Grade | Score | Criteria |
---|---|---|
A+ | 90~100 | TLS 1.3/1.2 only, no weak ciphers (all PFS) Certificate ECDSA or RSA≥3072, complete chain, expires in 60+ days OCSP Stapling working (ideally with Must-Staple) HSTS enabled, max-age ≥ 1 year, includeSubDomains, preload |
A | 80~89 | TLS 1.3/1.2, strong ciphers prioritized (mostly PFS) Certificate RSA≥2048, SHA-256+, valid chain, expires in 30+ days OCSP Stapling enabled (occasional failures allowed) HSTS enabled, max-age ≥ 6 months |
B | 65~79 | TLS 1.2 required, 1.3 optional/unsupported, some CBC present Certificate RSA≥2048, valid chain (expires in 14+ days) OCSP Stapling disabled (but OCSP responses available) HSTS configured but partially inadequate |
C | 50~64 | TLS 1.0/1.1 enabled or many weak ciphers (low PFS) Missing chain/weak signatures (SHA-1) or expires soon (≤14 days) No Stapling, unclear revocation checking HSTS not configured |
D | 35~49 | Legacy protocols/ciphers (SSLv3/EXPORT/RC4 etc.) allowed Certificate mismatch/chain errors frequent Stapling fails, revocation checking impossible Security headers generally inadequate |
F | 0~34 | Handshake failure level defects Expired/self-signed/hostname mismatch Widespread weak protocols and ciphers allowed Overall TLS configuration failure |
Run a test to view the SSL/TLS security analysis.
Run a test to view the raw JSON data.
Sign in to view test history.
Sign in to manage domains.