Results for aktivix.org

Check again 2020-04-09 20:41:29 Etc/UTC

Insecure: HTTPS not used by default

aktivix.org does not use HTTPS by default.

Content Security Policy

Content Security Policy (CSP) header not implemented.

The Content Security Policy tests are based on the ones from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll. The explanatory texts are from the Observatory by Mozilla website, CC-BY-SA 3.0. Any mistake or inaccuracy in the results is our fault.

Referrer Policy

Referrer Policy not set. This means that the default value no-referrer-when-downgrade, leaking referrers in many situations, is used.

Subresource Integrity (SRI)

Subresource Integrity (SRI) not implemented, but all resources are loaded from a similar origin.

The Subresource Integrity test is based on the one from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll.

HTTP headers

Pass Header Value Result
X-Content-Type-Options X-Content-Type-Options header not implemented
X-Frame-Options X-Frame-Options (XFO) header not implemented
X-XSS-Protection X-XSS-Protection header not implemented

The header tests are based on the ones from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll. The explanatory texts are from the Observatory by Mozilla website, CC-BY-SA 3.0.

Cookies

First-party cookies (1)

Domain Name Value Expires on HttpOnly Secure SameSite
aktivix.org CAKEPHP 7o746n89oo8dnttgcft8... session

HttpOnly means that the cookie can only be read by the server, and not by JavaScript on the client. This can mitigate XSS (cross-site scripting) attacks.

Secure means that the cookie will only be sent over a secure channel (HTTPS). This can mitigate MITM (man-in-the-middle) attacks.

SameSite can be used to instruct the browser to only send the cookie when the request is originating from the same site. This can mitigate CSRF (cross-site request forgery) attacks.

GDPR: Rec. 60, Rec. 61, Rec. 69, Rec. 70, Rec. 75, Rec. 78, Art. 5.1.a, Art. 5.1.c, Art. 5.1.e, Art. 21, Art. 22, Art. 32.

e-PD (2002/58/EC). Rec. 24, 25, Art. 5.2.

e-PD revised (2009/136/EC). Rec. 65, 66.

More information

localStorage

localStorage not used.

Third-party requests

No third-party requests.

A third-party request is a request to a domain that's not aktivix.org or one of its subdomains.

GDPR: Rec. 69, Rec. 70, Art. 5.1.b-c, Art. 25.

Server location

The server aktivix.org (162.247.75.192) appears to have been located in United States of America during our test.

See more information (e.g., provider) about this IP address using KeyCDN's tool.

Raw headers

Header Value
connection Keep-Alive
content-encoding gzip
content-length 871
content-type text/html; charset=UTF-8
date Thu, 09 Apr 2020 20:41:12 GMT
keep-alive timeout=5, max=100
p3p CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
server Apache/2.4.10 (Debian)
set-cookie CAKEPHP=7o746n89oo8dnttgcft8sr99h2; path=/ CakeCookie[lang]=Q2FrZQ%3D%3D.Hok%3D; path=/; secure
vary Accept-Encoding

What this tool checks (and doesn't check)

This tool attempts to simulate what happens when a user visits a specified page with a typical browser. The browser has no addons/extensions installed, and Do Not Track (DNT) is not enabled, since this is the default setting in most browsers.

External files such as images, scripts and CSS are loaded, but the tool performs no interactions with the page — no links are clicked, no forms are submitted.

Disclaimer: The results presented here might not be 100% correct. Bugs happen. This tool is meant to be used by site owners as a starting point for improvements, not as a rigorous analysis.

Text about HTTPS partly adapted from the CIO Council's The HTTPS-Only Standard (public domain). MaxMind's GeoLite2 country database (CC-BY-SA 4.0) is used for GeoIP lookups. See here for more information.