Author Topic: HTTPS Everywhere - not always an optimum configuration....  (Read 1586 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33905
  • malware fighter
HTTPS Everywhere - not always an optimum configuration....
« on: April 13, 2016, 11:44:06 PM »
Look here: https://seomon.com/domain/zarkzork.com/
Please contact the Certificate Authority for further verification.
Warnings
BEAST
The BEAST attack is not mitigated on this server.
SSLv3
This server uses the SSLv3 protocol which is not secure. Disable the SSLv3 protocol and enable a higher protocol version. Contact your web server vendor for assistance.
Root installed on the server.
For best practices, remove the self-signed root from the server.
This server is vulnerable to:
Poodle (SSLv3)
This server is vulnerable to a Poodle (SSLv3) attack. If you have not disabled SSLv3 fallback support, disable it now and use TLS 1.2 or higher.
Certificate information
This server uses a Domain Validated (DV) certificate. No information about the site owner has been validated. Data is protected, but exchanging personal or financial information is not recommended.
Common name:
 zarkzork.com
SAN:
 zarkzork.com, www.zarkzork.com
Valid from:
 2015-Jun-28 00:00:00 GMT
Valid to:
 2016-Jun-27 23:59:59 GMT
Certificate status:
 Valid
Revocation check method:
 OCSP
Organization:
 
Organizational unit:
 EssentialSSL,Domain Control Validated
City/locality:
 
State/province:
 
Country:
 
Certificate Transparency:
 Not Enabled
Serial number:
 ff8dee6d7e24f15f247026954609b56c
Algorithm type:
 SHA256withRSA
Key size:
 2048
Certificate chainShow details
AddTrust External CA RootRoot certificate
COMODO RSA Certification AuthorityIntermediate certificate
COMODO RSA Domain Validation Secure Server CAIntermediate certificate

http://toolbar.netcraft.com/site_report?url=https://zarkzork.com

The address you entered is unnecessarily exposing the following response headers which divulge its choice of web platform:

Server: nginx/1.4.6 (Ubuntu)
Configuring the application to not return unnecessary headers keeps this information silent and makes it significantly more difficult to identify the underlying frameworks.

Clickjackking warning: It doesn't look like an X-Frame-Options header was returned from the server which means that this website could be at risk of a clickjacking attack. Add a header to explicitly describe the acceptable framing practices (if any) for this site.

That is why we have a meagre F-Status here: https://securityheaders.io/?q=https%3A%2F%2Fzarkzork.com%2F

pol
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33905
  • malware fighter
Re: HTTPS Everywhere - not always an optimum configuration....
« Reply #1 on: April 15, 2016, 12:29:07 AM »
See: https://www.eff.org/https-everywhere/atlas/domains/rightscale.com.html

This one with high risk code to be retired:
-https://rightscale.com
Detected libraries:
jquery - 1.10.2 : (active1) -https://ajax.googleapis.com/ajax/libs/jquery/1.10.2/jquery.min.js
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
YUI - 2.8.2r1 : (active1) https://rightscale.com
Info: Severity: high
http://www.cvedetails.com/cve/CVE-2013-4940/
Info: Severity: high
http://www.cvedetails.com/cve/CVE-2012-5882/
Info: Severity: high
http://www.cvedetails.com/cve/CVE-2012-5881/
Info: Severity: medium
http://www.cvedetails.com/cve/CVE-2010-4710/
Info: Severity: high
http://www.cvedetails.com/cve/CVE-2010-4208/
Info: Severity: high
http://www.cvedetails.com/cve/CVE-2010-4207/
(active) - the library was also found to be active by running code
2 vulnerable libraries detected

Scanner output:
Scanning -https://rightscale.com ...
Script loaded: -https://ajax.googleapis.com/ajax/libs/jquery/1.10.2/jquery.min.js
Script loaded: -https://ssl.google-analytics.com/ga_exp.js?utmxkey=99127306-75&utmx=&utmxx=&utmxtime=1460672423909
Script loaded: -https://www.googletagmanager.com/gtm.js?id=GTM-56GH
Script loaded: -https://storage.googleapis.com/code.snapengage.com/js/16efb512-9d0d-4ac3-9ad4-4b42e1b87d8c.js
Script loaded: -https://www.google-analytics.com/analytics.js
Script loaded: -https://www.googleadservices.com/pagead/conversion_async.js
Script loaded: -https://munchkin.marketo.net/munchkin.js
Script loaded: -https://secure.quantserve.com/quant.js
Script loaded: -https://connect.facebook.net/en_US/fbds.js
Script loaded: -https://www.google-analytics.com/plugins/ua/linkid.js
Script loaded: -https://munchkin.marketo.net/151/munchkin.js
Status: success
Detected library: jquery - 1.10.2
Detected library: YUI - 2.8.2r1
Load time: 3697ms

pol
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!