And for testing your servers: <a href="https://www.ssllabs.com/ssltest/analyze.html" rel="nofollow">https://www.ssllabs.com/ssltest/analyze.html</a>
Some info on how to correct this on common browsers where it can be corrected (I use FF 26; marked bad, and comments in this thread say that some of the problems can be fixed) would be a great improvement.
Excellent!<p>(I mean the site. Not so crazy that FF 26 under OSX 10.9.1 is listed as BAD, but I understand and accept the reasoning.)<p>Hopefully this will spur the various vendors to abandon old, broken protocols and ciphers.
Site doesn't load on IE 6. I wonder if you've configured the SSL certs with SNI? Would have been nice to see the page turn red, but I guess I know the answer without having to run it...<p>Edit: It's not an SNI issue, IE 8 on XP can load the site.
Very useful Site - Thanks!<p>Reminded me of an old favorite "Shields Up" <a href="https://www.grc.com/shieldsup" rel="nofollow">https://www.grc.com/shieldsup</a> - Great way to quickly test your Router
Does anyone know how to disable TLS 1.0 in Firefox 26.0 (on Linux)? I found this article:<p><a href="http://www.spotht.com/2010/06/how-to-enabledisable-ssl-30-and-tls-10.html" rel="nofollow">http://www.spotht.com/2010/06/how-to-enabledisable-ssl-30-an...</a><p>However, the Options in my browser do not include a tab called "Encryption", as the article discusses.
On the built in browser in CyanogenMod 10.1.3:<p>> Bad: Your client is using TLS 1.0, which is very old, possibly susceptible to the BEAST attack, and doesn't have the best cipher suites available either.<p>Interestingly I get "Probably good" using the Chrome browser on the same phone.
Will it make my client more unique (so identifiable) for a third-party passive advisory (who can sniff traffic) if I fine-tune my browser's settings for example to support only TLS 1.2 and by removing all the RC4 encryption methods?
Nice site, I've been looking for something simple like that (It sure beat <a href="https://cc.dcsec.uni-hannover.de/" rel="nofollow">https://cc.dcsec.uni-hannover.de/</a> in niceness, the website I've used before to "check" my browser).<p>Anyway I'm getting a nice "Probably Okay" using the latest Firefox Nightly.
Do you have some stats? I'm interested in the "TLS Compression" part (e.g. can I remove the breach-mitigation-rails gem from my project)