IM Observatory client report for exploit.im

Test started 2017-03-23 07:40:41 UTC .

Show server to server result | Permalink to this report | Retest

sj.exploit.im:5222
Certificate is not trusted, grade capped to F. Ignoring trust: B.
Server uses an RSA key with < 2048 bits. Grade capped to B.
Server uses Diffie-Hellman parameters of < 2048 bits. Grade capped to B.
sj.exploit.im:5222
Version
ejabberd 14.07
StartTLS
ALLOWED

SASL

Pre-TLS
DIGEST-MD5
PLAIN
SCRAM-SHA-1
Post-TLS
DIGEST-MD5
PLAIN
SCRAM-SHA-1

SRV records _xmpp-client._tcp.exploit.im NO DNSSEC

Priority Weight Port Server
0 5 5222 sj.exploit.im

TLSA records

Verified Usage Selector Match Data

Certificates

Subject
commonName
exploit.im
countryName
SN
emailAddress
webmaster@exploit.im
localityName
Dakar
organizationName
NA
stateOrProvinceName
Dakar
Details
Error: self signed certificate.
Signature algorithm
sha1WithRSAEncryption
Public key
1024 bit RSA WEAK
Valid from
2014-04-08 13:04:57 UTC
Valid to
2024-04-05 13:04:57 UTC
Valid for exploit.im
YES
D2:E4:62:5E:47:9F:65:82:ED:0D:52:8F:85:70:28:D4:67:C4:BE:5B

Protocols

SSLv2 No
SSLv3 No
TLSv1 Yes
TLSv1.1 Yes
TLSv1.2 Yes

Ciphers

Server does respect the client's cipher ordering.

Cipher suiteBitsizeForward secrecyInfo
ECDHE-RSA-AES256-GCM-SHA384 (0xc030) 256 Yes Curve: prime256v1
ECDHE-RSA-AES256-SHA384 (0xc028) 256 Yes Curve: prime256v1
ECDHE-RSA-AES256-SHA (0xc014) 256 Yes Curve: prime256v1
DHE-RSA-AES256-GCM-SHA384 (0x9f) 256 Yes Diffie-Hellman:
Group: RFC 5114 1024-bit MODP Group with 160-bit Prime Order Subgroup
Bitsize: 1024
DHE-RSA-CAMELLIA256-SHA (0x88) 256 Yes Diffie-Hellman:
Group: RFC 5114 1024-bit MODP Group with 160-bit Prime Order Subgroup
Bitsize: 1024
DHE-RSA-AES256-SHA256 (0x6b) 256 Yes Diffie-Hellman:
Group: RFC 5114 1024-bit MODP Group with 160-bit Prime Order Subgroup
Bitsize: 1024
DHE-RSA-AES256-SHA (0x39) 256 Yes Diffie-Hellman:
Group: RFC 5114 1024-bit MODP Group with 160-bit Prime Order Subgroup
Bitsize: 1024
AES256-GCM-SHA384 (0x9d) 256 No -
CAMELLIA256-SHA (0x84) 256 No -
AES256-SHA256 (0x3d) 256 No -
AES256-SHA (0x35) 256 No -
ECDHE-RSA-AES128-GCM-SHA256 (0xc02f) 128 Yes Curve: prime256v1
ECDHE-RSA-AES128-SHA256 (0xc027) 128 Yes Curve: prime256v1
ECDHE-RSA-AES128-SHA (0xc013) 128 Yes Curve: prime256v1
DHE-RSA-AES128-GCM-SHA256 (0x9e) 128 Yes Diffie-Hellman:
Group: RFC 5114 1024-bit MODP Group with 160-bit Prime Order Subgroup
Bitsize: 1024
DHE-RSA-SEED-SHA (0x9a) 128 Yes Diffie-Hellman:
Group: RFC 5114 1024-bit MODP Group with 160-bit Prime Order Subgroup
Bitsize: 1024
DHE-RSA-AES128-SHA256 (0x67) 128 Yes Diffie-Hellman:
Group: RFC 5114 1024-bit MODP Group with 160-bit Prime Order Subgroup
Bitsize: 1024
DHE-RSA-CAMELLIA128-SHA (0x45) 128 Yes Diffie-Hellman:
Group: RFC 5114 1024-bit MODP Group with 160-bit Prime Order Subgroup
Bitsize: 1024
DHE-RSA-AES128-SHA (0x33) 128 Yes Diffie-Hellman:
Group: RFC 5114 1024-bit MODP Group with 160-bit Prime Order Subgroup
Bitsize: 1024
AES128-GCM-SHA256 (0x9c) 128 No -
SEED-SHA (0x96) 128 No -
CAMELLIA128-SHA (0x41) 128 No -
AES128-SHA256 (0x3c) 128 No -
AES128-SHA (0x2f) 128 No -
ECDHE-RSA-DES-CBC3-SHA (0xc012) WEAK 112 Yes Curve: prime256v1
EDH-RSA-DES-CBC3-SHA (0x16) WEAK 112 Yes Diffie-Hellman:
Group: RFC 5114 1024-bit MODP Group with 160-bit Prime Order Subgroup
Bitsize: 1024
DES-CBC3-SHA (0xa) WEAK 112 No -

Badge

xmpp.net score

Want to show this result on your webpage? Add this:

<a href='https://xmpp.net/result.php?domain=exploit.im&amp;type=client'><img src='https://xmpp.net/badge.php?domain=exploit.im' alt='xmpp.net score' /></a>