Results for posteo.de
posteo.de uses HTTPS by default.
Chromium reports the following:
|Certificate||valid and trusted||The connection to this site is using a valid, trusted server certificate issued by GeoTrust EV RSA CA 2018.|
|Connection||secure connection settings||The connection to this site is encrypted and authenticated using TLS 1.3, X25519, and AES_256_GCM.|
|Resources||all served securely||All resources on this page are served securely.|
More information about the site's TLS/SSL configuration:
HSTS policy for https://posteo.de:
max-age=31536000; includeSubDomains; preload
Content Security Policy set in HTTP header:
connect-src https://api.posteo.de https://payment.posteo.de https://cdn.posteo.de wss://posteo.de 'self'; child-src 'self'; font-src 'self' data:; form-action https://www.paypal.com 'self' data:; frame-ancestors 'self'; frame-src 'self' blob:; img-src data: *; media-src 'self' https://cdn.posteo.de; object-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-eval' 'unsafe-inline'; default-src 'none'; reflected-xss block; referrer no-referrer;
Content Security Policy (CSP) implemented unsafely. This includes
script-src, overly broad sources such as
script-src, or not restricting the sources for
Clickjacking protection, using
The use of CSP's
Deny by default, using
Denying by default using
Restricts use of the
Blocks loading of active content over HTTP or FTP
Blocks loading of passive content over HTTP or FTP
This site's Content Security Policy allows the loading of passive content such as images or videos over insecure protocols such as HTTP or FTP. Consider changing them to load them over HTTPS.
Blocks inline styles by not allowing
Blocking inline styles can help prevent attackers from modifying the contents or appearance of your page. Moving styles to external stylesheets can also help make your site more maintainable.
Blocks execution of plug-ins, using
Blocking the execution of plug-ins via
The Content Security Policy tests are based on the ones from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll. The explanatory texts are from the Observatory by Mozilla website, CC-BY-SA 3.0. Any mistake or inaccuracy in the results is our fault.
Referrer Policy not set. This means that the default value
no-referrer-when-downgrade, leaking referrers in many situations, is used.
|X-Content-Type-Options||nosniff||X-Content-Type-Options header set to "nosniff"|
|X-Frame-Options||SAMEORIGIN||X-Frame-Options (XFO) implemented via the CSP frame-ancestors directive|
|X-XSS-Protection||1; mode=block||X-XSS-Protection header set to "1; mode=block"|
The header tests are based on the ones from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll. The explanatory texts are from the Observatory by Mozilla website, CC-BY-SA 3.0.
Secure means that the cookie will only be sent over a secure channel (HTTPS). This can mitigate MITM (man-in-the-middle) attacks.
SameSite can be used to instruct the browser to only send the cookie when the request is originating from the same site. This can mitigate CSRF (cross-site request forgery) attacks.
localStorage not used.
No third-party requests.
A third-party request is a request to a domain that's not
posteo.de or one of its subdomains.
The server posteo.de (18.104.22.168) appears to have been located in Germany during our test.
See more information (e.g., provider) about this IP address using KeyCDN's tool.
|content-security-policy||connect-src https://api.posteo.de https://payment.posteo.de https://cdn.posteo.de wss://posteo.de 'self'; child-src 'self'; font-src 'self' data:; form-action https://www.paypal.com 'self' data:; frame-ancestors 'self'; frame-src 'self' blob:; img-src data: *; media-src 'self' https://cdn.posteo.de; object-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-eval' 'unsafe-inline'; default-src 'none'; reflected-xss block; referrer no-referrer;|
|date||Tue, 19 Nov 2019 22:35:40 GMT|
|last-modified||Tue, 19 Nov 2019 21:31:38 GMT|
|public-key-pins||pin-sha256="fN88JfnaJETU3r1IBBELkRBvZI27UHb5fjqFdqntyGo="; pin-sha256="cDZJWRCnbfSbwWjSKoFUeIO+2q2mpgt8qovVIyyI8/I="; pin-sha256="YHg6lF6c81F7j83apmWtrzgANaHRN1gjRXGqMNGm5C0="; pin-sha256="n7PGfQw+GvUXtmEEEly4Uz0EhXpmWRh25lxDSmTdjAU="; pin-sha256="sfmSmDBmXyNx2UzwERrXQwON4WRfyPqvMMSkB8GL7UI="; pin-sha256="DMWN7Y2jmVhlgbHt84oHcjNOtd+teEsIktgmgfG/x9U="; pin-sha256="8qTkmsa3Rwl9ePKb3bO2gaU+cMRlexm1rbVcSgD87HE="; pin-sha256="i1PRtFyJzY/GkcV+FU5HjtGpTEm4bXVBni9ZPiqwg5k="; pin-sha256="Bc5nYUmZLuv/vmIQyPTkMfvzeNdni4/8+NQVm9IgwRU="; pin-sha256="pGSUcCKy0Gd2w4B5AXQf7HHtYRkFfTDevc+QVP6H9Z8="; pin-sha256="uTYoGk3b0PPZDmEwMuDgrp3/bCp1NRqAV+Zk9xa70sk="; max-age=2592000|
|strict-transport-security||max-age=31536000; includeSubDomains; preload|
This tool attempts to simulate what happens when a user visits a specified page with a typical browser. The browser has no addons/extensions installed, and Do Not Track (DNT) is not enabled, since this is the default setting in most browsers.
External files such as images, scripts and CSS are loaded, but the tool performs no interactions with the page — no links are clicked, no forms are submitted.
Disclaimer: The results presented here might not be 100% correct. Bugs happen. This tool is meant to be used by site owners as a starting point for improvements, not as a rigorous analysis.
Text about HTTPS partly adapted from the CIO Council's The HTTPS-Only Standard (public domain). MaxMind's GeoLite2 country database (CC-BY-SA 4.0) is used for GeoIP lookups. See here for more information.