Category Archives: SSL Test Report

Qualys SSL Server Test Version 1.19.33

On August 1, 2015 the 1.19.33 version of the Qualys SSL Server Test was released.

Previous version: v1.18.1 | Next version: v1.20.28

8/1/15 - SSL Report v1.19.33

Content from Qualys licensed under a Creative Commons Attribution 3.0 License (http://creativecommons.org/licenses/by/3.0/us/).  An arrow was added to draw attention to the server report version.


Creating this post

Jing was used for screenshots and WP Smush was used to remove PNG metadata.

The most “bank grade” secure of Milwaukee County bank websites

Only 3 sites passed our Milwaukee County bank website security review. Who passed and who failed?

The following are results and analysis of a snapshot of SSL Labs Server Tests of Milwaukee county’s state chartered banks’ web servers performed June 2nd, 2015.

View full-screen in a new tab

Results are sorted by:

  1. Grade (A to F followed by sites that don’t use secure protocols & failures), then by
  2. Number of failed tests (ascending), then by
  3. Bank name

Clicking the name of the bank in column A will take you to the SSL Labs report page for that bank’s website  or 3rd party service it uses for online banking (that is why most of the bank names and domains tested in the report don’t directly match.)

Findings

3rd party services are prevalent

As far as I could tell, none of these banks used their own services for managing the actual financial portion (online banking, credit card processing, online deposits, etc.).  They all outsourced to 3rd party services, which you’d think would be more secure since many clients are managed from the same service.

From a confidence and usability standpoint, it should be noted that none of these banks inform or disclose that the user will be redirected to a 3rd party service.

The F (many issues including SSL 2 enabled)

Waterstone Bank’s website got the one and only F grade.   Their server still supports SSL 2, which is obsolete and insecure.  This alone capped their grade to F.  They were also one of two that had SSL 3 enabled.

Additionally, the HTTP version of their site doesn’t automatically redirect to the HTTPS version, which wouldn’t do them much good at this point.  I didn’t go through all the pages, but there doesn’t appear to be any user information that passes through the HTTP or F-grade-receiving-HTTPS-page.  The Account Access links for business and consumer banking link directly to the 3rd party service via HTTPS.

The only A

Metavante’s RemitPoint solution used by Park Bank earns the only A grade.  According to this press release, RemitPoint provides “a centralized image-based remittance processing service.”  The only way for them to get an A+ is to enable HTTP Strict Transport Security support with a max-age of at least 6 months.

Two A- Websites (the other 2 of 3 A grades)

So there is only one bank’s website (not the portion where the online banking occurs) that received an A- grade.  Congrats to Layton State Bank.

Also, only one 3rd party banking service, Park Bank Business Credit Card – Administrator from FIS received an A- grade.

Neither support Forward Secrecy which would boost their respective scores.

 The grade breakdown

  • A grade (A or A-): 3/20 – 15%
  • B grade: 2/20 – 10%
  • C grade: 14/20 – 70%
  • D grade: 0/20 – 0%
  • F grade: 1/20 – 5%

No secure protocols supported: 2

Assessment failures: 2

Sites without secure protocols

The first is Columbia Savings and Loan Association’s website, which is purely informational.  There are no links to online banking or other login fields for customers.  However, the “Owner Login” link does not target a HTTPS page nor does the login form within.

The second is The Equitable Bank’s website.  The “Access ID” field targets a secure endpoint, but the page itself isn’t secure.  Fortunately, the account password isn’t requested until the 3rd party service’s secured page.

Logjam (95% pass rate)

Information about the latest vulnerability, the Logjam attack was published last month (May 20, 2015).  I wanted to highlight those results specifically in this project.

There was one server that didn’t pass the WeakDH.org server test.  The Park Bank Personal Credit Card service from First Bankcard got the warning about using a common 1024-bit DH prime.  I thought about adding a “Warning” type to Pass/Fail, but decided that anything that wasn’t a pass was a failure.

“Warning! This site uses a commonly-shared 1024-bit Diffie-Hellman group, and might be in range of being broken by a nation-state. It might be a good idea to generate a unique, 2048-bit group for the site.”

Things I’d never seen before

In interesting report to look at is the one for Park Bank Merchant Card Processing.  It was the first time I saw the notification “This site is intolerant to newer protocol versions, which might cause connection failures.”

It also only allows for one cipher suite TLS_RSA_WITH_AES_256_CBC_SHA (0x35).  The fewest I had seen before was 3.

The other result I hadn’t encountered was “Assessment failed: Cipher suite support test failed” which occurred on the Points2U test.

Why so many C’s?

If many of you are familiar with these types of analyses, you will notice many more “C” grades than before.  SSL Labs, since the 5/20/15 1.17.10 version release, is penalizing the RC4 cipher when used with TLS 1.1+ more now and not supporting TLS 1.2 caps the grade to a C from a B previously.  Full information on the ratings is available here (PDF).

Date performed: 6/2/15

Sites tested: 24

Data sources

Tools

Similar posts and analysis

Tangential articles (coming soon)

  • Fiserv
  • Wisconsin Department of Financial Institutions

The worst SSL Labs Test Report

SSL Report: hmctsformfinder.justice.gov.uk (212.137.36.113)
Assessed on: Sun, 31 May 2015 05:16:06 UTC
SSL Report v1.18.1

20150531-ssllabs.com-f-rating-hmctsformfinder.justice.gov.uk

Run the test yourself: https://www.ssllabs.com/ssltest/analyze.html?d=hmctsformfinder.justice.gov.uk

 

(h/t) Paul Moore @Paul_Reviews on Twitter https://twitter.com/Paul_Reviews/status/604299891607621632

2016 Third Party Presidential Candidates’ Website SSL Reports

Declared Candidates

Candidate (alphabetical by last name) Party Website SSL Labs Server Test Link Grade (5/27/15)
Paul Chehade Independent paulchehade.org Link Certificate name mismatch
Scott Copeland Constitution www.scottcopelandusa.com Link Certificate name mismatch
Ken Cross Reform www.kencross.com Link Certificate not valid for domain name / Unable to connect to server
Mark Dutter Independent www.dutterforpresident.com Link Certificate name mismatch
Marc Feldman Libertarian www.votesnotforsale.com Link No secure protocols supported / Certificate not valid for domain name
Martin Hahn Independent  martinhahn-2016.vote Link Certificate name mismatch
David Hendrix Independent hendrixforpresident2016.com Link Unable to connect to server
David Holcomb Independent No campaign website listed
Cecil Ince Libertarian https://rally.org/f/2c0Bs2lcNFD
Lynn Sandra Kahn Independent www.vote4lynn2016.com Link No secure protocols supported / Certificate not valid for domain name
Steve Kerbel Libertarian stevekerbel2016.com Link Unable to connect to server
Chad Koppie Constitution chadkoppieforillinois.com Link Certificate name mismatch
Bishop Julian Lewis, Jr. Independent www.julianlewis53.com Link Certificate name mismatch
Mark Pendleton Independent pendleton4prez2016.webs.com
Darryl Perry Libertarian darrylwperry.com Link Certificate name mismatch
Scott Smith Independent www.scottsmith2016.com Link Certificate name mismatch
Tami Stainfield  Independent tamistainfield.com Link No secure protocols supported
Samm Tittle Independent www.samm2016.com Link A

2016 Democratic Presidential Candidates’ Website SSL Reports

2016 Republican Presidential Candidates’ Website SSL Reports

Current as of 5/27/15

Source: http://2016.presidential-candidates.org/?other=other

SSL Labs SSL report version 1.18.1

2016 Democratic Presidential Candidates’ Website SSL Reports

Candidate (alphabetical by last name) Status Website SSL Labs Server Test Link Grade (5/27/15)
Hillary Clinton Declared www.hillaryclinton.com Link A / B (Inconsistent server configuration)
Martin O’Malley Declared martinomalley.com Link B
(5/31/15)
Bernie Sanders Declared berniesanders.com Link A

2016 Republican Presidential Candidates’ Website SSL Reports

2016 Third Party Presidential Candidates’ Website SSL Reports

Last updated 5/31/15

Sources:

SSL Labs SSL report version 1.18.1

2016 Republican Presidential Candidates’ Website SSL Reports

Candidate (alphabetical by last name) Status Website SSL Labs Server Test Link Grade (5/27/15)
Skip Andrews Declared www.skipandrews2016.com Link B
Michael Bickelmeyer Declared www.michaelbickelmeyer.com Link Certificate name mismatch
Kerry Bowers Declared www.kerrybowers.com Link Certificate name mismatch
Dr. Ben Carson Declared www.bencarson.com Link A
Dale Christensen Declared www.dale2016.com Link B
Ted Cruz Declared www.tedcruz.org Link A+
John Dummett, Jr. Declared www.dummett2016.com Link Certificate name mismatch
Mark Everson Declared markforamerica.com Link Certificate name mismatch
Carly Fiorina Declared carlyforamerica.com Link C
Chris Hill Withdrawn www.chrishillforpresident.com
Mike Huckabee Declared mikehuckabee.com Link B
Michael Kinlaw Declared* www.michaelkinlaw.com
George Pataki Declared www.georgepataki.com Link Unable to connect to server
(6/1/15)
Rand Paul Declared www.randpaul.com Link A
Michael Petyo Declared www.petyoforpresident.com Link Certificate name mismatch
Marco Rubio Declared marcorubio.com Link
Brian Russell Declared www.russell2016.com Link Certificate name mismatch
Rick Santorum Declared www.ricksantorum.com Link No secure protocols supported / Certificate not valid for domain name

2016 Democratic Presidential Candidates’ Website SSL Reports

2016 Third Party Presidential Candidates’ Website SSL Reports

Last updated 6/1/15

Sources: http://2016.republican-candidates.org/

http://blogs.cfr.org/lindsay/2015/05/29/campaign-2016-george-pataki-gop-presidential-candidate/

*Republican-Candidates.org lists Michael Kinlaw as a presidential candidate, however his website, Facebook account, and Twitter account reference “Kinlaw 2016 Michael Kinlaw for U.S. Senate Colorado”

SSL Labs SSL report version 1.18.1

Server TLS/SSL security of U.S. Cabinet Level Agencies’ Websites

Last updated: December 20, 2015

The United States federal government mandated that all publicly accessible federal websites use a secure connection by December 31, 2016.  This page tracks the progress of U.S. Cabinet Level Agencies’ Websites along with other useful information.

Links to agencies on Pulse HTTPS the government’s public dashboard.  See all domains under the agency and their statuses

Timeline of Progress

  • December 4, 2015 – 34%
  • December 31, 2016 – 100% <- let’s see if that happens

Source: Pulse HTTPS

Previous reports

Report of SSL Labs Grades on May 25, 2015

Agency (alphabetical) Domain SSL Labs Server Test Grade (on 5/25/15)
Agriculture http://www.usda.gov/ Link No secure protocols supported
Commerce http://www.commerce.gov/ Link C
Defense http://www.defense.gov/ Link Certificate name mismatch
Education http://www.ed.gov/ Link C
Energy http://www.energy.gov/ Link No secure protocols supported
Health and Human Services http://www.hhs.gov/ Link  B
Homeland Security http://www.dhs.gov/ Link A- / C (Inconsistent server configuration)
Housing and Urban Development http://www.hud.gov/ Link No secure protocols supported
Interior http://www.doi.gov/ Link Certificate name mismatch
Justice http://www.justice.gov/ Link Certificate not valid for domain name / No secure protocols supported
Labor http://www.dol.gov/ Link B / C (Inconsistent server configuration)
State http://www.state.gov/ Link Certificate not valid for domain name / No secure protocols supported
Transportation http://www.dot.gov/ Link B
Treasury http://www.treasury.gov/ Link B / No secure protocols supported (Inconsistent server configuration)
Veterans Affairs http://www.va.gov/ Link T (C if trust issues are ignored)

Source: SSL Labs server test version: 1.18.1 performed on 5/25/15

 

References

Source: https://www.whitehouse.gov/administration/cabinet

License

Content from Qualys licensed under a Creative Commons Attribution 3.0 License (http://creativecommons.org/licenses/by/3.0/us/).  No changes were made to the original content.

Original content on this page is available under a Creative Commons Attribution 3.0 Unported License (CC BY 3.0) https://creativecommons.org/licenses/by/3.0/. In other words, share generously but provide attribution.

Qualys SSL Server Test Version 1.18.1

Today, 5/24/15, I noticed a new SSL server report version on Qualys SSL Labs.  They are up to version 1.18.1.  Again, no official posting, but it will be linked here when available.

Previous version: v1.17.10 | Next version: v1.19.33

20150524-ssllabs-ssl-report-version-1-18-1

Content from Qualys licensed under a Creative Commons Attribution 3.0 License (http://creativecommons.org/licenses/by/3.0/us/).  An arrow was added to draw attention to the server report version.


Creating this post

Jing was used for screenshots and WP Smush was used to remove PNG metadata.

Qualys SSL Server Test Version 1.17.10

On Wednesday 5/20/15 Qualys SSL Labs released an updated SSL server test version.  The official release notes are not yet published, but they will be linked here when they are available.

Update: The official release notes are  available: SSL Labs 1.17: RC4, Obsolete Crypto, and Logjam

Previous version: v1.16.14 | Next version: v1.18.1

Tuesday’s server report version 1.16.14

20150519_10_information_aero_ssl_report_miscellaneous

Starting 5/20/15 the SSL Report is version 1.17.10

20150521_ssl_labs_report_v1_17_10

Now, not supporting the current best TLS 1.2 protocol caps the grade to a C .  Previously it capped the overall score to a B.

20150521_ssl_labs_tls_1_2_cappped_c

Update: Here is the changelog from the SSL Server Rating Guide (PDF)

Changes in 2009j (20 May 2015)

  • Cap to B if using weak DH parameters (less than 2048 bits).
  • Increase CRIME penalty to C (was B).
  • Cap to C if RC4 is used with TLS 1.1+.
  • Cap to C if not supporting TLS 1.2.

Content from Qualys licensed under a Creative Commons Attribution 3.0 License (http://creativecommons.org/licenses/by/3.0/us/).  No changes were made to the original content.

View Latest Cached Result (if available) otherwise initiate a new test: https://www.ssllabs.com/ssltest/analyze.html?d=information.aero


Creating this post

Jing was used for screenshots and WP Smush was used to remove PNG metadata.