Given as with Poodle vulnerability: https://urlquery.net/report/2f950320-1ce8-4763-8dc1-40c5fbb7e8fb
but the domain name does not match the certificate common name or SAN.
Server configuration
Host name:
-mailserverircpanel1.mihanwebhost.com
Server type:
LiteSpeed
IP address:
185.94.97.106
Port number:
443
Protocols enabled:
TLS1.2
TLS1.1
TLS1.0
Protocols not enabled:
SSLv3
SSLv2
Secure Renegotiation:
Enabled
Downgrade attack prevention:
Enabled
Next Protocol Negotiation:
Enabled
Session resumption (caching):
Enabled
Session resumption (tickets):
Not Enabled
Strict Transport Security (HSTS):
Not Enabled
SSL/TLS compression:
Not Enabled
Heartbeat (extension):
Enabled
RC4:
Not Enabled
OCSP stapling:
Not Enabled
-2.ircpanel1.mylittledatacenter.com Let’s Encrypt Authority X3 and Tested Cert.
F-Grade: https://observatory.mozilla.org/analyze.html?host=www.ostadyab.net
1 vuln. library: http://retire.insecurity.today/#!/scan/a86d79e530514511799e0612cf34abd76f544a476afe73da5ed2c3ab4fab1ec1
A-Grade: https://sritest.io/#report/79c11693-3259-4656-b39a-7e593e808e0a
polonus (volunteer website security analyst and website error-hunter)