Certificado Carozzi
Certificado Carozzi
Certificado Carozzi
Projects
Qualys Free Trial
Contact
Summary
Overall Rating
Certificate
A Protocol Support
Key Exchange
Cipher Strength
0 20 40 60 80 100
www.mercadocarozzi.cl
Valid until Thu, 05 Jan 2023 00:02:24 UTC (expires in 2 months and 5 days)
R3
Issuer
AIA: http://r3.i.lencr.org/
Extended Validation No
OCSP
Revocation information
OCSP: http://r3.o.lencr.org
Yes
Trusted
Mozilla
Apple
Android
Java
Windows
#2
R3
Valid until Mon, 15 Sep 2025 16:00:00 UTC (expires in 2 years and 10 months)
#3
ISRG Root X1
Valid until Mon, 30 Sep 2024 18:14:03 UTC (expires in 1 year and 11 months)
Certification Paths
Configuration
Protocols
TLS 1.1 No
TLS 1.0 No
SSL 3 No
SSL 2 No
Cipher Suites
TLS_AES_128_GCM_SHA256 (0x1301)
ECDH x25519 (eq. 3072 bits RSA) FS 128
TLS_AES_256_GCM_SHA384 (0x1302)
ECDH x25519 (eq. 3072 bits RSA) FS 256
TLS_CHACHA20_POLY1305_SHA256 (0x1303)
ECDH x25519 (eq. 3072 bits RSA) FS 256
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x9e)
DH 2048 bits FS 128
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
ECDH secp521r1 (eq. 15360 bits RSA) FS 128
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x9f)
DH 2048 bits FS 256
Cipher Suites
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
ECDH secp521r1 (eq. 15360 bits RSA) FS 256
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca8)
ECDH secp521r1 (eq. 15360 bits RSA) FS 256
Handshake Simulation
Android 8.1 -
TLS 1.3 TLS_CHACHA20_POLY1305_SHA256
ECDH x25519
FS
Android 9.0 -
TLS 1.3 TLS_CHACHA20_POLY1305_SHA256
ECDH x25519
FS
Chrome 69 / Win 7
R RSA 2048 (SHA256)
TLS 1.2
> h2
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH x25519
FS
Chrome 70 / Win 10 -
TLS 1.3 TLS_AES_128_GCM_SHA256
ECDH x25519
FS
Chrome 80 / Win 10
R -
TLS 1.3 TLS_AES_128_GCM_SHA256
ECDH x25519
FS
Firefox 47 / Win 7
R RSA 2048 (SHA256)
TLS 1.2
> h2
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH secp256r1
FS
Firefox 62 / Win 7
R RSA 2048 (SHA256)
TLS 1.2
> h2
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH x25519
FS
Firefox 73 / Win 10
R -
TLS 1.3 TLS_AES_128_GCM_SHA256
ECDH x25519
FS
IE 11 / Win 7
R RSA 2048 (SHA256)
TLS 1.2 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH 2048
FS
IE 11 / Win 8.1
R RSA 2048 (SHA256)
TLS 1.2
> http/1.1
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH 2048
FS
IE 11 / Win 10
R RSA 2048 (SHA256)
TLS 1.2
> h2
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH secp256r1
FS
Edge 15 / Win 10
R RSA 2048 (SHA256)
TLS 1.2
> h2
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH x25519
FS
Edge 16 / Win 10
R RSA 2048 (SHA256)
TLS 1.2
> h2
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH x25519
FS
Edge 18 / Win 10
R RSA 2048 (SHA256)
TLS 1.2
> h2
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH x25519
FS
Java 11.0.3 -
TLS 1.3 TLS_AES_128_GCM_SHA256
ECDH secp256r1
FS
Java 12.0.1 -
TLS 1.3 TLS_AES_128_GCM_SHA256
ECDH secp256r1
FS
OpenSSL 1.0.1l
R RSA 2048 (SHA256)
TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH secp521r1
FS
OpenSSL 1.0.2s
R RSA 2048 (SHA256)
TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH secp256r1
FS
OpenSSL 1.1.0k
R RSA 2048 (SHA256)
TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH x25519
FS
OpenSSL 1.1.1c
R -
TLS 1.3 TLS_AES_256_GCM_SHA384
ECDH x25519
FS
Safari 7 / OS X 10.9
R Server sent fatal alert: handshake_failure
Safari 8 / OS X 10.10
R Server sent fatal alert: handshake_failure
Safari 9 / iOS 9
R RSA 2048 (SHA256)
TLS 1.2
> h2
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH secp256r1
FS
Safari 9 / OS X 10.11
R RSA 2048 (SHA256)
TLS 1.2
> h2
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH secp256r1
FS
Safari 10 / iOS 10
R RSA 2048 (SHA256)
TLS 1.2
> h2
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH secp256r1
FS
Safari 10 / OS X 10.12
R RSA 2048 (SHA256)
TLS 1.2
> h2
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH secp256r1
FS
(1) Clients that do not support Forward Secrecy (FS) are excluded when determining support for it.
(2) No support for virtual SSL hosting (SNI). Connects to the default site if the server uses SNI.
(3) Only first connection attempt simulated. Browsers sometimes retry with a lower protocol version.
(R) Denotes a reference browser or client, with which we expect better effective security.
(All) We use defaults, but some platforms do not use their best protocols and features (e.g., Java 6 & 7, older IE).
(All) Certificate trust is not checked in handshake simulation, we only perform TLS handshake.
Protocol Details
No, server keys and hostname not seen elsewhere with SSLv2
(1) For a better understanding of this test, please read this longer explanation
DROWN
(2) Key usage data kindly provided by the Censys network search engine; original DROWN website here
(3) Censys data is only indicative of possible key and certificate reuse; possibly out-of-date and not complete
POODLE (TLS) No
(more info)
SSL/TLS compression No
RC4 No
Heartbeat (extension) No
ALPN Yes h2
http/1.1
NPN Yes h2
http/1.1
OCSP stapling No
Supported Named Groups secp256r1, secp384r1, secp521r1, x25519, x448 (Server has no preference)
0-RTT enabled No
HTTP Requests
1 https://www.mercadocarozzi.cl/
(HTTP/1.1 200 OK)
Miscellaneous
Server hostname -
Copyright © 2009-2022 Qualys, Inc. All Rights Reserved. Terms and Conditions