Results for www.anpa.de

Check again 2020-04-09 20:41:50 Etc/UTC

HTTPS by default

www.anpa.de uses HTTPS by default.

Chromium reports the following:

State Title Summary Description
Certificate valid and trusted The connection to this site is using a valid, trusted server certificate issued by Let's Encrypt Authority X3.
Connection secure connection settings The connection to this site is encrypted and authenticated using TLS 1.2, ECDHE_RSA with P-256, and AES_128_GCM.
Resources all served securely All resources on this page are served securely.

More information about the site's TLS/SSL configuration:

Strict Transport Security

HTTP Strict Transport Security (HSTS) not implemented.

Content Security Policy

Content Security Policy (CSP) header not implemented.

The Content Security Policy tests are based on the ones from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll. The explanatory texts are from the Observatory by Mozilla website, CC-BY-SA 3.0. Any mistake or inaccuracy in the results is our fault.

Referrer Policy

Referrer Policy not set. This means that the default value no-referrer-when-downgrade, leaking referrers in many situations, is used.

Subresource Integrity (SRI)

Subresource Integrity (SRI) not implemented, and external resources are loaded over HTTP or use protocol-relative URLs via src="//...".

The following third-party resources are not loaded using SRI:

Type URL
script //pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
script https://www.google.com/recaptcha/api.js
script https://adservice.google.com/adsid/integrator.js?domain=www.anpa.de
script https://adservice.google.fr/adsid/integrator.js?domain=www.anpa.de
script //pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
script https://pagead2.googlesyndication.com/pagead/js/r20200406/r20190131/show_ads_impl_fy2019.js
script https://www.gstatic.com/recaptcha/releases/OOKISvkNnVD_m_9dreR_1S0n/recaptcha__en.js
script //connect.facebook.net/de_DE/all.js#xfbml=1
script https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
script https://connect.facebook.net/de_DE/all.js?hash=04adf11b54514de2edbe23095f3d52ab&ua=modern_es6

The Subresource Integrity test is based on the one from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll.

HTTP headers

Pass Header Value Result
X-Content-Type-Options X-Content-Type-Options header not implemented
X-Frame-Options X-Frame-Options (XFO) header not implemented
X-XSS-Protection X-XSS-Protection header not implemented

The header tests are based on the ones from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll. The explanatory texts are from the Observatory by Mozilla website, CC-BY-SA 3.0.

Cookies

Third-party cookies (1)

Domain Name Value Expires on HttpOnly Secure SameSite
.doubleclick.net IDE AHWqTUmpoLJMSwgd-qCW... 2021-05-04 20:41:42Z (None)

HttpOnly means that the cookie can only be read by the server, and not by JavaScript on the client. This can mitigate XSS (cross-site scripting) attacks.

Secure means that the cookie will only be sent over a secure channel (HTTPS). This can mitigate MITM (man-in-the-middle) attacks.

SameSite can be used to instruct the browser to only send the cookie when the request is originating from the same site. This can mitigate CSRF (cross-site request forgery) attacks.

GDPR: Rec. 60, Rec. 61, Rec. 69, Rec. 70, Rec. 75, Rec. 78, Art. 5.1.a, Art. 5.1.c, Art. 5.1.e, Art. 21, Art. 22, Art. 32.

e-PD (2002/58/EC). Rec. 24, 25, Art. 5.2.

e-PD revised (2009/136/EC). Rec. 65, 66.

More information

localStorage

localStorage used:

Key Value
google_adsense_settings {"ca-pub-2139722388889994":["ca-pub-21397223888899...
google_ama_config [[[[null,0,null,[],null,null,"DIV#content"],4,["12...
google_ama_settings [1586551301493,true,null,null,[]]
google_experiment_mod12 277
google_experiment_mod13 131
google_experiment_mod21 664
google_experiment_mod26 888
google_experiment_mod29 648
google_experiment_mod30 195
google_experiment_mod31 654
google_experiment_mod5 856
google_experiment_mod6 576
google_experiment_mod7 318
google_pem_mod 351

Third-party requests

41 requests (41 secure, 0 insecure) to 16 unique hosts.

A third-party request is a request to a domain that's not anpa.de or one of its subdomains.

Host IP Country Classification URLs
adservice.google.com 172.217.18.194 US Content (Google) Show (1)
adservice.google.fr 216.58.215.34 US Content (Google) Show (1)
bid.g.doubleclick.net 74.125.71.154 US Disconnect (Google) Show (1)
connect.facebook.net 179.60.192.7 US Disconnect (Facebook) Show (2)
fonts.googleapis.com 172.217.18.202 US Content (Google) Show (1)
fonts.gstatic.com 216.58.204.131 US Content (Google) Show (2)
gcdn.2mdn.net 216.58.206.238 US Disconnect (Google) Show (1)
googleads.g.doubleclick.net 216.58.198.194 US Disconnect (Google) Show (5)
imasdk.googleapis.com 216.58.213.170 US Content (Google) Show (3)
pagead2.googlesyndication.com 216.58.206.226 US Disconnect (Google) Show (11)
r1---sn-25ge7nsd.c.2mdn.net 173.194.183.230 US Disconnect (Google) Show (1)
tpc.googlesyndication.com 216.58.198.193 US Disconnect (Google) Show (6)
www.facebook.com 179.60.192.36 US Disconnect (Facebook) Show (3)
www.google.com 172.217.18.196 US Content (Google) Show (1)
www.googletagservices.com 216.58.204.98 US Disconnect (Google) Show (1)
www.gstatic.com 216.58.213.163 US Content (Google) Show (1)

We use Disconnect's open source list of trackers to classify hosts.

GDPR: Rec. 69, Rec. 70, Art. 5.1.b-c, Art. 25.

Server location

The server www.anpa.de (193.242.210.123) appears to have been located in Netherlands during our test.

See more information (e.g., provider) about this IP address using KeyCDN's tool.

Raw headers

Header Value
accept-ranges bytes
connection Keep-Alive
content-encoding gzip
content-length 237
content-type text/html
date Thu, 09 Apr 2020 20:41:39 GMT
etag "163-586c89cd0ad40-gzip"
keep-alive timeout=5, max=100
last-modified Thu, 18 Apr 2019 07:04:26 GMT
server Apache/2.4.10 (Debian) OpenSSL/1.0.1t
vary Accept-Encoding

What this tool checks (and doesn't check)

This tool attempts to simulate what happens when a user visits a specified page with a typical browser. The browser has no addons/extensions installed, and Do Not Track (DNT) is not enabled, since this is the default setting in most browsers.

External files such as images, scripts and CSS are loaded, but the tool performs no interactions with the page — no links are clicked, no forms are submitted.

Disclaimer: The results presented here might not be 100% correct. Bugs happen. This tool is meant to be used by site owners as a starting point for improvements, not as a rigorous analysis.

Text about HTTPS partly adapted from the CIO Council's The HTTPS-Only Standard (public domain). MaxMind's GeoLite2 country database (CC-BY-SA 4.0) is used for GeoIP lookups. See here for more information.