Client information
IP address: 3.236.74.69
User Agent:
CCBot/2.0 (https://commoncrawl.org/faq/)

Maximum supported protocol: TLS 1.2
Currently used cipher suite:
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  •  
  •   Forward Secrecy
  •  
  •   Weak
  •  
  •   Insecure / Vulnerable

Cipher suites supported by your Browser (ordered by preference)


Cipher suite Key exchange MAC Cipher Key length  
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHAECDHE RSASHA1AES/CBC/NoPadding256 bitsForward Secrecy 
TLS_RSA_WITH_AES_256_CBC_SHARSASHA1AES/CBC/NoPadding256 bits
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHAECDHE RSASHA1AES/CBC/NoPadding128 bitsForward Secrecy 
TLS_RSA_WITH_AES_128_CBC_SHARSASHA1AES/CBC/NoPadding128 bits
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384ECDHE ECDSASHA384AES/GCM/NoPadding256 bitsForward Secrecy 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256ECDHE ECDSASHA256AES/GCM/NoPadding128 bitsForward Secrecy 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384ECDHE RSASHA384AES/GCM/NoPadding256 bitsForward Secrecy 
TLS_RSA_WITH_AES_256_GCM_SHA384RSASHA384AES/GCM/NoPadding256 bits
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256ECDHE RSASHA256AES/GCM/NoPadding128 bitsForward Secrecy 
TLS_RSA_WITH_AES_128_GCM_SHA256RSASHA256AES/GCM/NoPadding128 bits

Supported TLS extensions


Extension 1 elliptic_curves:
 secp256r1 (23, 1.2.840.10045.3.1.7)
 secp384r1 (24, 1.3.132.0.34)
 secp521r1 (25, 1.3.132.0.35)
Extension 2 signature_algorithms:
Supported algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256w
ithRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
Extension 3 unknown:
Extension 4 ec_point_formats:
 uncompressed (0)
Extension 5 server_name:
 Server names: HostName (0): demoapps.a-sit.at

Supported cipher algorithms


Algorithm Name Supported  
AESno
Camelliano
DESno
DESedeno
IDEAno
NULLno
RC2no
RC4no

Supported key exchange algorithms


Algorithm Name Supported  
DHE_DSSno
DHE_DSS_EXPORTno
DHE_DSS_EXPORT1024no
DHE_PSKno
DHE_RSAno
DHE_RSA_EXPORTno
DH_DSSno
DH_DSS_EXPORTno
DH_RSAno
DH_RSA_EXPORTno
DH_anonno
DH_anon_EXPORTno
ECDHE_PSKno
ECDHE_RSAno
ECDH_RSAno
ECDH_anonno
PSKno
RSAno
RSA_EXPORTno
RSA_EXPORT1024no
RSA_PSKno

Full debug data recorded during handshake


ssl_debug(8576): Starting handshake (iSaSiLk 5.102 Evaluation Version)...
ssl_debug(8576): Received v3 client_hello handshake message from ec2-3-236-74-69.compute-1.amazonaws.com/3.236.74.69.
ssl_debug(8576): Client supports secure renegotiation.
ssl_debug(8576): Client requested SSL version 3.3, selecting version 3.3.
ssl_debug(8576): Creating new session B6:B3:52:BA:76:58:8E:39...
ssl_debug(8576): CipherSuites supported by the client:
ssl_debug(8576): TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ssl_debug(8576): TLS_RSA_WITH_AES_256_CBC_SHA
ssl_debug(8576): TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ssl_debug(8576): TLS_RSA_WITH_AES_128_CBC_SHA
ssl_debug(8576): TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
ssl_debug(8576): TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
ssl_debug(8576): TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ssl_debug(8576): TLS_RSA_WITH_AES_256_GCM_SHA384
ssl_debug(8576): TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ssl_debug(8576): TLS_RSA_WITH_AES_128_GCM_SHA256
ssl_debug(8576): CompressionMethods supported by the client:
ssl_debug(8576): NULL
ssl_debug(8576): TLS extensions sent by the client: elliptic_curves (10), renegotiation_info (65281), signature_algorithms (13), unknown (23), server_name (0), ec_point_formats (11)
ssl_debug(8576): Sending server_hello handshake message.
ssl_debug(8576): Selecting CipherSuite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ssl_debug(8576): Selecting CompressionMethod: NULL
ssl_debug(8576): Selecting extensions: renegotiation_info (65281), ec_point_formats (11)
ssl_debug(8576): Sending certificate handshake message with 1024 bit RSA server certificate...
ssl_debug(8576): Sending server_key_exchange handshake message (secp256r1 ECDH)...
ssl_debug(8576): Sending certificate_request handshake message...
ssl_debug(8576): Sending server_hello_done handshake message...
ssl_debug(8576): Received certificate handshake message with client certificate.
ssl_debug(8576): Certificate message is empty, client has no certificate.
ssl_debug(8576): Received client_key_exchange handshake message.
ssl_debug(8576): Client sent a secp256r1 ECDH key.
ssl_debug(8576): Received change_cipher_spec message.
ssl_debug(8576): Received finished message.
ssl_debug(8576): Sending change_cipher_spec message...
ssl_debug(8576): Sending finished message...
ssl_debug(8576): Handshake completed, statistics:
ssl_debug(8576): Read 312 bytes in 4 records, wrote 1314 bytes in 3 records.

Client Certificate Chain


(none)