Mirror Monitor

Get the full history as JSON: report.json

Source code:https://gitlab.com/fdroid/mirror-monitor

https://f-droid.org/repo
ip65.21.79.229
VerificationExceptionJAR signature failed to verify: /tmp/tmpo7r2cyhr The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165539
duration1.8665800094604492
status200
TLSTLSv1.3
headers
Servernginx/1.18.0
DateTue, 28 Nov 2023 09:59:00 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
ETag"8d91c0-60b21ba3a4ff5"
Accept-Rangesbytes
tlsping
hostf-droid.org
ip65.21.79.229
addressf-droid.org:443
connectionTLS
count10
min0.264380331
max0.268340501
average0.2665372591
stddev0.0013604725813270479
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.tetaneutral.net/fdroid/repo
ip89.234.156.230
VerificationExceptionJAR signature failed to verify: /tmp/tmpglsvazk9 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165675
duration2.0301108360290527
status200
TLSTLSv1.2
headers
Servernginx/1.14.2
DateTue, 28 Nov 2023 10:01:16 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Accept-Rangesbytes
tlsping
hostfdroid.tetaneutral.net
ip89.234.156.230
addressfdroid.tetaneutral.net:443
connectionTLS
count10
min0.341131662
max0.344925597
average0.3427635022
stddev0.0011949300865911534
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://ftp.agdsn.de/fdroid/repo
ip141.30.235.39
VerificationExceptionJAR signature failed to verify: /tmp/tmpeh5koanb The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165571
duration2.062211036682129
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateTue, 28 Nov 2023 09:59:31 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Accept-Rangesbytes
tlsping
hostftp.agdsn.de
ip141.30.235.39
addressftp.agdsn.de:443
connectionTLS
count10
min0.266028844
max0.270312245
average0.2681687078
stddev0.0014365395224265047
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://ftp.fau.de/fdroid/repo
ip131.188.12.211
VerificationExceptionJAR signature failed to verify: /tmp/tmpetouke_g The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165727
duration1.8810279369354248
status200
TLSTLSv1.3
headers
DateTue, 28 Nov 2023 10:02:07 GMT
ServerApache/2.4.41 (Ubuntu)
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
ETag"8d91c0-60b21ba331480"
Accept-Rangesbytes
Content-Length9277888
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostftp.fau.de
ip131.188.12.211
addressftp.fau.de:443
connectionTLS
count10
min0.253367581
max0.260895866
average0.2565777508
stddev0.0026035363442185938
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://ftp.lysator.liu.se/pub/fdroid/repo
ip130.236.254.251
VerificationExceptionJAR signature failed to verify: /tmp/tmpr0jrbv2m The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165905
duration2.142202138900757
status200
TLSTLSv1.3
headers
servernginx
dateTue, 28 Nov 2023 10:05:05 GMT
content-typeapplication/java-archive
content-length9277888
last-modifiedMon, 27 Nov 2023 12:49:06 GMT
etag"65649042-8d91c0"
accept-rangesbytes
tlsping
hostftp.lysator.liu.se
ip130.236.254.251
addressftp.lysator.liu.se:443
connectionTLS
count10
min0.261806793
max0.265910813
average0.263652149
stddev0.001420389466619632
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.cyberbits.eu/fdroid/repo
ip62.210.124.230
VerificationExceptionJAR signature failed to verify: /tmp/tmp3_k7vu_l The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165693
duration1.9674148559570312
status200
TLSTLSv1.3
headers
Servernginx
DateTue, 28 Nov 2023 10:01:33 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Accept-Rangesbytes
tlsping
hostmirror.cyberbits.eu
ip62.210.124.230
addressmirror.cyberbits.eu:443
connectionTLS
count10
min0.233407861
max0.237213652
average0.2350134581
stddev0.0012095425925553423
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.fcix.net/fdroid/repo
ip23.152.160.16
VerificationExceptionJAR signature failed to verify: /tmp/tmp0eovib5j The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165614
duration1.393002986907959
status200
TLSTLSv1.3
headers
Servernginx/1.18.0
DateTue, 28 Nov 2023 10:00:14 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
ExpiresTue, 28 Nov 2023 10:05:14 GMT
Cache-Controlmax-age=300
Accept-Rangesbytes
tlsping
hostmirror.fcix.net
ip23.152.160.16
addressmirror.fcix.net:443
connectionTLS
count10
min0.17740168
max0.181764579
average0.17991255469999998
stddev0.0014419853399142476
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.ossplanet.net/fdroid/repo
ip163.22.17.70
VerificationExceptionJAR signature failed to verify: /tmp/tmpf3yr6c7x The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165618
duration5.036898851394653
status200
TLSTLSv1.2
headers
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Content-Typeapplication/java-archive
Accept-Rangesbytes
ETag"2576974855"
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Content-Length9277888
DateTue, 28 Nov 2023 10:00:19 GMT
Serverlighttpd/1.4.35
tlsping
hostmirror.ossplanet.net
ip163.22.17.70
addressmirror.ossplanet.net:443
connectionTLS
count10
min1.033464919
max1.139975424
average1.1085538608999999
stddev0.029461543820485176
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
least strengthC
https://plug-mirror.rcac.purdue.edu/fdroid/repo
ip128.211.151.252
VerificationExceptionJAR signature failed to verify: /tmp/tmp9l_l18av The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165754
duration0.9732339382171631
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateTue, 28 Nov 2023 10:02:35 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Accept-Rangesbytes
tlsping
hostplug-mirror.rcac.purdue.edu
ip128.211.151.252
addressplug-mirror.rcac.purdue.edu:443
connectionTLS
count10
min0.107381495
max0.111724057
average0.10969400089999999
stddev0.0013249248324303134
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.albony.xyz/fdroid/repo
ip172.67.136.25
VerificationExceptionJAR signature failed to verify: /tmp/tmpl201sbjb The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165668
duration3.3548009395599365
status200
TLSTLSv1.3
headers
DateTue, 28 Nov 2023 10:01:09 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Connectionkeep-alive
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
ETag"65649042-8d91c0"
Cache-Controlstale-while-revalidate=150, max-age=150, stale-if-error=86400
CF-Cache-StatusREVALIDATED
Accept-Rangesbytes
Report-To{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=uZTIJCTzBji0FlmBWwAE7P2F9Vmofug15J1EwZVSDV5VpiknrPAhx4cnrBGZTJWwEWrhCyLU26yG9j%2FjcEjKsBMx9%2Bsb8q5jH3m68B9C01fYqzKURQ%2Bfasdxj36Le%2FjdmHtRug%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
VaryAccept-Encoding
Strict-Transport-Securitymax-age=0; includeSubDomains; preload
X-Content-Type-Optionsnosniff
Servercloudflare
CF-RAY82d1c494da96b027-ATL
alt-svch3=":443"; ma=86400
tlsping
hostmirror.albony.xyz
ip172.67.136.25
addressmirror.albony.xyz:443
connectionTLS
count10
min0.215812461
max0.27855161
average0.25377344599999996
stddev0.019909472582164838
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://cloudflare.f-droid.org/repo
ip104.22.3.52
VerificationExceptionJAR signature failed to verify: /tmp/tmpmwo_5s2x The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165673
duration1.4601678848266602
status200
TLSTLSv1.3
headers
DateTue, 28 Nov 2023 10:01:13 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Connectionkeep-alive
CF-Ray82d1c4b18cc553fc-ATL
CF-Cache-StatusHIT
Accept-Rangesbytes
Cache-Controlmax-age=2678400
ETag"65649042-8d91c0"
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Strict-Transport-Securitymax-age=15780000; includeSubDomains; preload
VaryAccept-Encoding
Cf-Placementlocal-ATL
expect-ctmax-age=86400, enforce
referrer-policysame-origin
x-content-type-optionsnosniff
x-frame-optionsSAMEORIGIN
x-xss-protection1; mode=block
Servercloudflare
alt-svch3=":443"; ma=86400
tlsping
hostcloudflare.f-droid.org
ip104.22.3.52
addresscloudflare.f-droid.org:443
connectionTLS
count10
min0.064635512
max0.067704987
average0.0660286645
stddev0.0009156354234805732
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://bubu1.eu/fdroid/repo
ip176.9.145.28
VerificationExceptionJAR signature failed to verify: /tmp/tmpouohx5x2 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165699
duration2.031121015548706
status200
TLSTLSv1.3
headers
Servernginx/1.25.3
DateTue, 28 Nov 2023 10:01:40 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Accept-Rangesbytes
tlsping
hostbubu1.eu
ip176.9.145.28
addressbubu1.eu:443
connectionTLS
count10
min0.254944378
max0.270614456
average0.25861922360000006
stddev0.00444175314663938
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.swedneck.xyz/fdroid/repo
ip104.17.96.13
starttime1701165706
duration19.661338090896606
status500
TLSTLSv1.3
headers
DateTue, 28 Nov 2023 10:02:06 GMT
Content-Typetext/plain; charset=utf-8
Content-Length93
Connectionkeep-alive
CF-Ray82d1c582fb04b0b8-ATL
CF-Cache-StatusMISS
Cache-Controlno-store
VaryAccept-Encoding
x-cf-ipfs-cache-statusmiss
X-Content-Type-Optionsnosniff
Set-Cookie__cf_bm=Dhk0BAzkytaydVl_pvQgShxVi6lHSY5jTDB6vNPtGyM-1701165726-0-ASuGLDI4UZpyfRZdkqgpRl5sN/runVr2Rz0hNljN9BMshRLgkrGH/QOymG4oMIEa7DjqL3p2kFZBv+P0ZmWfjhQ=; path=/; expires=Tue, 28-Nov-23 10:32:06 GMT; domain=.fdroid.swedneck.xyz; HttpOnly; Secure; SameSite=None
Cloudflare-Web3-DeprecationThis hostname will be deprecated on January 15th, 2023. If you are the site administrator, please refer to https://developers.cloudflare.com/web3/reference/migration-guide
Servercloudflare
alt-svch3=":443"; ma=86400
tlsping
hostfdroid.swedneck.xyz
ip104.17.96.13
addressfdroid.swedneck.xyz:443
connectionTLS
count10
min0.066652985
max0.069591044
average0.0680815945
stddev0.0009288929846294732
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthC
https://ftp.osuosl.org/pub/fdroid/repo
ip64.50.233.100
starttime1701165742
duration0.21399807929992676
status404
TLSTLSv1.2
headers
DateTue, 28 Nov 2023 10:02:22 GMT
ServerApache
Content-Length291
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typetext/html; charset=iso-8859-1
tlsping
hostftp.osuosl.org
ip64.50.236.52
addressftp.osuosl.org:443
connectionTLS
count10
min0.136664198
max0.140780186
average0.1388131728
stddev0.0015365859423485436
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://mirror.scd31.com/fdroid/repo
ip159.2.189.84
starttime1701165746
duration0.2917060852050781
status404
TLSTLSv1.2
headers
Servernginx/1.22.1
DateTue, 28 Nov 2023 10:02:26 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Content-Encodinggzip
tlsping
hostmirror.scd31.com
ip159.2.189.84
addressmirror.scd31.com:443
connectionTLS
count10
min0.199411848
max0.205218098
average0.20215128950000003
stddev0.0018838074083560813
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://fdroid.fi-do.io/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.fi-do.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f39c1ef7410>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1701165754
duration0.12030506134033203
status404
TLS[Errno -2] Name or service not known
headers
Servernginx/1.22.1
DateTue, 28 Nov 2023 10:02:26 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Content-Encodinggzip
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://mirrors.tuna.tsinghua.edu.cn/fdroid/repo
ip101.6.15.130
VerificationExceptionJAR signature failed to verify: /tmp/tmp1k5vretr The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165757
duration3.985400915145874
status200
TLSTLSv1.3
headers
Servernginx/1.18.0
DateTue, 28 Nov 2023 10:02:39 GMT
Content-Typeapplication/java-archive
Content-Length9275843
Connectionkeep-alive
Last-ModifiedSat, 25 Nov 2023 15:31:24 GMT
ETag"6562134c-8d89c3"
X-TUNA-MIRROR-IDbravo, neomirrors
Accept-Rangesbytes
Strict-Transport-Securitymax-age=31536000
tlsping
hostmirrors.tuna.tsinghua.edu.cn
ip101.6.15.130
addressmirrors.tuna.tsinghua.edu.cn:443
connectionTLS
count10
min0.51783792
max0.521665729
average0.5195545922000001
stddev0.0012908533982726835
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirrors.nju.edu.cn/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='mirrors.nju.edu.cn', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f39c1f02e90>: Failed to establish a new connection: [Errno 101] Network is unreachable'))
starttime1701165817
duration61.833264112472534
status200
TLSTLSv1.3
headers
Servernginx/1.18.0
DateTue, 28 Nov 2023 10:02:39 GMT
Content-Typeapplication/java-archive
Content-Length9275843
Connectionkeep-alive
Last-ModifiedSat, 25 Nov 2023 15:31:24 GMT
ETag"6562134c-8d89c3"
X-TUNA-MIRROR-IDbravo, neomirrors
Accept-Rangesbytes
Strict-Transport-Securitymax-age=31536000
tlsping
hostmirrors.nju.edu.cn
ip210.28.130.3
addressmirrors.nju.edu.cn:443
connectionTLS
count10
min0.718789488
max0.781454619
average0.7525711289
stddev0.02342153229366167
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.kumi.systems/fdroid/repo
ip135.181.208.35
VerificationExceptionJAR signature failed to verify: /tmp/tmpsmfahs6a The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165898
duration2.099524974822998
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length9277888
Content-Typeapplication/java-archive
Etag"s4s8xu5iuv4"
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
ServerCaddy
DateTue, 28 Nov 2023 10:04:59 GMT
tlsping
hostmirror.kumi.systems
ip135.181.208.35
addressmirror.kumi.systems:443
connectionTLS
count10
min0.272307544
max0.274277093
average0.2732257882
stddev0.0005918296051256397
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.librelabucm.org/fdroid/repo/
ip147.96.25.75
VerificationExceptionJAR signature failed to verify: /tmp/tmppj0pfsu1 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701165919
duration2.0742409229278564
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length9277888
Content-Typeapplication/java-archive
DateTue, 28 Nov 2023 10:05:20 GMT
Etag"s4s8xu5iuv4"
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
ServerCaddy, Caddy
tlsping
hostmirror.librelabucm.org
ip147.96.25.75
addressmirror.librelabucm.org:443
connectionTLS
count10
min0.246026872
max0.248176733
average0.24711881240000003
stddev0.0006829305270569162
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid-mirror.calyxinstitute.org/fdroid/repo
ConnectTimeoutHTTPSConnectionPool(host='fdroid-mirror.calyxinstitute.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by ConnectTimeoutError(<urllib3.connection.HTTPSConnection object at 0x7f39c1f03050>, 'Connection to fdroid-mirror.calyxinstitute.org timed out. (connect timeout=60)'))
starttime1701165926
duration60.05195903778076
status200
TLS[Errno 110] Connection timed out
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length9277888
Content-Typeapplication/java-archive
DateTue, 28 Nov 2023 10:05:20 GMT
Etag"s4s8xu5iuv4"
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
ServerCaddy, Caddy
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirrors.dotsrc.org/fdroid/repo/
ip130.225.254.116
VerificationExceptionJAR signature failed to verify: /tmp/tmphfp9mdsn The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166128
duration2.2208359241485596
status200
TLSTLSv1.3
headers
Servernginx/1.18.0 (Ubuntu)
DateTue, 28 Nov 2023 10:08:48 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
X-Frame-OptionsSAMEORIGIN
Referrer-Policystrict-origin
Accept-Rangesbytes
tlsping
hostmirrors.dotsrc.org
ip130.225.254.116
addressmirrors.dotsrc.org:443
connectionTLS
count10
min0.276201934
max0.280495393
average0.2783984065
stddev0.0014825348693802316
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.ossplanet.net/fdroid/repo/
ip163.22.17.70
VerificationExceptionJAR signature failed to verify: /tmp/tmp4d98aulu The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166143
duration11.589611053466797
status200
TLSTLSv1.2
headers
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Content-Typeapplication/java-archive
Accept-Rangesbytes
ETag"2576974855"
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Content-Length9277888
DateTue, 28 Nov 2023 10:09:05 GMT
Serverlighttpd/1.4.35
tlsping
hostmirror.ossplanet.net
ip163.22.17.70
addressmirror.ossplanet.net:443
connectionTLS
count10
min1.05768648
max1.219290176
average1.1501596291
stddev0.07131797745191112
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
least strengthC
https://ftp.gwdg.de/pub/android/fdroid/repo/
ip134.76.12.6
VerificationExceptionJAR signature failed to verify: /tmp/tmpimyamvcm The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166203
duration2.0508668422698975
status200
TLSTLSv1.2
headers
Servernginx
DateTue, 28 Nov 2023 10:10:03 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostftp.gwdg.de
ip134.76.12.6
addressftp.gwdg.de:443
connectionTLS
count10
min0.370884898
max0.43089828
average0.4126335025
stddev0.016901762925579367
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceindeterminate
cipher preference errorToo few ciphers supported
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceindeterminate
cipher preference errorToo few ciphers supported
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://ftp.snt.utwente.nl/pub/software/fdroid/repo/
ip130.89.149.20
VerificationExceptionJAR signature failed to verify: /tmp/tmp3ei1legn The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166210
duration1.8728570938110352
status200
TLSTLSv1.3
headers
DateTue, 28 Nov 2023 09:59:22 GMT
ServerApache/2.4.56 (Debian)
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
ETag"8d91c0-60b21ba331480"
Accept-Rangesbytes
Content-Length9277888
Keep-Alivetimeout=15, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostftp.snt.utwente.nl
ip130.89.149.20
addressftp.snt.utwente.nl:443
connectionTLS
count10
min0.238818728
max0.241768517
average0.2403865745
stddev0.0010307578382579717
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.zw.is/fdroid/repo/
ConnectionErrorHTTPSConnectionPool(host='fdroid.zw.is', port=443): Max retries exceeded with url: /fdroid/repo//index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f39c1f16cd0>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1701166221
duration0.13239002227783203
status200
TLS[Errno -2] Name or service not known
headers
DateTue, 28 Nov 2023 09:59:22 GMT
ServerApache/2.4.56 (Debian)
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
ETag"8d91c0-60b21ba331480"
Accept-Rangesbytes
Content-Length9277888
Keep-Alivetimeout=15, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.astra.in.ua/fdroid/repo
ip193.93.216.77
starttime1701166221
duration0.6662499904632568
status404
TLSTLSv1.3
headers
Servernginx/1.24.0
DateTue, 28 Nov 2023 10:10:10 GMT
Content-Typetext/html
Content-Length153
Connectionkeep-alive
tlsping
hostfdroid.astra.in.ua
ip193.93.216.77
addressfdroid.astra.in.ua:443
connectionTLS
count10
min0.284875164
max0.289875993
average0.28736419220000003
stddev0.001647287328531291
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://ftp.agdsn.de/fdroid/repo/
ip141.30.235.39
VerificationExceptionJAR signature failed to verify: /tmp/tmplkuqy139 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166232
duration2.072016954421997
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateTue, 28 Nov 2023 10:10:33 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Accept-Rangesbytes
tlsping
hostftp.agdsn.de
ip141.30.235.39
addressftp.agdsn.de:443
connectionTLS
count10
min0.2633577
max0.267501669
average0.2654180744
stddev0.0013709027070275476
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.cxserv.de/fdroid/repo
ip144.76.3.23
VerificationExceptionJAR signature failed to verify: /tmp/tmpr7oy6axi The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166239
duration1.905822992324829
status200
TLSTLSv1.3
headers
Servernginx/1.18.0 (Ubuntu)
DateTue, 28 Nov 2023 10:10:40 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Accept-Rangesbytes
tlsping
hostmirror.cxserv.de
ip144.76.3.23
addressmirror.cxserv.de:443
connectionTLS
count10
min0.247562885
max0.253113284
average0.2502833455
stddev0.0014785773801929479
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.freedif.org/fdroid
ip132.147.122.105
starttime1701166246
duration0.9417510032653809
status404
TLSTLSv1.3
headers
DateTue, 28 Nov 2023 10:10:46 GMT
ServerApache/2.4.56 (Debian)
Content-Length281
Keep-Alivetimeout=3, max=600
ConnectionKeep-Alive
Content-Typetext/html; charset=iso-8859-1
tlsping
hostmirror.freedif.org
ip132.147.122.105
addressmirror.freedif.org:443
connectionTLS
count10
min0.478471699
max0.482634836
average0.4805630507
stddev0.0014883980859812457
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirrors.jevincanders.net/fdroid/repo
ip172.93.158.60
VerificationExceptionJAR signature failed to verify: /tmp/tmp7990xm24 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166256
duration1.054847002029419
status200
TLSTLSv1.3
headers
DateTue, 28 Nov 2023 10:10:56 GMT
ServerApache
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
ETag"8d91c0-60b21ba3a4ff5"
Accept-Rangesbytes
Content-Length9277888
Keep-Alivetimeout=5
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostmirrors.jevincanders.net
ip172.93.158.60
addressmirrors.jevincanders.net:443
connectionTLS
count10
min0.088864988
max0.122883778
average0.10564134839999999
stddev0.01564768195426247
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.fcix.net/fdroid/repo/
ip23.152.160.16
VerificationExceptionJAR signature failed to verify: /tmp/tmpp5flv0pa The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166259
duration1.3941230773925781
status200
TLSTLSv1.3
headers
Servernginx/1.18.0
DateTue, 28 Nov 2023 10:10:59 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
ExpiresTue, 28 Nov 2023 10:15:59 GMT
Cache-Controlmax-age=300
Accept-Rangesbytes
tlsping
hostmirror.fcix.net
ip23.152.160.16
addressmirror.fcix.net:443
connectionTLS
count10
min0.181986334
max0.186309921
average0.1840993353
stddev0.0013342700841387442
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://forksystems.mm.fcix.net/fdroid/repo/
ip23.147.64.7
VerificationExceptionJAR signature failed to verify: /tmp/tmpuudvitgy The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166263
duration0.6832411289215088
status200
TLSTLSv1.3
headers
Servernginx/1.20.1
DateTue, 28 Nov 2023 10:11:03 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Accept-Rangesbytes
tlsping
hostforksystems.mm.fcix.net
ip23.147.64.7
addressforksystems.mm.fcix.net:443
connectionTLS
count10
min0.068809877
max0.073604393
average0.07106383860000001
stddev0.0014736449582050091
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://uvermont.mm.fcix.net/fdroid/repo/
ip132.198.255.58
VerificationExceptionJAR signature failed to verify: /tmp/tmpja96b40p The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166265
duration0.7951610088348389
status200
TLSTLSv1.3
headers
Servernginx/1.20.1
DateTue, 28 Nov 2023 10:11:05 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Accept-Rangesbytes
tlsping
hostuvermont.mm.fcix.net
ip132.198.255.58
addressuvermont.mm.fcix.net:443
connectionTLS
count10
min0.091159921
max0.09517395
average0.0932740799
stddev0.001348617243759876
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://southfront.mm.fcix.net/fdroid/repo/
ip147.160.170.17
VerificationExceptionJAR signature failed to verify: /tmp/tmp9fvw3l20 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166267
duration1.1351091861724854
status200
TLSTLSv1.3
headers
Servernginx/1.20.1
DateTue, 28 Nov 2023 10:11:08 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Accept-Rangesbytes
tlsping
hostsouthfront.mm.fcix.net
ip147.160.170.17
addresssouthfront.mm.fcix.net:443
connectionTLS
count10
min0.142340059
max0.145145009
average0.14376770700000002
stddev0.001074791562944277
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://ziply.mm.fcix.net/fdroid/repo/
ip50.47.0.53
VerificationExceptionJAR signature failed to verify: /tmp/tmppzlm3psh The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166271
duration1.366037130355835
status200
TLSTLSv1.3
headers
Servernginx/1.20.1
DateTue, 28 Nov 2023 10:11:11 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Accept-Rangesbytes
tlsping
hostziply.mm.fcix.net
ip50.47.0.53
addressziply.mm.fcix.net:443
connectionTLS
count10
min0.177011891
max0.18090336
average0.17889974490000002
stddev0.0013796337782182944
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://opencolo.mm.fcix.net/fdroid/repo/
ip23.27.126.50
VerificationExceptionJAR signature failed to verify: /tmp/tmpvtubl87u The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166276
duration1.3674209117889404
status200
TLSTLSv1.3
headers
Servernginx/1.20.1
DateTue, 28 Nov 2023 10:11:16 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Accept-Rangesbytes
tlsping
hostopencolo.mm.fcix.net
ip23.27.126.50
addressopencolo.mm.fcix.net:443
connectionTLS
count10
min0.18133992
max0.18533428
average0.18323732400000003
stddev0.0012941525789117764
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror01.komogoto.com/fdroid/repo/
ip51.159.55.63
starttime1701166280
duration0.6398639678955078
status404
TLSTLSv1.3
headers
Content-Length196
Content-Typetext/html; charset=iso-8859-1
DateTue, 28 Nov 2023 10:11:21 GMT
ServerApache/2.4.58 (Unix)
tlsping
hostmirror01.komogoto.com
ip51.159.55.63
addressmirror01.komogoto.com:443
connectionTLS
count10
min1.190521692
max1.28838933
average1.2142571172999999
stddev0.034868118385949186
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthC
https://mirror.freedif.org/fdroid/repo
ip132.147.122.105
VerificationExceptionJAR signature failed to verify: /tmp/tmptzrxn4vo The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166290
duration6.055061101913452
status200
TLSTLSv1.3
headers
DateTue, 28 Nov 2023 10:11:30 GMT
ServerApache/2.4.56 (Debian)
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Accept-Rangesbytes
Content-Length9277888
Keep-Alivetimeout=3, max=600
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostmirror.freedif.org
ip132.147.122.105
addressmirror.freedif.org:443
connectionTLS
count10
min0.484203535
max0.488118724
average0.48621250060000004
stddev0.0013889779312880538
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.level66.network/fdroid/repo
ip141.98.136.67
VerificationExceptionJAR signature failed to verify: /tmp/tmp1s5xwjv5 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1701166305
duration1.8070180416107178
status200
TLSTLSv1.3
headers
Servernginx
DateTue, 28 Nov 2023 10:11:46 GMT
Content-Typeapplication/java-archive
Content-Length9277888
Last-ModifiedMon, 27 Nov 2023 12:49:06 GMT
Connectionkeep-alive
ETag"65649042-8d91c0"
Strict-Transport-Securitymax-age=31536000; includeSubDomains
Accept-Rangesbytes
tlsping
hostmirror.level66.network
ip141.98.136.67
addressmirror.level66.network:443
connectionTLS
count10
min0.238578709
max0.243024657
average0.24083496099999996
stddev0.0013653328187527762
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA