No engine or GOST support via engine with your /usr/bin/openssl

###########################################################
    testssl.sh       3.0rc5 from https://testssl.sh/dev/

      This program is free software. Distribution and
             modification under GPLv2 permitted.
      USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!

       Please file bugs @ https://testssl.sh/bugs/

###########################################################

 Using "OpenSSL 1.0.2k-fips  26 Jan 2017" [~118 ciphers]
 on s1008:/usr/bin/openssl
 (built: "reproducible build, date unspecified", platform: "linux-x86_64")


 Start 2019-12-21 17:01:12        --\>\> 202.33.167.60:443 (nba.smbcnikko.co.jp) \<\<--

 rDNS (202.33.167.60):   60.32.167.33.202.in-addr.arpa.
 Service detected:       HTTP


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered
 TLS 1.1    offered
 TLS 1.2    offered (OK)
 TLS 1.3    not offered
 NPN/SPDY   not offered
 ALPN/HTTP2 not offered

 Testing cipher categories 

 NULL ciphers (no encryption)                  not offered (OK)
 Anonymous NULL Ciphers (no authentication)    not offered (OK)
 Export ciphers (w/o ADH+NULL)                 not offered (OK)
 LOW: 64 Bit + DES, RC[2,4] (w/o export)       not offered (OK)
 Triple DES Ciphers / IDEA                     not offered (OK)
 Average: SEED + 128+256 Bit CBC ciphers       offered
 Strong encryption (AEAD ciphers)              not offered


 Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 

 PFS is offered (OK)          ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA
                              ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA 
 Elliptic curves offered:     prime256v1 


 Testing server preferences 

 Has server cipher order?     yes (OK)
 Negotiated protocol          TLSv1.2
 Negotiated cipher            AES256-SHA256
 Cipher order
    TLSv1:     AES256-SHA AES128-SHA ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA 
    TLSv1.1:   AES256-SHA AES128-SHA ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA 
    TLSv1.2:   AES256-SHA256 AES256-SHA AES128-SHA256 AES128-SHA
               ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA
               ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA 


 Testing server defaults (Server Hello) 

 TLS extensions (standard)    "renegotiation info/#65281" "server name/#0"
                              "supported_groups/#10" "EC point formats/#11"
 Session Ticket RFC 5077 hint no -- no lifetime advertised
 SSL Session ID support       yes
 Session Resumption           Tickets no, ID: yes
 TLS clock skew               Random values, no fingerprinting possible 
 Signature Algorithm          SHA256 with RSA
 Server key size              RSA 2048 bits
 Server key usage             Digital Signature, Key Encipherment
 Server extended key usage    TLS Web Server Authentication, TLS Web Client Authentication
 Serial / Fingerprints        7A87E30971B59581CFB29E70B4E90BC9D9A91602 / SHA1 E9EA1E676A16E5F39199BF5FE61F1F343E709405
                              SHA256 4FBE08AA0A38425C058076C7C0379334A2CB2159AF0025DC0305081BBAA4EEA1
 Common Name (CN)             nba.smbcnikko.co.jp
 subjectAltName (SAN)         nba.smbcnikko.co.jp 
 Issuer                       Cybertrust Japan EV CA G2 (Cybertrust Japan Co., Ltd. from JP)
 Trust (hostname)             Ok via SAN and CN (same w/o SNI)
 Chain of trust               Ok   
 EV cert (experimental)       yes 
 ETS/\"eTLS\", visibility info  not present
 Certificate Validity (UTC)   284 \>= 60 days (2019-01-15 18:25 --> 2020-09-30 23:59)
 # of certificates provided   3
 Certificate Revocation List  http://sureseries-crl.cybertrust.ne.jp/SureServer/2021_ev/cdp.crl
 OCSP URI                     http://sureseries-ocsp.cybertrust.ne.jp/OcspServer
 OCSP stapling                not offered
 OCSP must staple extension   --
 DNS CAA RR (experimental)    not offered
 Certificate Transparency     yes (certificate extension)


 Testing HTTP header response @ \"/\" 

 HTTP Status Code             200 OK
 HTTP clock skew              0 sec from localtime
 Strict Transport Security    not offered
 Public Key Pinning           --
 Server banner                (no "Server" line in header, interesting!)
 Application banner           --
 Cookie(s)                    1 issued: 1/1 secure, NOT HttpOnly
 Security headers             --
 Reverse Proxy banner         --


 Testing vulnerabilities 

 Heartbleed (CVE-2014-0160)                not vulnerable (OK), no heartbeat extension
 CCS (CVE-2014-0224)                       not vulnerable (OK)
 Ticketbleed (CVE-2016-9244), experiment.  not vulnerable (OK), no session ticket extension
 ROBOT                                     not vulnerable (OK)
 Secure Renegotiation (RFC 5746)           supported (OK)
 Secure Client-Initiated Renegotiation     VULNERABLE (NOT ok), DoS threat
 CRIME, TLS (CVE-2012-4929)                not vulnerable (OK)
 BREACH (CVE-2013-3587)                    no HTTP compression (OK)  - only supplied "/" tested
 POODLE, SSL (CVE-2014-3566)               not vulnerable (OK)
 TLS_FALLBACK_SCSV (RFC 7507)              Probably OK. But received non-RFC-compliant \"handshake failure\" instead of \"inappropriate fallback\"
 SWEET32 (CVE-2016-2183, CVE-2016-6329)    not vulnerable (OK)
 FREAK (CVE-2015-0204)                     not vulnerable (OK)
 DROWN (CVE-2016-0800, CVE-2016-0703)      not vulnerable on this host and port (OK)
                                           make sure you don't use this certificate elsewhere with SSLv2 enabled services
                                           https://censys.io/ipv4?q=4FBE08AA0A38425C058076C7C0379334A2CB2159AF0025DC0305081BBAA4EEA1 could help you to find out
 LOGJAM (CVE-2015-4000), experimental      not vulnerable (OK): no DH EXPORT ciphers, no DH key detected with <= TLS 1.2
 BEAST (CVE-2011-3389)                     TLS1: AES256-SHA AES128-SHA
                                                 ECDHE-RSA-AES256-SHA
                                                 ECDHE-RSA-AES128-SHA 
                                           VULNERABLE -- but also supports higher protocols  TLSv1.1 TLSv1.2 (likely mitigated)
 LUCKY13 (CVE-2013-0169), experimental     potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS. Check patches
 RC4 (CVE-2013-2566, CVE-2015-2808)        no RC4 ciphers detected (OK)


 Testing 370 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
 xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384              
 xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA                 
 x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256                    
 x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA                       
 xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256              
 xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA                 
 x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256                    
 x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA                       


 Running client simulations (HTTP) via sockets 

 Android 4.2.2                TLSv1.0 AES256-SHA, No FS
 Android 4.4.2                TLSv1.2 AES256-SHA256, No FS
 Android 5.0.0                TLSv1.2 AES256-SHA, No FS
 Android 6.0                  TLSv1.2 AES256-SHA, No FS
 Android 7.0                  TLSv1.2 AES256-SHA, No FS
 Android 8.1 (native)         TLSv1.2 AES256-SHA, No FS
 Android 9.0 (native)         TLSv1.2 AES256-SHA, No FS
 Chrome 65 Win 7              TLSv1.2 AES256-SHA, No FS
 Chrome 74 (Win 10)           TLSv1.2 AES256-SHA, No FS
 Firefox 62 Win 7             TLSv1.2 AES256-SHA, No FS
 Firefox 66 (Win 8.1/10)      TLSv1.2 AES256-SHA, No FS
 IE 6 XP                      No connection
 IE 7 Vista                   TLSv1.0 AES256-SHA, No FS
 IE 8 Win 7                   TLSv1.0 AES256-SHA, No FS
 IE 8 XP                      No connection
 IE 11 Win 7                  TLSv1.2 AES256-SHA256, No FS
 IE 11 Win 8.1                TLSv1.2 AES256-SHA256, No FS
 IE 11 Win Phone 8.1          TLSv1.2 AES256-SHA256, No FS
 IE 11 Win 10                 TLSv1.2 AES256-SHA256, No FS
 Edge 15 Win 10               TLSv1.2 AES256-SHA256, No FS
 Edge 17 (Win 10)             TLSv1.2 AES256-SHA256, No FS
 Opera 60 (Win 10)            TLSv1.2 AES256-SHA, No FS
 Safari 9 iOS 9               TLSv1.2 AES256-SHA256, No FS
 Safari 9 OS X 10.11          TLSv1.2 AES256-SHA256, No FS
 Safari 10 OS X 10.12         TLSv1.2 AES256-SHA256, No FS
 Apple ATS 9 iOS 9            TLSv1.2 ECDHE-RSA-AES256-SHA384, 256 bit ECDH (P-256)
 Tor 17.0.9 Win 7             TLSv1.0 AES256-SHA, No FS
 Java 6u45                    TLSv1.0 AES128-SHA, No FS
 Java 7u25                    TLSv1.0 AES128-SHA, No FS
 Java 8u161                   TLSv1.2 AES256-SHA256, No FS
 Java 9.0.4                   TLSv1.2 AES256-SHA256, No FS
 OpenSSL 1.0.1l               TLSv1.2 AES256-SHA256, No FS
 OpenSSL 1.0.2e               TLSv1.2 AES256-SHA256, No FS
 OpenSSL 1.1.0j (Debian)      TLSv1.2 AES256-SHA256, No FS
 OpenSSL 1.1.1b (Debian)      TLSv1.2 AES256-SHA256, No FS
 Thunderbird (60.6)           TLSv1.2 AES256-SHA, No FS

 Done 2019-12-21 17:02:43 [  94s] --\>\> 202.33.167.60:443 (nba.smbcnikko.co.jp) \<\<--