Results for www.hushmail.com

Check again 2020-04-10 05:08:52 Etc/UTC

HTTPS by default

www.hushmail.com uses HTTPS by default.

Chromium reports the following:

State Title Summary Description
Certificate valid and trusted The connection to this site is using a valid, trusted server certificate issued by GeoTrust EV RSA CA 2018.
Connection secure connection settings The connection to this site is encrypted and authenticated using TLS 1.2, ECDHE_RSA with X25519, and AES_256_GCM.
Resources all served securely All resources on this page are served securely.

More information about the site's TLS/SSL configuration:

HTTP Strict Transport Security (HSTS)

HSTS policy for https://www.hushmail.com:
max-age=31536000

Pass Test
max-age set to at least 6 months
includeSubDomains — policy also applies to subdomains
preload — requests inclusion in preload lists [only relevant for base domain]

HSTS not set on base domain https://hushmail.com.

Content Security Policy

Content Security Policy set in HTTP header: default-src 'none'; media-src *; manifest-src 'none'; frame-src https://*.hushmail.com https://forms.hubspot.com https://*.hubspot.com https://*.google.com https://*.gstatic.com https://forms.hsforms.com https://*.google-analytics.com https://*.doubleclick.net https://hushforms.com https://www.hushmail.com 'self'; object-src 'self'; child-src 'self'; font-src https://*.hushmail.com 'self'; style-src https://*.hushmail.com https://hushforms.com 'self' 'unsafe-inline'; connect-src https://*.hushmail.com https://*.hubspot.com https://frstre.com https://tapfiliate.com https://hushforms.com https://*.capterra.com https://*.google.com 'self'; img-src * data:; script-src https://*.hushmail.com https://js.hs-scripts.com https://js.hs-analytics.net https://js.hsleadflows.net https://js.hsforms.net https://js.usemessages.com https://forms.hubspot.com https://forms.hsforms.com https://*.google.com https://*.gstatic.com https://*.googletagmanager.com https://*.googleadservices.com https://*.google-analytics.com https://*.doubleclick.net https://*.tapfiliate.com https://hushforms.com https://*.capterra.com 'self' 'unsafe-inline' 'unsafe-eval'; frame-ancestors 'self' https://*.hushmail.com; report-uri /cspreport/

Content Security Policy (CSP) implemented unsafely. This includes 'unsafe-inline' or data: inside script-src, overly broad sources such as https: inside object-src or script-src, or not restricting the sources for object-src or script-src.

Pass Test Info
Clickjacking protection, using frame-ancestors

The use of CSP's frame-ancestors directive offers fine-grained control over who can frame your site.

Show
Deny by default, using default-src 'none'

Denying by default using default-src 'none' can ensure that your Content Security Policy doesn't allow the loading of resources you didn't intend to allow.

Show
Restricts use of the <base> tag by using base-uri 'none', base-uri 'self', or specific origins

The base tag can be used to trick your site into loading scripts from untrusted origins.

Show
Restricts where <form> contents may be submitted by using form-action 'none', form-action 'self', or specific URIs

Malicious JavaScript or content injection could modify where sensitive form data is submitted to or create additional forms for data exfiltration.

Show
Blocks loading of active content over HTTP or FTP

Loading JavaScript or plugins can allow a man-in-the-middle to execute arbitrary code on your website. Restricting your policy and changing links to HTTPS can help prevent this.

Show
Blocks loading of passive content over HTTP or FTP

This site's Content Security Policy allows the loading of passive content such as images or videos over insecure protocols such as HTTP or FTP. Consider changing them to load them over HTTPS.

Show
Uses CSP3's 'strict-dynamic' directive to allow dynamic script loading (optional)

'strict-dynamic' lets you use a JavaScript shim loader to load all your site's JavaScript dynamically, without having to track script-src origins.

Show
Blocks execution of JavaScript's eval() function by not allowing 'unsafe-eval' inside script-src

Blocking the use of JavaScript's eval() function can help prevent the execution of untrusted code.

Show
Blocks execution of inline JavaScript by not allowing 'unsafe-inline' inside script-src

Blocking the execution of inline JavaScript provides CSP's strongest protection against cross-site scripting attacks. Moving JavaScript to external files can also help make your site more maintainable.

Show
Blocks inline styles by not allowing 'unsafe-inline' inside style-src

Blocking inline styles can help prevent attackers from modifying the contents or appearance of your page. Moving styles to external stylesheets can also help make your site more maintainable.

Show
Blocks execution of plug-ins, using object-src restrictions

Blocking the execution of plug-ins via object-src 'none' or as inherited from default-src can prevent attackers from loading Flash or Java in the context of your page.

Show

The Content Security Policy tests are based on the ones from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll. The explanatory texts are from the Observatory by Mozilla website, CC-BY-SA 3.0. Any mistake or inaccuracy in the results is our fault.

Referrer Policy

Referrer Policy not set. This means that the default value no-referrer-when-downgrade, leaking referrers in many situations, is used.

Subresource Integrity (SRI)

Subresource Integrity (SRI) not implemented, and external resources are loaded over HTTP or use protocol-relative URLs via src="//...".

The following third-party resources are not loaded using SRI:

Type URL
script https://www.googletagmanager.com/gtag/js?id=UA-1837381-13
script https://script.tapfiliate.com/tapfiliate.js
script //js.hs-scripts.com/4429584.js
script https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1070742489/?random=1586495318975&cv...
script https://www.google-analytics.com/analytics.js
script https://www.googletagmanager.com/gtag/js?id=AW-1070742489&l=dataLayer&cx=c
script https://js.hsleadflows.net/leadflows.js
script //js.hs-analytics.net/analytics/1586495100000/4429584.js
script https://js.usemessages.com/conversations-embed.js
script https://js.hsadspixel.net/fb.js
script https://js.hs-banner.com/4429584.js
script https://www.googleadservices.com/pagead/conversion_async.js

The Subresource Integrity test is based on the one from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll.

HTTP headers

Pass Header Value Result
X-Content-Type-Options X-Content-Type-Options header not implemented
X-Frame-Options SAMEORIGIN X-Frame-Options (XFO) implemented via the CSP frame-ancestors directive
X-XSS-Protection X-XSS-Protection header not implemented

The header tests are based on the ones from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll. The explanatory texts are from the Observatory by Mozilla website, CC-BY-SA 3.0.

Cookies

First-party cookies (11)

Domain Name Value Expires on HttpOnly Secure SameSite
www.hushmail.com PHPSESSID 2861F9DD2C005A8BD665... session
.hushmail.com PHPSESSID2 3462EE84CB49632FA86E... 2020-06-09 05:08:40Z
.hushmail.com HECB_80cbd92127d19bf... 2edae9856db4eac5073d... 2020-05-10 05:08:38Z
.hushmail.com HECB_db5ce5e0239d0f0... ce0c8230e06af53e3514... 2020-05-10 05:08:38Z
.hushmail.com _ga GA1.2.696652423.1586... 2022-04-10 05:08:38Z
.hushmail.com _gid GA1.2.846779701.1586... 2020-04-11 05:08:38Z
.hushmail.com _gat_gtag_UA_1837381... 1 2020-04-10 05:09:38Z
.hushmail.com __hstc 103768735.9072b943fe... 2021-05-05 05:08:39Z (Lax)
.hushmail.com hubspotutk 9072b943fe06e809ef8a... 2021-05-05 05:08:39Z (Lax)
.hushmail.com __hssrc 1 session (Lax)
.hushmail.com __hssc 103768735.1.15864953... 2020-04-10 05:38:39Z (Lax)

Third-party cookies (3)

Domain Name Value Expires on HttpOnly Secure SameSite
hushforms.com PHPSESSID 190894614E7DBFFE8936... session
hushforms.com PHPSESSID2 3462EE84CB49632FA86E... 2020-06-09 05:08:39Z
.doubleclick.net test_cookie CheckForPermission 2020-04-10 05:23:39Z (None)

HttpOnly means that the cookie can only be read by the server, and not by JavaScript on the client. This can mitigate XSS (cross-site scripting) attacks.

Secure means that the cookie will only be sent over a secure channel (HTTPS). This can mitigate MITM (man-in-the-middle) attacks.

SameSite can be used to instruct the browser to only send the cookie when the request is originating from the same site. This can mitigate CSRF (cross-site request forgery) attacks.

GDPR: Rec. 60, Rec. 61, Rec. 69, Rec. 70, Rec. 75, Rec. 78, Art. 5.1.a, Art. 5.1.c, Art. 5.1.e, Art. 21, Art. 22, Art. 32.

e-PD (2002/58/EC). Rec. 24, 25, Art. 5.2.

e-PD revised (2009/136/EC). Rec. 65, 66.

More information

localStorage

localStorage not used.

Third-party requests

22 requests (22 secure, 0 insecure) to 16 unique hosts.

A third-party request is a request to a domain that's not hushmail.com or one of its subdomains.

Host IP Country Classification URLs
api.hubspot.com 104.19.155.83 US Content (HubSpot) Show (3)
forms.hubspot.com 104.19.155.83 US Content (HubSpot) Show (1)
googleads.g.doubleclick.net 216.58.201.226 US Disconnect (Google) Show (1)
hushforms.com 72.51.60.181 CA Show (1)
js.hs-analytics.net 104.17.69.176 US Analytics (HubSpot) Show (1)
js.hs-scripts.com 104.17.211.204 US Show (1)
js.hsleadflows.net 104.17.233.204 US Show (1)
js.usemessages.com 104.17.237.204 US Show (1)
script.tapfiliate.com 13.225.31.48 US Show (1)
stats.g.doubleclick.net 74.125.133.155 US Disconnect (Google) Show (1)
track.hubspot.com 104.19.155.83 US Content (HubSpot) Show (1)
www.google-analytics.com 216.58.209.238 US Disconnect (Google) Show (2)
www.google.com 172.217.22.132 US Content (Google) Show (2)
www.google.fr 216.58.215.35 US Content (Google) Show (2)
www.googleadservices.com 216.58.213.162 US Disconnect (Google) Show (1)
www.googletagmanager.com 216.58.209.232 US Show (2)

We use Disconnect's open source list of trackers to classify hosts.

GDPR: Rec. 69, Rec. 70, Art. 5.1.b-c, Art. 25.

Server location

The server www.hushmail.com (72.51.60.140) appears to have been located in Canada during our test.

See more information (e.g., provider) about this IP address using KeyCDN's tool.

Raw headers

Header Value
app-version
cache-control no-store, no-cache, must-revalidate, post-check=0, pre-check=0
connection keep-alive
content-encoding gzip
content-security-policy default-src 'none'; media-src *; manifest-src 'none'; frame-src https://*.hushmail.com https://forms.hubspot.com https://*.hubspot.com https://*.google.com https://*.gstatic.com https://forms.hsforms.com https://*.google-analytics.com https://*.doubleclick.net https://hushforms.com https://www.hushmail.com 'self'; object-src 'self'; child-src 'self'; font-src https://*.hushmail.com 'self'; style-src https://*.hushmail.com https://hushforms.com 'self' 'unsafe-inline'; connect-src https://*.hushmail.com https://*.hubspot.com https://frstre.com https://tapfiliate.com https://hushforms.com https://*.capterra.com https://*.google.com 'self'; img-src * data:; script-src https://*.hushmail.com https://js.hs-scripts.com https://js.hs-analytics.net https://js.hsleadflows.net https://js.hsforms.net https://js.usemessages.com https://forms.hubspot.com https://forms.hsforms.com https://*.google.com https://*.gstatic.com https://*.googletagmanager.com https://*.googleadservices.com https://*.google-analytics.com https://*.doubleclick.net https://*.tapfiliate.com https://hushforms.com https://*.capterra.com 'self' 'unsafe-inline' 'unsafe-eval'; frame-ancestors 'self' https://*.hushmail.com; report-uri /cspreport/
content-type text/html; charset=UTF-8
date Fri, 10 Apr 2020 05:08:37 GMT
expires Thu, 19 Nov 1981 08:52:00 GMT
pragma no-cache
server Apache
set-cookie PHPSESSID=2861F9DD2C005A8BD665E026D4FFC1A4; path=/; secure; HttpOnly PHPSESSID2=3462EE84CB49632FA86E315D779F1DE2; expires=Tue, 09-Jun-2020 05:08:37 GMT; path=/; domain=hushmail.com; secure HECB_80cbd92127d19bfb6d13664e243d90d2=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; expires=Sun, 10-May-2020 05:08:37 GMT; path=/; domain=hushmail.com; secure; httponly HECB_db5ce5e0239d0f077bacaf930ca36c5b=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; expires=Sun, 10-May-2020 05:08:37 GMT; path=/; domain=hushmail.com; secure; httponly
strict-transport-security max-age=31536000
transfer-encoding chunked
vary Accept-Encoding
x-frame-options SAMEORIGIN

What this tool checks (and doesn't check)

This tool attempts to simulate what happens when a user visits a specified page with a typical browser. The browser has no addons/extensions installed, and Do Not Track (DNT) is not enabled, since this is the default setting in most browsers.

External files such as images, scripts and CSS are loaded, but the tool performs no interactions with the page — no links are clicked, no forms are submitted.

Disclaimer: The results presented here might not be 100% correct. Bugs happen. This tool is meant to be used by site owners as a starting point for improvements, not as a rigorous analysis.

Text about HTTPS partly adapted from the CIO Council's The HTTPS-Only Standard (public domain). MaxMind's GeoLite2 country database (CC-BY-SA 4.0) is used for GeoIP lookups. See here for more information.