Mirror Monitor

Get the full history as JSON: report.json

Source code:https://gitlab.com/fdroid/mirror-monitor

https://f-droid.org/repo
ip5.9.48.82
fingerprint43238D512C1E5EB2D6569F4A3AFBF5523418B82E0A3ED1552770ABB9A9C9CCAB
nameF-Droid
addresshttps://f-droid.org/repo
timestamp1558458971000
starttime1558499769
duration3.003765106201172
status200
TLSTLSv1.2
headers
DateWed, 22 May 2019 04:36:10 GMT
ServerApache
Strict-Transport-Securitymax-age=31536000; includeSubDomains
Content-Security-Policydefault-src 'none'; base-uri 'self'; block-all-mixed-content; connect-src 'self'; font-src 'self'; form-action 'self' https://search.f-droid.org; frame-ancestors 'self'; img-src 'self' https://f-droid.org https://fdroid.gitlab.io; media-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline';
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
X-Xss-Protection1; mode=block
Last-ModifiedTue, 21 May 2019 17:39:57 GMT
ETag"21a5b2-5896956610717"
Accept-Rangesbytes
Content-Length2205106
Via1.1 f-droid.org (Apache/2.4.25)
Age1261
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
serverf-droid.org:443
connectionTLS
count10
min0.6017883110000001
max0.6133646610000001
average0.6079489654000001
stddev0.0039058278885613167
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://ftp.fau.de/fdroid/repo
ip131.188.12.211
fingerprint43238D512C1E5EB2D6569F4A3AFBF5523418B82E0A3ED1552770ABB9A9C9CCAB
nameF-Droid
addresshttps://f-droid.org/repo
timestamp1558458971000
starttime1558499924
duration4.650712013244629
status200
TLSTLSv1.2
headers
DateWed, 22 May 2019 04:38:45 GMT
ServerApache/2.4
Last-ModifiedTue, 21 May 2019 17:39:57 GMT
ETag"21a5b2-5896956610717"
Accept-Rangesbytes
Content-Length2205106
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
serverftp.fau.de:443
connectionTLS
count10
min0.831203248
max0.8329810070000001
average0.8320352186000001
stddev0.0005395294185338289
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://mirror.cyberbits.eu/fdroid/repo
ip51.15.182.163
fingerprint43238D512C1E5EB2D6569F4A3AFBF5523418B82E0A3ED1552770ABB9A9C9CCAB
nameF-Droid
addresshttps://f-droid.org/repo
timestamp1558458971000
starttime1558499889
duration5.516891002655029
status200
TLSTLSv1.2
headers
Servernginx
DateWed, 22 May 2019 04:38:10 GMT
Content-Typeapplication/java-archive
Content-Length2205106
Last-ModifiedTue, 21 May 2019 17:39:57 GMT
Connectionkeep-alive
ETag"5ce437ed-21a5b2"
Accept-Rangesbytes
tlsping
servermirror.cyberbits.eu:443
connectionTLS
count10
min0.850887275
max1.163371665
average1.0461201183
stddev0.08705615443165433
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://fdroid.tetaneutral.net/fdroid/repo
ip89.234.156.230
fingerprint43238D512C1E5EB2D6569F4A3AFBF5523418B82E0A3ED1552770ABB9A9C9CCAB
nameF-Droid
addresshttps://f-droid.org/repo
timestamp1558458971000
starttime1558499856
duration2.777935028076172
status200
TLSTLSv1.2
headers
Servernginx/1.10.3
DateWed, 22 May 2019 04:37:36 GMT
Content-Typeapplication/java-archive
Content-Length2205106
Last-ModifiedTue, 21 May 2019 17:39:57 GMT
Connectionkeep-alive
ETag"5ce437ed-21a5b2"
Accept-Rangesbytes
tlsping
serverfdroid.tetaneutral.net:443
connectionTLS
count10
min0.549875744
max0.551377365
average0.5506569561
stddev0.00056970141833848
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (dh 1024) of lower strength than certificate key
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (dh 1024) of lower strength than certificate key
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (dh 1024) of lower strength than certificate key
least strengthA
https://bubu1.eu/fdroid/repo
ip176.9.145.28
fingerprint43238D512C1E5EB2D6569F4A3AFBF5523418B82E0A3ED1552770ABB9A9C9CCAB
nameF-Droid
addresshttps://f-droid.org/repo
timestamp1558458971000
starttime1558499908
duration5.329614877700806
status200
TLSTLSv1.3
headers
DateWed, 22 May 2019 04:38:30 GMT
ServerApache/2.4.39 (Unix) OpenSSL/1.1.1b
Strict-Transport-Securitymax-age=15768000
Upgradeh2
ConnectionUpgrade, Keep-Alive
Last-ModifiedTue, 21 May 2019 17:39:57 GMT
ETag"21a5b2-5896956610717"
Accept-Rangesbytes
Content-Length2205106
Keep-Alivetimeout=5, max=100
Content-Typeapplication/java-archive
tlsping
serverbubu1.eu:443
connectionTLS
count10
min0.7433335240000001
max0.752089758
average0.7479600617
stddev0.003758459887872153
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
least strengthA
https://fdroid.swedneck.xyz/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.swedneck.xyz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.VerifiedHTTPSConnection object at 0x7f45a8313240>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1558499923
duration0.18414998054504395
status200
TLS[Errno -2] Name or service not known
headers
DateWed, 22 May 2019 04:38:30 GMT
ServerApache/2.4.39 (Unix) OpenSSL/1.1.1b
Strict-Transport-Securitymax-age=15768000
Upgradeh2
ConnectionUpgrade, Keep-Alive
Last-ModifiedTue, 21 May 2019 17:39:57 GMT
ETag"21a5b2-5896956610717"
Accept-Rangesbytes
Content-Length2205106
Keep-Alivetimeout=5, max=100
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
least strengthA
https://mirror.jarsilio.com/fdroid/repo
ip5.135.191.101
fingerprint43238D512C1E5EB2D6569F4A3AFBF5523418B82E0A3ED1552770ABB9A9C9CCAB
nameF-Droid
addresshttps://f-droid.org/repo
timestamp1558458971000
starttime1558499948
duration4.51706600189209
status200
TLSTLSv1.2
headers
Servernginx/1.10.3
DateWed, 22 May 2019 04:39:09 GMT
Content-Typeapplication/java-archive
Content-Length2205106
Last-ModifiedTue, 21 May 2019 17:39:57 GMT
Connectionkeep-alive
ETag"5ce437ed-21a5b2"
Strict-Transport-Securitymax-age=15768000
Accept-Rangesbytes
tlsping
servermirror.jarsilio.com:443
connectionTLS
count10
min1.285618199
max1.455771098
average1.3139518626000002
stddev0.052373950233906306
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
least strengthA
https://ftp.osuosl.org/pub/fdroid/repo
ip64.50.236.52
fingerprint43238D512C1E5EB2D6569F4A3AFBF5523418B82E0A3ED1552770ABB9A9C9CCAB
nameF-Droid
addresshttps://f-droid.org/repo
timestamp1558458971000
starttime1558499964
duration4.574355125427246
status200
TLSTLSv1.2
headers
DateWed, 22 May 2019 04:39:25 GMT
ServerApache
Last-ModifiedTue, 21 May 2019 17:39:57 GMT
ETag"21a5b2-5896956610717"
Accept-Rangesbytes
Content-Length2205106
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/x-java-archive
tlsping
serverftp.osuosl.org:443
connectionTLS
count10
min0.519195787
max0.523801375
average0.5206975978
stddev0.0017633067199045553
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
least strengthC
https://fdroid.garym.co/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.garym.co', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.VerifiedHTTPSConnection object at 0x7f45a749c588>: Failed to establish a new connection: [Errno -3] Temporary failure in name resolution'))
starttime1558499973
duration3.7849719524383545
status200
TLS[Errno -3] Temporary failure in name resolution
headers
DateWed, 22 May 2019 04:39:25 GMT
ServerApache
Last-ModifiedTue, 21 May 2019 17:39:57 GMT
ETag"21a5b2-5896956610717"
Accept-Rangesbytes
Content-Length2205106
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/x-java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
least strengthC