Results: www.cds.pt
Results obtained at: 2026-03-12 09:51:38
Seconds until new update:
119
Website component
Domain security and configuration
The domain name is not signed with DNSSEC.
This test was not performed because there were no technical conditions for its execution or because it depends on a previous test that failed.
For more information about STARTTLS and DANE and its implementation please check the CNCS-PT reference document "Technical Recomendation 01/21 - STARTTLS and DANE" (Only available in Portuguese).
This test was not performed because there were no technical conditions for its execution or because it depends on a previous test that failed.
Technical details:
DNSSEC does not exist
This test was not performed because there were no technical conditions for its execution or because it depends on a previous test that failed.
Technical details:
DNSSEC does not exist
Connection security
There is a channel that allows a secure communication between the internet browser and the server hosting the internet domain.
Technical details:
172.67.189.227: HTTPS Enabled
There is an active redirection of communications to the secure channel (HTTPS).
The internet domain does not support HSTS.
Technical details:
HSTS Header: Not Found
This test was not performed because there were no technical conditions for its execution or because it depends on a previous test that failed.
The Internet domain supports one or more versions of the TLS protocol that are considered to be unsafe.
Technical details:
cds.pt: SSLv2:false | SSLv3:false | TLSv1.0:true | TLSv1.1:true | TLSv1.2:true | TLSv1.3:true
The web server(s) of the internet domain support the secure renegotiation of the TLS protocol.
The digital certificate associated to the internet domain is not expired and has a validity period of more than 30 days.
Technical details:
cds.pt: 06-06-2026
The digital certificate chain is valid and does not contains configuration errors.
Technical details:
Self Signed Cert:false | HTTPS Bad Chain:false | HTTPS Probably Missing Intermediate Cert:false | HTTPS Publicly Trusted:true
Security options
In addition to the HSTS security header there are still other HTTP headers that can contribute to improve the security of your internet domain name.
The internet domain does not support the "X-Content-Type-Options" security header.
Technical details:
X-Content-Type-Options header not found.
1. "deny", stating that the internet domain can never be "framed" within an internet page associated with another domain;
2. "sameorigin", stating that the internet domain can only be "framed" within an internet page of the domain itself;
3. "allow-from", stating that the internet domain can only be "framed" within an internet page belonging to the indicated domain(s).
The internet domain does not support the "X-Frame-Options" security header.
Technical details:
X-Frame-Options header not found.
This header can be implemented with the following options:
1. "no-referrer", where all "Referer" information is omitted;
2. "no-referrer-when-downgrade", where "Referer" information is only sent when the same level of security is maintained (HTTP -> HTTP or HTTPS -> HTTPS);
3. "origin", where the information sent in "Referer" is only relative to the origin, for example, the document https://example.pt/page sends as "Referer" the value "https://example.pt/" ;
4. "origin-when-cross-origin", where the "Referer" information is sent in full when within the same domain, but only the origin when for other domains;
5. "same-origin", where "Referer" information is only sent within the same domain;
6. "strict-origin", where the "Referer" information is only relative to the origin and only sent when the same level of security is maintained;
7. "strict-origin-when-cross-origin", where the "Referer" information is sent in full when within the same domain, but only the origin when for other domains and maintaining the level of security;
8. "unsafe-url", where the "Referer" information is sent in full to any domain.
The internet domain does not support the "Referrer-Policy" security header.
Technical details:
Referrer-Policy header not found.
The internet domain does not support the "Content-Security-Policy" security header.
Technical details:
Content-Security-Policy header not found.
E-mail component
E-mail domain security and configuration
DNSSEC (Domain Name System Security Extensions) is a security extension to the DNS protocol designed to secure and authenticate DNS traffic. These extensions use asymmetric encryption to ensure the authenticity and integrity of the information exchanged between DNS servers and between these and the user's applications.
At least one domain name of the email server(s) (MX) is not signed with DNSSEC.
This test was not performed because there were no technical conditions for its execution or because it depends on a previous test that failed.
Authentication and Integrity
SPF (Sender Policy Framework) consists of a validation standard for the e-mail channel, based on the use of the Domain Name System (DNS) to publish the IP address(es) of the server(s) authorized to send e-mail on behalf of the domain. This is a method that allows the domain holder to specify which e-mail server (or servers) are allowed to send messages and enable the subsequent verification by the destination server.
For more information about SPF and its implementation please check the CNCS-PT reference document "Technical Recomendation 01/19 - SPF, DKIM e DMARC" (Only available in Portuguese).
The email domain has an SPF record configured.
Technical details:
SPF Record: v=spf1 include:spf.mailjet.com mx a include:relays.tuganetcloud.com -all
To fully comply you have to implement a "hardfail" policy (-all). The implementation of a "softfail" policy (~ all) will result in a partial compliance of the requirements. The remaining SPF policy settings or an incorrect registry setting (for example, if there are more than ten DNS records to be resolved) result in non-compliance with the requirements of this test.
The e-mail domain implements a valid and sufficiently secure SPF policy.
For more information about DKIM and its implementation please check the CNCS-PT reference document "Technical Recomendation 01/19 - SPF, DKIM e DMARC" (Only available in Portuguese).
To fully comply with the requirements of this validation, and considering RFC2308, the domain name server is expected to respond "NOERROR" to the query "_domainkey.<domain_name>". If the answer is "NXDOMAIN" it is considered that you don't have DKIM enabled.
The e-mail domain name has a DKIM record configured.
The e-mail domain does not have a DMARC record associated.
Technical details:
DMARC Record: Not Found
Through the definition of the "rua=" and "ruf =" options, DMARC also enables the reception of aggregated reports of conformity ("rua") and forensic ("ruf") for a better vision and understanding of the degree of illegitimate use of the domain.
This test was not performed because there were no technical conditions for its execution or because it depends on a previous test that failed.
Confidentiality
For more information about STARTTLS and DANE and its implementation please check the CNCS-PT reference document "Technical Recomendation 01/21 - STARTTLS and DANE" (Only available in Portuguese).
The e-mail server(s) associated to the domain do not support STARTTLS connections.
Technical details:
mx.spamexperts.com:25, mx.spamexperts.com:587, lastmx.spamexperts.net:25, lastmx.spamexperts.net:587, fallbackmx.spamexperts.eu:25, fallbackmx.spamexperts.eu:587
Older versions of TLS (SSL v2.0, v3.0 and TLS v1.0) contain several well-known vulnerabilities and should not be adopted. The use of the TLS v1.1 protocol is considered a partial compliance with the test, and the transition to TLS v1.2 and / or higher (which represents a complete fulfillment of the verification) is advised.
This test was not performed because there were no technical conditions for its execution or because it depends on a previous test that failed.
For more information about STARTTLS and DANE and its implementation please check the CNCS-PT reference document "Technical Recomendation 01/21 - STARTTLS and DANE" (Only available in Portuguese).
This test was not performed because there were no technical conditions for its execution or because it depends on a previous test that failed.
Technical details:
DNSSEC does not exist
This test was not performed because there were no technical conditions for its execution or because it depends on a previous test that failed.
Technical details:
DNSSEC does not exist