Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: industry.socs.binus.ac.id
I ran this command:
It produced this output:
My web server is (include version):
The operating system my web server runs on is (include version): CentOS , Apache 2.4.6 . PHP 5
My hosting provider, if applicable, is:
I can login to a root shell on my machine (yes or no, or I don’t know): yes
I’m using a control panel to manage my site (no, or provide the name and version of the control panel):
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you’re using Certbot): 0.31.0
CN=industry.socs.binus.ac.id
07.04.2019
06.07.2019
expires in 90 days industry.socs.binus.ac.id - 1 entry
and a Grade B (checking the redirects).
That domain has a curious problem: The certificate has
Signatur: SHA256 With RSA-Encryption
but my tool reports Sha1 as Hash algorithm. Few days earlier, a user reportet that as bug.
Searching - the reason: The tool opens a tcp connection, adds a SSL stream, then checks the properties of that stream to find Tls.1.0, the key exchange and the cipher. If SHA1 is reportet, there must be an older component (an old firewall or something else) that can't handle SHA256. So this old component produces a downgrade.
I'm pretty sure this thread isn't the right place for debugging your tool. But SHA1/SHA2 is also used in the cipher used by TLS. If you see -SHA on the end of a cipher suit, it uses SHA1. SHA256 or SHA384 means SHA2 is used. SHA1 certificates (besides root certs) can't be used since 2017.
@exalted Seems to me your issue is fixed currently, right?