https://f-droid.org/repo | ip | 136.243.44.143 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp3a615sa3
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680321723 |
---|
duration | 2.516335964202881 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.18.0 |
---|
Date | Sat, 01 Apr 2023 04:02:04 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Connection | keep-alive |
---|
Strict-Transport-Security | max-age=31536000; includeSubDomains |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
ETag | "8288a7-5f763da9d3684" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | f-droid.org |
---|
ip | 65.21.79.229 |
---|
address | f-droid.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.420394671 |
---|
max | 0.421567173 |
---|
average | 0.42101532729999996 |
---|
stddev | 0.00033998136866512176 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.tetaneutral.net/fdroid/repo | ip | 89.234.156.230 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpugqj6sye
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680321891 |
---|
duration | 10.499756097793579 |
---|
status | 200 |
---|
TLS | TLSv1.2 |
---|
headers | Server | nginx/1.14.2 |
---|
Date | Sat, 01 Apr 2023 04:04:51 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Connection | keep-alive |
---|
ETag | "64195a55-8288a7" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | fdroid.tetaneutral.net |
---|
ip | 89.234.156.230 |
---|
address | fdroid.tetaneutral.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.504901924 |
---|
max | 0.506790356 |
---|
average | 0.5059372016999999 |
---|
stddev | 0.0006470717974971716 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://ftp.agdsn.de/fdroid/repo | ip | 141.30.235.39 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmphkp7wupz
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680321769 |
---|
duration | 2.816049814224243 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.18.0 |
---|
Date | Sat, 01 Apr 2023 04:02:50 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Connection | keep-alive |
---|
ETag | "64195a55-8288a7" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | ftp.agdsn.de |
---|
ip | 141.30.235.39 |
---|
address | ftp.agdsn.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.389520097 |
---|
max | 0.390890682 |
---|
average | 0.39005072620000003 |
---|
stddev | 0.0005564103394207865 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://ftp.fau.de/fdroid/repo | ip | 131.188.12.211 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmphwgswmt6
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680321955 |
---|
duration | 3.1130619049072266 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Sat, 01 Apr 2023 04:05:55 GMT |
---|
Server | Apache/2.4.41 (Ubuntu) |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
ETag | "8288a7-5f763da9d3684" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 8554663 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | ftp.fau.de |
---|
ip | 131.188.12.211 |
---|
address | ftp.fau.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.387990333 |
---|
max | 0.390313278 |
---|
average | 0.38896721489999997 |
---|
stddev | 0.0007719749369511189 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://ftp.lysator.liu.se/pub/fdroid/repo | ip | 130.236.254.251 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp0lw1m7dd
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322161 |
---|
duration | 3.115429162979126 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | date | Sat, 01 Apr 2023 04:09:22 GMT |
---|
content-type | application/java-archive |
---|
content-length | 8554663 |
---|
last-modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
etag | "64195a55-8288a7" |
---|
accept-ranges | bytes |
---|
|
---|
tlsping | host | ftp.lysator.liu.se |
---|
ip | 130.236.254.253 |
---|
address | ftp.lysator.liu.se:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.430374729 |
---|
max | 0.441007697 |
---|
average | 0.4355521027 |
---|
stddev | 0.0032569313256518863 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.cyberbits.eu/fdroid/repo | ip | 62.210.124.230 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpj42d5sdt
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680321925 |
---|
duration | 2.283013105392456 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx |
---|
Date | Sat, 01 Apr 2023 04:05:25 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Connection | keep-alive |
---|
ETag | "64195a55-8288a7" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | mirror.cyberbits.eu |
---|
ip | 62.210.124.230 |
---|
address | mirror.cyberbits.eu:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.355266447 |
---|
max | 0.356484017 |
---|
average | 0.3558729783 |
---|
stddev | 0.0004207447987383919 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.fcix.net/fdroid/repo | ip | 23.152.160.16 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp1amx8qch
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680321835 |
---|
duration | 1.111510992050171 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.18.0 |
---|
Date | Sat, 01 Apr 2023 04:03:55 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8300064 |
---|
Last-Modified | Fri, 27 Jan 2023 11:04:44 GMT |
---|
Connection | keep-alive |
---|
ETag | "63d3afcc-7ea620" |
---|
Expires | Sat, 01 Apr 2023 04:08:55 GMT |
---|
Cache-Control | max-age=300 |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | mirror.fcix.net |
---|
ip | 23.152.160.16 |
---|
address | mirror.fcix.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.14664805 |
---|
max | 0.150989484 |
---|
average | 0.1495545291 |
---|
stddev | 0.0017096131686552064 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.ossplanet.net/fdroid/repo | ip | 163.22.17.70 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpkc6psl45
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680321839 |
---|
duration | 2.93599796295166 |
---|
status | 200 |
---|
TLS | TLSv1.2 |
---|
headers | X-Frame-Options | SAMEORIGIN |
---|
X-Content-Type-Options | nosniff |
---|
Content-Type | application/java-archive |
---|
Accept-Ranges | bytes |
---|
ETag | "3210330985" |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Content-Length | 8554663 |
---|
Date | Sat, 01 Apr 2023 04:04:00 GMT |
---|
Server | lighttpd/1.4.35 |
---|
|
---|
tlsping | host | mirror.ossplanet.net |
---|
ip | 163.22.17.70 |
---|
address | mirror.ossplanet.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.724371513 |
---|
max | 0.74943926 |
---|
average | 0.7380863527000001 |
---|
stddev | 0.007993423386306622 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
---|
|
---|
least strength | C |
---|
|
---|
|
---|
https://plug-mirror.rcac.purdue.edu/fdroid/repo | ip | 128.211.151.252 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpdbwh0sq9
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322015 |
---|
duration | 1.1109180450439453 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.18.0 |
---|
Date | Sat, 01 Apr 2023 04:06:55 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Connection | keep-alive |
---|
ETag | "64195a55-8288a7" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | plug-mirror.rcac.purdue.edu |
---|
ip | 128.211.151.252 |
---|
address | plug-mirror.rcac.purdue.edu:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.162891231 |
---|
max | 0.164980751 |
---|
average | 0.16377598130000004 |
---|
stddev | 0.0005901995603212631 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.albony.xyz/fdroid/repo | ip | 172.67.136.25 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpztv0bzlk
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680321882 |
---|
duration | 4.084684133529663 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Sat, 01 Apr 2023 04:04:44 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Connection | keep-alive |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
ETag | "64195a55-8288a7" |
---|
Cache-Control | stale-while-revalidate=150, max-age=150, stale-if-error=86400 |
---|
CF-Cache-Status | EXPIRED |
---|
Accept-Ranges | bytes |
---|
Report-To | {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=zKzaukPls0ztX2QPUgRR30fErPMyX4a0CEO6W6tWljE8nbHJF4TCKcCzqr9tkJx2V2APlY2NIY6L8zTPZ1JZ8fe4biV8gsOT3vI0Cypm5Ro5cBHfP4WBUtlhw5f8WXU6RXOhyQ%3D%3D"}],"group":"cf-nel","max_age":604800} |
---|
NEL | {"success_fraction":0,"report_to":"cf-nel","max_age":604800} |
---|
Vary | Accept-Encoding |
---|
Strict-Transport-Security | max-age=0; includeSubDomains; preload |
---|
X-Content-Type-Options | nosniff |
---|
Server | cloudflare |
---|
CF-RAY | 7b0df314f835cea8-SJC |
---|
alt-svc | h3=":443"; ma=86400, h3-29=":443"; ma=86400 |
---|
|
---|
tlsping | host | mirror.albony.xyz |
---|
ip | 104.21.86.189 |
---|
address | mirror.albony.xyz:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.170805941 |
---|
max | 0.171940938 |
---|
average | 0.1712091477 |
---|
stddev | 0.00036418699194508717 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://cloudflare.f-droid.org/repo | ip | 104.22.2.52 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpp1yees5v
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680321887 |
---|
duration | 1.5166540145874023 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Sat, 01 Apr 2023 04:04:48 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Connection | keep-alive |
---|
CF-Ray | 7b0df3388c872512-SJC |
---|
Accept-Ranges | bytes |
---|
Cache-Control | max-age=2678400 |
---|
ETag | "64195a55-8288a7" |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Strict-Transport-Security | max-age=15780000; includeSubDomains; preload |
---|
Vary | Accept-Encoding |
---|
CF-Cache-Status | HIT |
---|
expect-ct | max-age=86400, enforce |
---|
referrer-policy | same-origin |
---|
x-content-type-options | nosniff |
---|
x-frame-options | SAMEORIGIN |
---|
x-xss-protection | 1; mode=block |
---|
Server | cloudflare |
---|
alt-svc | h3=":443"; ma=86400, h3-29=":443"; ma=86400 |
---|
|
---|
tlsping | host | cloudflare.f-droid.org |
---|
ip | 104.22.3.52 |
---|
address | cloudflare.f-droid.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.091644657 |
---|
max | 0.093409364 |
---|
average | 0.09267570779999999 |
---|
stddev | 0.0005981994852212421 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://bubu1.eu/fdroid/repo | ip | 176.9.145.28 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp0wy8glob
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680321933 |
---|
duration | 2.609829902648926 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.23.3 |
---|
Date | Sat, 01 Apr 2023 04:05:34 GMT |
---|
Content-Type | application/x-java-archive |
---|
Content-Length | 8554663 |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Connection | keep-alive |
---|
ETag | "64195a55-8288a7" |
---|
Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
---|
Referrer-Policy | strict-origin |
---|
X-Content-Type-Options | nosniff |
---|
X-XSS-Protection | 1; mode=block |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | bubu1.eu |
---|
ip | 176.9.145.28 |
---|
address | bubu1.eu:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.402984286 |
---|
max | 0.404643421 |
---|
average | 0.40364979419999997 |
---|
stddev | 0.0005754863449380576 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.swedneck.xyz/fdroid/repo | ip | 104.17.96.13 |
---|
starttime | 1680321944 |
---|
duration | 8.718615055084229 |
---|
status | 400 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Sat, 01 Apr 2023 04:05:52 GMT |
---|
Content-Type | text/plain; charset=utf-8 |
---|
Content-Length | 91 |
---|
Connection | keep-alive |
---|
CF-Ray | 7b0df498c828cee1-SJC |
---|
Cache-Control | no-store |
---|
Vary | Accept-Encoding |
---|
CF-Cache-Status | MISS |
---|
x-cf-ipfs-cache-status | miss |
---|
X-Content-Type-Options | nosniff |
---|
Set-Cookie | __cf_bm=pOoilE46fdr5QXwg0VmCKvEZjxARGZ3TGZJ3NeBs_gI-1680321952-0-AbVz8T29+QJ/9y+2gsfB2HvnvBYnMhcb/x6day5RSuQzMwN05xgZWnXde/kAU0+iAIEIbX6ff+NZYNw3eFGAuCs=; path=/; expires=Sat, 01-Apr-23 04:35:52 GMT; domain=.fdroid.swedneck.xyz; HttpOnly; Secure; SameSite=None |
---|
Cloudflare-Web3-Deprecation | This hostname will be deprecated on January 15th, 2023. If you are the site administrator, please refer to https://developers.cloudflare.com/web3/reference/migration-guide |
---|
Server | cloudflare |
---|
alt-svc | h3=":443"; ma=86400, h3-29=":443"; ma=86400 |
---|
|
---|
tlsping | host | fdroid.swedneck.xyz |
---|
ip | 104.17.96.13 |
---|
address | fdroid.swedneck.xyz:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.090069527 |
---|
max | 0.091560591 |
---|
average | 0.0908233549 |
---|
stddev | 0.0005199587564233246 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | C |
---|
|
---|
|
---|
https://ftp.osuosl.org/pub/fdroid/repo | ip | 64.50.236.52 |
---|
starttime | 1680321978 |
---|
duration | 0.30087804794311523 |
---|
status | 404 |
---|
TLS | TLSv1.2 |
---|
headers | Date | Sat, 01 Apr 2023 04:06:18 GMT |
---|
Server | Apache |
---|
Content-Length | 291 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | text/html; charset=iso-8859-1 |
---|
|
---|
tlsping | host | ftp.osuosl.org |
---|
ip | 64.50.233.100 |
---|
address | ftp.osuosl.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.271245138 |
---|
max | 0.273513354 |
---|
average | 0.27231883409999996 |
---|
stddev | 0.0007757570859711784 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.scd31.com/fdroid/repo | ip | 159.2.177.41 |
---|
starttime | 1680321980 |
---|
duration | 0.5532541275024414 |
---|
status | 404 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.10.3 |
---|
Date | Sat, 01 Apr 2023 04:06:20 GMT |
---|
Content-Type | text/html |
---|
Transfer-Encoding | chunked |
---|
Connection | keep-alive |
---|
Content-Encoding | gzip |
---|
|
---|
tlsping | host | mirror.scd31.com |
---|
ip | 159.2.177.41 |
---|
address | mirror.scd31.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.35728951 |
---|
max | 0.359984654 |
---|
average | 0.358364141 |
---|
stddev | 0.0008938428917002258 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - Key exchange (dh 1024) of lower strength than certificate key
|
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - Key exchange (dh 1024) of lower strength than certificate key
|
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - Key exchange (dh 1024) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.fi-do.io/fdroid/repo | ConnectionError | HTTPSConnectionPool(host='fdroid.fi-do.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7faec89ae610>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
---|
starttime | 1680322014 |
---|
duration | 0.23752903938293457 |
---|
status | 404 |
---|
TLS | [Errno -2] Name or service not known |
---|
headers | Server | nginx/1.10.3 |
---|
Date | Sat, 01 Apr 2023 04:06:20 GMT |
---|
Content-Type | text/html |
---|
Transfer-Encoding | chunked |
---|
Connection | keep-alive |
---|
Content-Encoding | gzip |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - Key exchange (dh 1024) of lower strength than certificate key
|
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - Key exchange (dh 1024) of lower strength than certificate key
|
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - Key exchange (dh 1024) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirrors.tuna.tsinghua.edu.cn/fdroid/repo | ip | 101.6.15.130 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmphfqp40n6
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322019 |
---|
duration | 7.293276071548462 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.18.0 |
---|
Date | Sat, 01 Apr 2023 04:07:00 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Connection | keep-alive |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
ETag | "64195a55-8288a7" |
---|
X-TUNA-MIRROR-ID | bravo, neomirrors |
---|
Accept-Ranges | bytes |
---|
Strict-Transport-Security | max-age=31536000 |
---|
|
---|
tlsping | host | mirrors.tuna.tsinghua.edu.cn |
---|
ip | 101.6.15.130 |
---|
address | mirrors.tuna.tsinghua.edu.cn:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.424000023 |
---|
max | 2.1660163040000002 |
---|
average | 1.0217776240999998 |
---|
stddev | 0.5813991280039125 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirrors.nju.edu.cn/fdroid/repo | ip | 210.28.130.3 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpbcccdw2y
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322113 |
---|
duration | 3.721426010131836 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.23.3 |
---|
Date | Sat, 01 Apr 2023 04:08:34 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Connection | keep-alive |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
ETag | "64195a55-8288a7" |
---|
Accept-Ranges | bytes |
---|
Strict-Transport-Security | max-age=63072000; preload |
---|
|
---|
tlsping | host | mirrors.nju.edu.cn |
---|
ip | 210.28.130.3 |
---|
address | mirrors.nju.edu.cn:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.54391387 |
---|
max | 0.575089453 |
---|
average | 0.5604930072000001 |
---|
stddev | 0.008524330940522006 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.kumi.systems/fdroid/repo | ip | 135.181.208.35 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpdkp4hcsf
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322150 |
---|
duration | 3.0545880794525146 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Accept-Ranges | bytes |
---|
Alt-Svc | h3=":443"; ma=2592000 |
---|
Content-Length | 8554663 |
---|
Content-Type | application/java-archive |
---|
Date | Sat, 01 Apr 2023 04:09:10 GMT |
---|
Etag | "64195a55-8288a7" |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Server | Caddy, nginx/1.18.0 (Ubuntu) |
---|
|
---|
tlsping | host | mirror.kumi.systems |
---|
ip | 135.181.208.35 |
---|
address | mirror.kumi.systems:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.463477183 |
---|
max | 0.464792302 |
---|
average | 0.4641686773 |
---|
stddev | 0.0004154121881543699 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.librelabucm.org/fdroid/repo/ | ip | 147.96.25.75 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp3sny0ujp
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322184 |
---|
duration | 3.0758190155029297 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Alt-Svc | h3=":443"; ma=2592000 |
---|
Content-Length | 6519590 |
---|
Content-Type | application/x-java-archive |
---|
Date | Sat, 01 Apr 2023 04:09:44 GMT |
---|
Etag | "r89k2o3vqjq" |
---|
Last-Modified | Sat, 05 Mar 2022 08:40:00 GMT |
---|
Server | Caddy, Caddy |
---|
|
---|
tlsping | host | mirror.librelabucm.org |
---|
ip | 147.96.25.75 |
---|
address | mirror.librelabucm.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.50059883 |
---|
max | 0.511591629 |
---|
average | 0.5070556457000001 |
---|
stddev | 0.00404068174382712 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid-mirror.calyxinstitute.org/fdroid/repo | ConnectTimeout | HTTPSConnectionPool(host='fdroid-mirror.calyxinstitute.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by ConnectTimeoutError(<urllib3.connection.HTTPSConnection object at 0x7faec89c3250>, 'Connection to fdroid-mirror.calyxinstitute.org timed out. (connect timeout=60)')) |
---|
starttime | 1680322194 |
---|
duration | 60.141355991363525 |
---|
status | 200 |
---|
TLS | [Errno 110] Connection timed out |
---|
headers | Alt-Svc | h3=":443"; ma=2592000 |
---|
Content-Length | 6519590 |
---|
Content-Type | application/x-java-archive |
---|
Date | Sat, 01 Apr 2023 04:09:44 GMT |
---|
Etag | "r89k2o3vqjq" |
---|
Last-Modified | Sat, 05 Mar 2022 08:40:00 GMT |
---|
Server | Caddy, Caddy |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirrors.dotsrc.org/fdroid/repo/ | ip | 130.225.254.116 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpcyx8gutm
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322397 |
---|
duration | 3.002189874649048 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.18.0 (Ubuntu) |
---|
Date | Sat, 01 Apr 2023 04:13:18 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Connection | keep-alive |
---|
ETag | "64195a55-8288a7" |
---|
X-Frame-Options | SAMEORIGIN |
---|
Referrer-Policy | strict-origin |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | mirrors.dotsrc.org |
---|
ip | 130.225.254.116 |
---|
address | mirrors.dotsrc.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.442040813 |
---|
max | 0.446436714 |
---|
average | 0.44536148999999997 |
---|
stddev | 0.0012593943462297337 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.ossplanet.net/fdroid/repo/ | ip | 163.22.17.70 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpfhg8gujh
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322420 |
---|
duration | 3.069777011871338 |
---|
status | 200 |
---|
TLS | TLSv1.2 |
---|
headers | X-Frame-Options | SAMEORIGIN |
---|
X-Content-Type-Options | nosniff |
---|
Content-Type | application/java-archive |
---|
Accept-Ranges | bytes |
---|
ETag | "3210330985" |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Content-Length | 8554663 |
---|
Date | Sat, 01 Apr 2023 04:13:41 GMT |
---|
Server | lighttpd/1.4.35 |
---|
|
---|
tlsping | host | mirror.ossplanet.net |
---|
ip | 163.22.17.70 |
---|
address | mirror.ossplanet.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.794399231 |
---|
max | 0.815146463 |
---|
average | 0.806275029 |
---|
stddev | 0.006446942418821226 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
---|
|
---|
least strength | C |
---|
|
---|
|
---|
https://ftp.gwdg.de/pub/android/fdroid/repo/ | ip | 134.76.12.6 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpaegrxnzt
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322456 |
---|
duration | 3.215900182723999 |
---|
status | 200 |
---|
TLS | TLSv1.2 |
---|
headers | Server | nginx |
---|
Date | Sat, 01 Apr 2023 04:14:17 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Connection | keep-alive |
---|
ETag | "64195a55-8288a7" |
---|
Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
---|
X-Frame-Options | SAMEORIGIN |
---|
X-Content-Type-Options | nosniff |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | ftp.gwdg.de |
---|
ip | 134.76.12.6 |
---|
address | ftp.gwdg.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.59683446 |
---|
max | 0.601027833 |
---|
average | 0.5986036364 |
---|
stddev | 0.0013356357734689653 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|
---|
compressors | |
---|
cipher preference | indeterminate |
---|
cipher preference error | Too few ciphers supported |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|
---|
compressors | |
---|
cipher preference | indeterminate |
---|
cipher preference error | Too few ciphers supported |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://ftp.snt.utwente.nl/pub/software/fdroid/repo/ | ip | 130.89.149.20 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp4gzygsq8
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322469 |
---|
duration | 2.4776151180267334 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Sat, 01 Apr 2023 04:08:56 GMT |
---|
Server | Apache/2.4.56 (Debian) |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
ETag | "8288a7-5f763da9d3684" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 8554663 |
---|
Keep-Alive | timeout=15, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | ftp.snt.utwente.nl |
---|
ip | 130.89.149.20 |
---|
address | ftp.snt.utwente.nl:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.373967098 |
---|
max | 0.375554381 |
---|
average | 0.37473504700000004 |
---|
stddev | 0.0005014706768687379 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.zw.is/fdroid/repo/ | ConnectionError | HTTPSConnectionPool(host='fdroid.zw.is', port=443): Max retries exceeded with url: /fdroid/repo//index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7faec89cd290>: Failed to establish a new connection: [Errno -5] No address associated with hostname')) |
---|
starttime | 1680322485 |
---|
duration | 0.24130606651306152 |
---|
status | 200 |
---|
TLS | [Errno -5] No address associated with hostname |
---|
headers | Date | Sat, 01 Apr 2023 04:08:56 GMT |
---|
Server | Apache/2.4.56 (Debian) |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
ETag | "8288a7-5f763da9d3684" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 8554663 |
---|
Keep-Alive | timeout=15, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.astra.in.ua/fdroid/repo | ip | 193.93.216.77 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmphlwrgr8d
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322486 |
---|
duration | 2.9235219955444336 |
---|
status | 200 |
---|
TLS | TLSv1.2 |
---|
headers | Server | nginx/1.22.1 |
---|
Date | Sat, 01 Apr 2023 04:14:47 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Connection | keep-alive |
---|
ETag | "64195a55-8288a7" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | fdroid.astra.in.ua |
---|
ip | 193.93.216.77 |
---|
address | fdroid.astra.in.ua:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.541971699 |
---|
max | 0.545320132 |
---|
average | 0.5434181241999999 |
---|
stddev | 0.0008904011133904514 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://ftp.agdsn.de/fdroid/repo/ | ip | 141.30.235.39 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpv9_48m4u
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322505 |
---|
duration | 2.6608810424804688 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.18.0 |
---|
Date | Sat, 01 Apr 2023 04:15:05 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Connection | keep-alive |
---|
ETag | "64195a55-8288a7" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | ftp.agdsn.de |
---|
ip | 141.30.235.39 |
---|
address | ftp.agdsn.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.390543229 |
---|
max | 0.391234658 |
---|
average | 0.3908407975 |
---|
stddev | 0.0002593363820011611 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.cxserv.de/fdroid/repo | ip | 144.76.3.23 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpm3djxvrt
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322514 |
---|
duration | 3.2239480018615723 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.18.0 (Ubuntu) |
---|
Date | Sat, 01 Apr 2023 04:15:16 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8554663 |
---|
Last-Modified | Tue, 21 Mar 2023 07:18:45 GMT |
---|
Connection | keep-alive |
---|
ETag | "64195a55-8288a7" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | mirror.cxserv.de |
---|
ip | 144.76.3.23 |
---|
address | mirror.cxserv.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.397023338 |
---|
max | 0.404561012 |
---|
average | 0.3984548302 |
---|
stddev | 0.002123997509941469 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.freedif.org/fdroid | ip | 132.147.122.105 |
---|
starttime | 1680322526 |
---|
duration | 1.0910019874572754 |
---|
status | 404 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Sat, 01 Apr 2023 04:15:27 GMT |
---|
Server | Apache/2.4.56 (Debian) |
---|
Content-Length | 281 |
---|
Keep-Alive | timeout=3, max=600 |
---|
Connection | Keep-Alive |
---|
Content-Type | text/html; charset=iso-8859-1 |
---|
|
---|
tlsping | host | mirror.freedif.org |
---|
ip | 132.147.122.105 |
---|
address | mirror.freedif.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.410660523 |
---|
max | 0.411952202 |
---|
average | 0.411234907 |
---|
stddev | 0.00043329665667115734 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirrors.jevincanders.net/fdroid/repo | ip | 172.93.158.60 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpd509k3vs
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322539 |
---|
duration | 1.3941960334777832 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Sat, 01 Apr 2023 04:15:39 GMT |
---|
Server | Apache |
---|
Last-Modified | Fri, 27 Jan 2023 11:04:44 GMT |
---|
ETag | "7ea620-5f33cd53bb47c" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 8300064 |
---|
Keep-Alive | timeout=5 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | mirrors.jevincanders.net |
---|
ip | 172.93.158.60 |
---|
address | mirrors.jevincanders.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.192437214 |
---|
max | 0.194130147 |
---|
average | 0.1931272329 |
---|
stddev | 0.0005587990744241552 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.fcix.net/fdroid/repo/ | ip | 23.152.160.16 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpj35oy8bh
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322544 |
---|
duration | 1.0536918640136719 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.18.0 |
---|
Date | Sat, 01 Apr 2023 04:15:44 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8300064 |
---|
Last-Modified | Fri, 27 Jan 2023 11:04:44 GMT |
---|
Connection | keep-alive |
---|
ETag | "63d3afcc-7ea620" |
---|
Expires | Sat, 01 Apr 2023 04:20:44 GMT |
---|
Cache-Control | max-age=300 |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | mirror.fcix.net |
---|
ip | 23.152.160.16 |
---|
address | mirror.fcix.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.144509615 |
---|
max | 0.14640326 |
---|
average | 0.14556389870000003 |
---|
stddev | 0.0006737561498950573 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://forksystems.mm.fcix.net/fdroid/repo/ | ip | 23.147.64.7 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp61c0qf0p
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322548 |
---|
duration | 1.3843140602111816 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.20.1 |
---|
Date | Sat, 01 Apr 2023 04:15:48 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8300064 |
---|
Last-Modified | Fri, 27 Jan 2023 11:04:44 GMT |
---|
Connection | keep-alive |
---|
ETag | "63d3afcc-7ea620" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | forksystems.mm.fcix.net |
---|
ip | 23.147.64.7 |
---|
address | forksystems.mm.fcix.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.207525334 |
---|
max | 0.20909902 |
---|
average | 0.2083473126 |
---|
stddev | 0.0004975421718745451 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://uvermont.mm.fcix.net/fdroid/repo/ | ip | 132.198.255.58 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpcdti3ou5
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322553 |
---|
duration | 1.2561800479888916 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.20.1 |
---|
Date | Sat, 01 Apr 2023 04:15:53 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8300064 |
---|
Last-Modified | Fri, 27 Jan 2023 11:04:44 GMT |
---|
Connection | keep-alive |
---|
ETag | "63d3afcc-7ea620" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | uvermont.mm.fcix.net |
---|
ip | 132.198.255.58 |
---|
address | uvermont.mm.fcix.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.18975539 |
---|
max | 0.191596269 |
---|
average | 0.1903246263 |
---|
stddev | 0.0005136627423970075 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://southfront.mm.fcix.net/fdroid/repo/ | ip | 147.160.170.17 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpkdy1gx_9
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322558 |
---|
duration | 1.2873408794403076 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.20.1 |
---|
Date | Sat, 01 Apr 2023 04:15:58 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8300064 |
---|
Last-Modified | Fri, 27 Jan 2023 11:04:44 GMT |
---|
Connection | keep-alive |
---|
ETag | "63d3afcc-7ea620" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | southfront.mm.fcix.net |
---|
ip | 147.160.170.17 |
---|
address | southfront.mm.fcix.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.198782531 |
---|
max | 0.208840448 |
---|
average | 0.2038541361 |
---|
stddev | 0.0032601417965222737 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://ziply.mm.fcix.net/fdroid/repo/ | ip | 50.47.0.53 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpnk4vz73_
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322579 |
---|
duration | 0.5690920352935791 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.20.1 |
---|
Date | Sat, 01 Apr 2023 04:16:19 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8300064 |
---|
Last-Modified | Fri, 27 Jan 2023 11:04:44 GMT |
---|
Connection | keep-alive |
---|
ETag | "63d3afcc-7ea620" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | ziply.mm.fcix.net |
---|
ip | 50.47.0.53 |
---|
address | ziply.mm.fcix.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.062754722 |
---|
max | 0.063389719 |
---|
average | 0.06309517969999999 |
---|
stddev | 0.00018998638451797059 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://opencolo.mm.fcix.net/fdroid/repo/ | ip | 23.27.126.50 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp0muk7sqk
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1680322581 |
---|
duration | 0.6423850059509277 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.20.1 |
---|
Date | Sat, 01 Apr 2023 04:16:21 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 8300064 |
---|
Last-Modified | Fri, 27 Jan 2023 11:04:44 GMT |
---|
Connection | keep-alive |
---|
ETag | "63d3afcc-7ea620" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | opencolo.mm.fcix.net |
---|
ip | 23.27.126.50 |
---|
address | opencolo.mm.fcix.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.075583512 |
---|
max | 0.076912811 |
---|
average | 0.0761805098 |
---|
stddev | 0.0004940453961246471 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|