,
1369
+ "attempts": 1,
1370
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1371
+ "protocolId": 769,
1372
+ "suiteId": 49172,
1373
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
1374
+ "kxType": "ECDH",
1375
+ "kxStrength": 3072,
1376
+ "namedGroupBits": 256,
1377
+ "namedGroupId": 23,
1378
+ "namedGroupName": "secp256r1",
1379
+ "keyAlg": "RSA",
1380
+ "keySize": 2048,
1381
+ "sigAlg": "SHA256withRSA"
1382
+ },
1383
+ {
1384
+ "client": {
1385
+ "id": 63,
1386
+ "name": "Safari",
1387
+ "platform": "iOS 7.1",
1388
+ "version": "7",
1389
+ "isReference": true
1390
+ },
1391
+ "errorCode": 0,
1392
+ "attempts": 1,
1393
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1394
+ "protocolId": 771,
1395
+ "suiteId": 49192,
1396
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1397
+ "kxType": "ECDH",
1398
+ "kxStrength": 3072,
1399
+ "namedGroupBits": 256,
1400
+ "namedGroupId": 23,
1401
+ "namedGroupName": "secp256r1",
1402
+ "keyAlg": "RSA",
1403
+ "keySize": 2048,
1404
+ "sigAlg": "SHA256withRSA"
1405
+ },
1406
+ {
1407
+ "client": {
1408
+ "id": 35,
1409
+ "name": "Safari",
1410
+ "platform": "OS X 10.9",
1411
+ "version": "7",
1412
+ "isReference": true
1413
+ },
1414
+ "errorCode": 0,
1415
+ "attempts": 1,
1416
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1417
+ "protocolId": 771,
1418
+ "suiteId": 49192,
1419
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1420
+ "kxType": "ECDH",
1421
+ "kxStrength": 3072,
1422
+ "namedGroupBits": 256,
1423
+ "namedGroupId": 23,
1424
+ "namedGroupName": "secp256r1",
1425
+ "keyAlg": "RSA",
1426
+ "keySize": 2048,
1427
+ "sigAlg": "SHA256withRSA"
1428
+ },
1429
+ {
1430
+ "client": {
1431
+ "id": 85,
1432
+ "name": "Safari",
1433
+ "platform": "iOS 8.4",
1434
+ "version": "8",
1435
+ "isReference": true
1436
+ },
1437
+ "errorCode": 0,
1438
+ "attempts": 1,
1439
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1440
+ "protocolId": 771,
1441
+ "suiteId": 49192,
1442
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1443
+ "kxType": "ECDH",
1444
+ "kxStrength": 3072,
1445
+ "namedGroupBits": 256,
1446
+ "namedGroupId": 23,
1447
+ "namedGroupName": "secp256r1",
1448
+ "keyAlg": "RSA",
1449
+ "keySize": 2048,
1450
+ "sigAlg": "SHA256withRSA"
1451
+ },
1452
+ {
1453
+ "client": {
1454
+ "id": 87,
1455
+ "name": "Safari",
1456
+ "platform": "OS X 10.10",
1457
+ "version": "8",
1458
+ "isReference": true
1459
+ },
1460
+ "errorCode": 0,
1461
+ "attempts": 1,
1462
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1463
+ "protocolId": 771,
1464
+ "suiteId": 49192,
1465
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1466
+ "kxType": "ECDH",
1467
+ "kxStrength": 3072,
1468
+ "namedGroupBits": 256,
1469
+ "namedGroupId": 23,
1470
+ "namedGroupName": "secp256r1",
1471
+ "keyAlg": "RSA",
1472
+ "keySize": 2048,
1473
+ "sigAlg": "SHA256withRSA"
1474
+ },
1475
+ {
1476
+ "client": {
1477
+ "id": 114,
1478
+ "name": "Safari",
1479
+ "platform": "iOS 9",
1480
+ "version": "9",
1481
+ "isReference": true
1482
+ },
1483
+ "errorCode": 0,
1484
+ "attempts": 1,
1485
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1486
+ "protocolId": 771,
1487
+ "suiteId": 49192,
1488
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1489
+ "kxType": "ECDH",
1490
+ "kxStrength": 3072,
1491
+ "namedGroupBits": 256,
1492
+ "namedGroupId": 23,
1493
+ "namedGroupName": "secp256r1",
1494
+ "keyAlg": "RSA",
1495
+ "keySize": 2048,
1496
+ "sigAlg": "SHA256withRSA"
1497
+ },
1498
+ {
1499
+ "client": {
1500
+ "id": 111,
1501
+ "name": "Safari",
1502
+ "platform": "OS X 10.11",
1503
+ "version": "9",
1504
+ "isReference": true
1505
+ },
1506
+ "errorCode": 0,
1507
+ "attempts": 1,
1508
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1509
+ "protocolId": 771,
1510
+ "suiteId": 49192,
1511
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1512
+ "kxType": "ECDH",
1513
+ "kxStrength": 3072,
1514
+ "namedGroupBits": 256,
1515
+ "namedGroupId": 23,
1516
+ "namedGroupName": "secp256r1",
1517
+ "keyAlg": "RSA",
1518
+ "keySize": 2048,
1519
+ "sigAlg": "SHA256withRSA"
1520
+ },
1521
+ {
1522
+ "client": {
1523
+ "id": 140,
1524
+ "name": "Safari",
1525
+ "platform": "iOS 10",
1526
+ "version": "10",
1527
+ "isReference": true
1528
+ },
1529
+ "errorCode": 0,
1530
+ "attempts": 1,
1531
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1532
+ "protocolId": 771,
1533
+ "suiteId": 49192,
1534
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1535
+ "kxType": "ECDH",
1536
+ "kxStrength": 3072,
1537
+ "namedGroupBits": 256,
1538
+ "namedGroupId": 23,
1539
+ "namedGroupName": "secp256r1",
1540
+ "keyAlg": "RSA",
1541
+ "keySize": 2048,
1542
+ "sigAlg": "SHA256withRSA"
1543
+ },
1544
+ {
1545
+ "client": {
1546
+ "id": 138,
1547
+ "name": "Safari",
1548
+ "platform": "OS X 10.12",
1549
+ "version": "10",
1550
+ "isReference": true
1551
+ },
1552
+ "errorCode": 0,
1553
+ "attempts": 1,
1554
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1555
+ "protocolId": 771,
1556
+ "suiteId": 49192,
1557
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1558
+ "kxType": "ECDH",
1559
+ "kxStrength": 3072,
1560
+ "namedGroupBits": 256,
1561
+ "namedGroupId": 23,
1562
+ "namedGroupName": "secp256r1",
1563
+ "keyAlg": "RSA",
1564
+ "keySize": 2048,
1565
+ "sigAlg": "SHA256withRSA"
1566
+ },
1567
+ {
1568
+ "client": {
1569
+ "id": 112,
1570
+ "name": "Apple ATS",
1571
+ "platform": "iOS 9",
1572
+ "version": "9",
1573
+ "isReference": true
1574
+ },
1575
+ "errorCode": 0,
1576
+ "attempts": 1,
1577
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1578
+ "protocolId": 771,
1579
+ "suiteId": 49192,
1580
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1581
+ "kxType": "ECDH",
1582
+ "kxStrength": 3072,
1583
+ "namedGroupBits": 256,
1584
+ "namedGroupId": 23,
1585
+ "namedGroupName": "secp256r1",
1586
+ "keyAlg": "RSA",
1587
+ "keySize": 2048,
1588
+ "sigAlg": "SHA256withRSA"
1589
+ },
1590
+ {
1591
+ "client": {
1592
+ "id": 92,
1593
+ "name": "Yahoo Slurp",
1594
+ "version": "Jan 2015",
1595
+ "isReference": false
1596
+ },
1597
+ "errorCode": 0,
1598
+ "attempts": 1,
1599
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1600
+ "protocolId": 771,
1601
+ "suiteId": 49192,
1602
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1603
+ "kxType": "ECDH",
1604
+ "kxStrength": 3072,
1605
+ "namedGroupBits": 256,
1606
+ "namedGroupId": 23,
1607
+ "namedGroupName": "secp256r1",
1608
+ "keyAlg": "RSA",
1609
+ "keySize": 2048,
1610
+ "sigAlg": "SHA256withRSA"
1611
+ },
1612
+ {
1613
+ "client": {
1614
+ "id": 93,
1615
+ "name": "YandexBot",
1616
+ "version": "Jan 2015",
1617
+ "isReference": false
1618
+ },
1619
+ "errorCode": 0,
1620
+ "attempts": 1,
1621
+ "certChainId": "2fd048b086e0cd5b1e9ec7689498ba13dd19161fdbd5bfe51205b9bdeccd467d",
1622
+ "protocolId": 771,
1623
+ "suiteId": 49192,
1624
+ "suiteName": "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
1625
+ "kxType": "ECDH",
1626
+ "kxStrength": 3072,
1627
+ "namedGroupBits": 256,
1628
+ "namedGroupId": 23,
1629
+ "namedGroupName": "secp256r1",
1630
+ "keyAlg": "RSA",
1631
+ "keySize": 2048,
1632
+ "sigAlg": "SHA256withRSA"
1633
+ }
1634
+ ]
1635
+ },
1636
+ "heartbleed": false,
1637
+ "heartbeat": false,
1638
+ "openSslCcs": 1,
1639
+ "openSSLLuckyMinus20": 1,
1640
+ "ticketbleed": 1,
1641
+ "bleichenbacher": 1,
1642
+ "poodle": true,
1643
+ "poodleTls": 1,
1644
+ "fallbackScsv": false,
1645
+ "freak": false,
1646
+ "hasSct": 1,
1647
+ "dhPrimes": [
1648
+ "ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74020bbea63b139b22514a08798e3404ddef9519b3cd3a431b302b0a6df25f14374fe1356d6d51c245e485b576625e7ec6f44c42e9a637ed6b0bff5cb6f406b7edee386bfb5a899fa5ae9f24117c4b1fe649286651ece65381ffffffffffffffff"
1649
+ ],
1650
+ "dhUsesKnownPrimes": 2,
1651
+ "dhYsReuse": true,
1652
+ "ecdhParameterReuse": true,
1653
+ "logjam": false,
1654
+ "hstsPolicy": {
1655
+ "LONG_MAX_AGE": 15552000,
1656
+ "status": "absent",
1657
+ "directives": {}
1658
+ },
1659
+ "hstsPreloads": [
1660
+ {
1661
+ "source": "Chrome",
1662
+ "hostname": "cam.hmhreservations.com",
1663
+ "status": "absent",
1664
+ "sourceTime": 1552241761120
1665
+ },
1666
+ {
1667
+ "source": "Edge",
1668
+ "hostname": "cam.hmhreservations.com",
1669
+ "status": "absent",
1670
+ "sourceTime": 1552241101296
1671
+ },
1672
+ {
1673
+ "source": "Firefox",
1674
+ "hostname": "cam.hmhreservations.com",
1675
+ "status": "absent",
1676
+ "sourceTime": 1552241101296
1677
+ },
1678
+ {
1679
+ "source": "IE",
1680
+ "hostname": "cam.hmhreservations.com",
1681
+ "status": "absent",
1682
+ "sourceTime": 1552241101296
1683
+ }
1684
+ ],
1685
+ "hpkpPolicy": {
1686
+ "status": "absent",
1687
+ "pins": [],
1688
+ "matchedPins": [],
1689
+ "directives": []
1690
+ },
1691
+ "hpkpRoPolicy": {
1692
+ "status": "absent",
1693
+ "pins": [],
1694
+ "matchedPins": [],
1695
+ "directives": []
1696
+ },
1697
+ "staticPkpPolicy": {
1698
+ "status": "absent",
1699
+ "pins": [],
1700
+ "matchedPins": [],
1701
+ "forbiddenPins": [],
1702
+ "matchedForbiddenPins": []
1703
+ },
1704
+ "httpTransactions": [
1705
+ {
1706
+ "requestUrl": "https://cam.hmhreservations.com/",
1707
+ "statusCode": 200,
1708
+ "requestLine": "GET / HTTP/1.1",
1709
+ "requestHeaders": [
1710
+ "Host: cam.hmhreservations.com",
1711
+ "User-Agent: SSL Labs (https://www.ssllabs.com/about/assessment.html); on behalf of XXX.XXX.XXX.XXX",
1712
+ "Accept: */*",
1713
+ "Connection: Close"
1714
+ ],
1715
+ "responseLine": "HTTP/1.1 200 OK",
1716
+ "responseHeadersRaw": [
1717
+ "Content-Type: text/html",
1718
+ "Last-Modified: Tue, 30 Jan 2018 12:06:52 GMT",
1719
+ "Accept-Ranges: bytes",
1720
+ "ETag: \"65652d0c299d31:0\"",
1721
+ "Server: Microsoft-IIS/7.5",
1722
+ "Date: Sun, 10 Mar 2019 18:55:43 GMT",
1723
+ "Connection: close",
1724
+ "Content-Length: 689"
1725
+ ],
1726
+ "responseHeaders": [
1727
+ {
1728
+ "name": "Content-Type",
1729
+ "value": "text/html"
1730
+ },
1731
+ {
1732
+ "name": "Last-Modified",
1733
+ "value": "Tue, 30 Jan 2018 12:06:52 GMT"
1734
+ },
1735
+ {
1736
+ "name": "Accept-Ranges",
1737
+ "value": "bytes"
1738
+ },
1739
+ {
1740
+ "name": "ETag",
1741
+ "value": "\"65652d0c299d31:0\""
1742
+ },
1743
+ {
1744
+ "name": "Server",
1745
+ "value": "Microsoft-IIS/7.5"
1746
+ },
1747
+ {
1748
+ "name": "Date",
1749
+ "value": "Sun, 10 Mar 2019 18:55:43 GMT"
1750
+ },
1751
+ {
1752
+ "name": "Connection",
1753
+ "value": "close"
1754
+ },
1755
+ {
1756
+ "name": "Content-Length",
1757
+ "value": "689"
1758
+ }
1759
+ ],
1760
+ "fragileServer": false
1761
+ }
1762
+ ],
1763
+ "drownHosts": [],
1764
+ "drownErrors": false,
1765
+ "drownVulnerable": false
1766
+ }
1767
+ }
1768
+ ],
1769
+ "certs": [
1770
+ {
1771
+ "id": "962e0c57fa39e3ce5356d3ec1ccb6a0c2a01a353b5c46aedaaee74bf1fd655bb",
1772
+ "subject": "CN=*.hmhreservations.com, OU=Domain Control Validated",
1773
+ "serialNumber": "4dfecc3cab75766d",
1774
+ "commonNames": [
1775
+ "*.hmhreservations.com"
1776
+ ],
1777
+ "altNames": [
1778
+ "*.hmhreservations.com",
1779
+ "hmhreservations.com"
1780
+ ],
1781
+ "notBefore": 1542015738000,
1782
+ "notAfter": 1578737221000,
1783
+ "issuerSubject": "CN=Starfield Secure Certificate Authority - G2, OU=http://certs.starfieldtech.com/repository/, O=\"Starfield Technologies, Inc.\", L=Scottsdale, ST=Arizona, C=US",
1784
+ "sigAlg": "SHA256withRSA",
1785
+ "revocationInfo": 3,
1786
+ "crlURIs": [
1787
+ "http://crl.starfieldtech.com/sfig2s1-134.crl"
1788
+ ],
1789
+ "ocspURIs": [
1790
+ "http://ocsp.starfieldtech.com/"
1791
+ ],
1792
+ "revocationStatus": 2,
1793
+ "crlRevocationStatus": 2,
1794
+ "ocspRevocationStatus": 2,
1795
+ "dnsCaa": false,
1796
+ "mustStaple": false,
1797
+ "sgc": 0,
1798
+ "validationType": "D",
1799
+ "issues": 0,
1800
+ "sct": true,
1801
+ "sha1Hash": "42781bc1b691b6f04de4e6106b08e235fe0579a9",
1802
+ "sha256Hash": "962e0c57fa39e3ce5356d3ec1ccb6a0c2a01a353b5c46aedaaee74bf1fd655bb",
1803
+ "pinSha256": "TUzLMgHxlsmfX4W4ivMCB3kixBIz3Pt28JhCeaN9ExI=",
1804
+ "keyAlg": "RSA",
1805
+ "keySize": 2048,
1806
+ "keyStrength": 2048,
1807
+ "keyKnownDebianInsecure": false,
1808
+ "raw": "-----BEGIN CERTIFICATE-----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\r\nkNK+CiTH\r\n-----END CERTIFICATE-----\n"
1809
+ },
1810
+ {
1811
+ "id": "93a07898d89b2cca166ba6f1f8a14138ce43828e491b831926bc8247d391cc72",
1812
+ "subject": "CN=Starfield Secure Certificate Authority - G2, OU=http://certs.starfieldtech.com/repository/, O=\"Starfield Technologies, Inc.\", L=Scottsdale, ST=Arizona, C=US",
1813
+ "serialNumber": "07",
1814
+ "commonNames": [
1815
+ "Starfield Secure Certificate Authority - G2"
1816
+ ],
1817
+ "notBefore": 1304406000000,
1818
+ "notAfter": 1935558000000,
1819
+ "issuerSubject": "CN=Starfield Root Certificate Authority - G2, O=\"Starfield Technologies, Inc.\", L=Scottsdale, ST=Arizona, C=US",
1820
+ "sigAlg": "SHA256withRSA",
1821
+ "revocationInfo": 3,
1822
+ "crlURIs": [
1823
+ "http://crl.starfieldtech.com/sfroot-g2.crl"
1824
+ ],
1825
+ "ocspURIs": [
1826
+ "http://ocsp.starfieldtech.com/"
1827
+ ],
1828
+ "revocationStatus": 2,
1829
+ "crlRevocationStatus": 2,
1830
+ "ocspRevocationStatus": 2,
1831
+ "mustStaple": false,
1832
+ "sgc": 0,
1833
+ "issues": 0,
1834
+ "sct": false,
1835
+ "sha1Hash": "7edc376dcfd45e6ddf082c160df6ac21835b95d4",
1836
+ "sha256Hash": "93a07898d89b2cca166ba6f1f8a14138ce43828e491b831926bc8247d391cc72",
1837
+ "pinSha256": "8kGWrpQHhmc0jwLo43RYo6bmqtHgsNxhARjM5yFCe/w=",
1838
+ "keyAlg": "RSA",
1839
+ "keySize": 2048,
1840
+ "keyStrength": 2048,
1841
+ "keyKnownDebianInsecure": false,
1842
+ "raw": "-----BEGIN CERTIFICATE-----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\r\ngc0T0U7EPMpODdIm8QC3tKai4W56gf0wrHofx1l7\r\n-----END CERTIFICATE-----\n"
1843
+ },
1844
+ {
1845
+ "id": "9f43d52e808c20aff69e02faac205aac684e6975213d6620fac64bde5fcab4bc",
1846
+ "subject": "CN=Starfield Root Certificate Authority - G2, O=\"Starfield Technologies, Inc.\", L=Scottsdale, ST=Arizona, C=US",
1847
+ "serialNumber": "391484",
1848
+ "commonNames": [
1849
+ "Starfield Root Certificate Authority - G2"
1850
+ ],
1851
+ "notBefore": 1388559600000,
1852
+ "notAfter": 1937890800000,
1853
+ "issuerSubject": "OU=Starfield Class 2 Certification Authority, O=\"Starfield Technologies, Inc.\", C=US",
1854
+ "sigAlg": "SHA256withRSA",
1855
+ "revocationInfo": 3,
1856
+ "crlURIs": [
1857
+ "http://crl.starfieldtech.com/sfroot.crl"
1858
+ ],
1859
+ "ocspURIs": [
1860
+ "http://ocsp.starfieldtech.com/"
1861
+ ],
1862
+ "revocationStatus": 2,
1863
+ "crlRevocationStatus": 2,
1864
+ "ocspRevocationStatus": 2,
1865
+ "mustStaple": false,
1866
+ "sgc": 0,
1867
+ "issues": 0,
1868
+ "sct": false,
1869
+ "sha1Hash": "9565b778c8a50eb4fefd45c8a658dde2411ead0a",
1870
+ "sha256Hash": "9f43d52e808c20aff69e02faac205aac684e6975213d6620fac64bde5fcab4bc",
1871
+ "pinSha256": "gI1os/q0iEpflxrOfRBVDXqVoWN3Tz7Dav/7IT++THQ=",
1872
+ "keyAlg": "RSA",
1873
+ "keySize": 2048,
1874
+ "keyStrength": 2048,
1875
+ "keyKnownDebianInsecure": false,
1876
+ "raw": "-----BEGIN CERTIFICATE-----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\r\n-----END CERTIFICATE-----\n"
1877
+ },
1878
+ {
1879
+ "id": "2ce1cb0bf9d2f9e102993fbe215152c3b2dd0cabde1c68e5319b839154dbb7f5",
1880
+ "subject": "CN=Starfield Root Certificate Authority - G2, O=\"Starfield Technologies, Inc.\", L=Scottsdale, ST=Arizona, C=US",
1881
+ "serialNumber": "00",
1882
+ "commonNames": [
1883
+ "Starfield Root Certificate Authority - G2"
1884
+ ],
1885
+ "notBefore": 1251763200000,
1886
+ "notAfter": 2145916799000,
1887
+ "issuerSubject": "CN=Starfield Root Certificate Authority - G2, O=\"Starfield Technologies, Inc.\", L=Scottsdale, ST=Arizona, C=US",
1888
+ "sigAlg": "SHA256withRSA",
1889
+ "revocationInfo": 0,
1890
+ "revocationStatus": 0,
1891
+ "crlRevocationStatus": 0,
1892
+ "ocspRevocationStatus": 0,
1893
+ "mustStaple": false,
1894
+ "sgc": 0,
1895
+ "issues": 0,
1896
+ "sct": false,
1897
+ "sha1Hash": "b51c067cee2b0c3df855ab2d92f4fe39d4e70f0e",
1898
+ "sha256Hash": "2ce1cb0bf9d2f9e102993fbe215152c3b2dd0cabde1c68e5319b839154dbb7f5",
1899
+ "pinSha256": "gI1os/q0iEpflxrOfRBVDXqVoWN3Tz7Dav/7IT++THQ=",
1900
+ "keyAlg": "RSA",
1901
+ "keySize": 2048,
1902
+ "keyStrength": 2048,
1903
+ "keyKnownDebianInsecure": false,
1904
+ "raw": "-----BEGIN CERTIFICATE-----\nMIID3TCCAsWgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxEDAOBgNVBAgT\r\nB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoTHFN0YXJmaWVsZCBUZWNobm9s\r\nb2dpZXMsIEluYy4xMjAwBgNVBAMTKVN0YXJmaWVsZCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0\r\neSAtIEcyMB4XDTA5MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgY8xCzAJBgNVBAYTAlVTMRAw\r\nDgYDVQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFyZmllbGQg\r\nVGVjaG5vbG9naWVzLCBJbmMuMTIwMAYDVQQDEylTdGFyZmllbGQgUm9vdCBDZXJ0aWZpY2F0ZSBB\r\ndXRob3JpdHkgLSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL3twQP89o/8ArFv\r\nW59I2Z154qK3A2FWGMNHttfKPTUuiUP3oWmb3ooa/RMgnLRJdzIpVv257IzdIvpy3Cdhl+72WoTs\r\nbhm5iSzchFvVdPtrX8WJpRBSiUZV9Lh1HOZ/5FSuS/hVclcCGfgXcVnrHigHdMWdSL5stPSksPNk\r\nN3mSwOxGXn/hbVNMYq/NHwtjuzqd+/x5AJhhdM8mgkBj87JyahkNmcrUDnXMN/uLicFZ8WJ/X7Nf\r\nZTD4p7dNdloedl40wOiWVpmKs/B/pM293DIxfJHP4F8R+GuqSVzRmZTRouNjWwl2tVZi4Ut0HZbU\r\nJtQIBFnQmA4O5t78w+wfkPECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC\r\nAQYwHQYDVR0OBBYEFHwMMh+n2TB/xH1oo2Kooc6rB1snMA0GCSqGSIb3DQEBCwUAA4IBAQARWfol\r\nTwNvlJk7mh+ChTnUdgWUXuEok21iXQnCoKjUsHU48TRqneSfioYmUeYs0cYtbpUgSpIB7LiKZ3sx\r\n4mcujJUDJi5DnUox9g61DLu34jd/IroAow57UvtruzvE03lRTs2Q9GcHGcg8RnoNAX3FWOdt5oUw\r\nF5okxBDgBPfg8n/Uqgr/Qh037ZTlZFkSIHc40zI+OIF1lnP6aI+xy84fxez6nH7PfrHxBy22/L/K\r\npL/QlwVKvOoYKAKQvVR4CSFx09F9HdkWsKlhPdAKACL8x3vLCWRFCztAgfd9fDL1mMpYjn0q7pBZ\r\nc2T5NnReJaH1ZgUufzkVqSr7UIuOhWn0\r\n-----END CERTIFICATE-----\n"
1905
+ },
1906
+ {
1907
+ "id": "1465fa205397b876faa6f0a9958e5590e40fcc7faa4fb7c2c8677521fb5fb658",
1908
+ "subject": "OU=Starfield Class 2 Certification Authority, O=\"Starfield Technologies, Inc.\", C=US",
1909
+ "serialNumber": "00",
1910
+ "commonNames": [],
1911
+ "notBefore": 1088530756000,
1912
+ "notAfter": 2035215556000,
1913
+ "issuerSubject": "OU=Starfield Class 2 Certification Authority, O=\"Starfield Technologies, Inc.\", C=US",
1914
+ "sigAlg": "SHA1withRSA",
1915
+ "revocationInfo": 0,
1916
+ "revocationStatus": 0,
1917
+ "crlRevocationStatus": 0,
1918
+ "ocspRevocationStatus": 0,
1919
+ "mustStaple": false,
1920
+ "sgc": 0,
1921
+ "issues": 256,
1922
+ "sct": false,
1923
+ "sha1Hash": "ad7e1c28b064ef8f6003402014c3d0e3370eb58a",
1924
+ "sha256Hash": "1465fa205397b876faa6f0a9958e5590e40fcc7faa4fb7c2c8677521fb5fb658",
1925
+ "pinSha256": "FfFKxFycfaIz00eRZOgTf+Ne4POK6FgYPwhBDqgqxLQ=",
1926
+ "keyAlg": "RSA",
1927
+ "keySize": 2048,
1928
+ "keyStrength": 2048,
1929
+ "keyKnownDebianInsecure": false,
1930
+ "raw": "-----BEGIN CERTIFICATE-----\nMIIEDzCCAvegAwIBAgIBADANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJVUzElMCMGA1UEChMc\r\nU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMpU3RhcmZpZWxkIENsYXNzIDIg\r\nQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQwNjI5MTczOTE2WhcNMzQwNjI5MTczOTE2WjBo\r\nMQswCQYDVQQGEwJVUzElMCMGA1UEChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAG\r\nA1UECxMpU3RhcmZpZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggEgMA0GCSqG\r\nSIb3DQEBAQUAA4IBDQAwggEIAoIBAQC3Msj+6XGmBIWtDBFk385N78gDGIc/oav7PKaf8MOh2tTY\r\nbitTkPskpD6E8J7oX+zlJ0T1KKY/e97gKvDIr1MvnsoFAZMej2YcOadN+lq2cwQlZut3f+dZxkqZ\r\nJRRU6ybH838Z1TBwj6+wRir/resp7defqgSHo9T5iaU0X9tDkYI22WY8sbi5gv2cOj4QyDvvBmVm\r\nepsZGD3/cVE8MC5fvj13c7JdBmzDI1aaK4UmkhynArPkPw2vCHmCuDY96pzTNbO8acr1zJ3o/WSN\r\nF4Azbl5KXZnJHoe0nRrA1W4TNSNe35tfPe/W93bC6j67eA0cQmdrBNj41tpvi/JEoAGrAgEDo4HF\r\nMIHCMB0GA1UdDgQWBBS/X7fRzt0fhvRbVazc1xDCDqmI5zCBkgYDVR0jBIGKMIGHgBS/X7fRzt0f\r\nhvRbVazc1xDCDqmI56FspGowaDELMAkGA1UEBhMCVVMxJTAjBgNVBAoTHFN0YXJmaWVsZCBUZWNo\r\nbm9sb2dpZXMsIEluYy4xMjAwBgNVBAsTKVN0YXJmaWVsZCBDbGFzcyAyIENlcnRpZmljYXRpb24g\r\nQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBAAWdP4id0ckaVaGs\r\nafPzWdqbAYcaT1epoXkJKtv3L7IezMdeatiDh6GX70k1PncGQVhiv45YuApnP+yz3SFmH8lU+nLM\r\nPUxA2IGvd56Deruix/U0F47ZEUD0/CwqTRV/p2JdLiXTAAsgGh1o+Re49L2L7ShZ3U0WixeDyLJl\r\nxy16paq8U4Zt3VekyvggQQto8PT7dL5WXXp59fkdheMtlb71cZBDzI0fmgAKhynpVSJYACPq4xJD\r\nKVtHCN2MQWplBqjlIapBtJUhlbl90TSrE9atvNziPTnNvT51cKEYWQPJIrSPnNVeKtelttQKbfi3\r\nQBFGmh95DmK/D5fs4C8fF5Q=\r\n-----END CERTIFICATE-----\n"
1931
+ }
1932
+ ]
1933
+ }