Mirror Monitor

Get the full history as JSON: report.json

Source code:https://gitlab.com/fdroid/repo-monitor

https://f-droid.org/repo
ip65.21.79.229
VerificationExceptionJAR signature failed to verify: /tmp/tmpe_jtgw5d The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882471
duration2.887138843536377
status200
TLSTLSv1.3
headers
Servernginx/1.18.0
DateSun, 05 May 2024 04:14:32 GMT
Content-Typeapplication/java-archive
Content-Length9934906
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
ETag"97983a-6179b2bafeb0f"
Accept-Rangesbytes
tlsping
hostf-droid.org
ip65.21.79.229
addressf-droid.org:443
connectionTLS
count10
min0.4215113
max0.422597967
average0.4220968662
stddev0.0003587099109681264
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.tetaneutral.net/fdroid/repo
ip89.234.156.230
VerificationExceptionJAR signature failed to verify: /tmp/tmpsx993jh_ The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882027
duration2.7789430618286133
status200
TLSTLSv1.2
headers
Servernginx/1.14.2
DateSun, 05 May 2024 04:07:08 GMT
Content-Typeapplication/java-archive
Content-Length9934906
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
Connectionkeep-alive
ETag"6635d958-97983a"
Accept-Rangesbytes
tlsping
hostfdroid.tetaneutral.net
ip89.234.156.230
addressfdroid.tetaneutral.net:443
connectionTLS
count10
min0.523022595
max0.524712899
average0.5239331238999999
stddev0.0005407091921793662
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://ftp.agdsn.de/fdroid/repo
ip141.30.235.39
VerificationExceptionJAR signature failed to verify: /tmp/tmpvom7rmoh The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714881823
duration3.4181509017944336
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateSun, 05 May 2024 04:03:43 GMT
Content-Typeapplication/java-archive
Content-Length9934906
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
Connectionkeep-alive
ETag"6635d958-97983a"
Accept-Rangesbytes
tlsping
hostftp.agdsn.de
ip141.30.235.39
addressftp.agdsn.de:443
connectionTLS
count10
min0.405734273
max0.406475422
average0.4060972543
stddev0.00023017324533665935
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://ftp.fau.de/fdroid/repo
ip131.188.12.211
VerificationExceptionJAR signature failed to verify: /tmp/tmp4bsmgj86 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882078
duration2.4307169914245605
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:07:58 GMT
ServerApache/2.4.41 (Ubuntu)
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
ETag"97983a-6179b2ba70600"
Accept-Rangesbytes
Content-Length9934906
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostftp.fau.de
ip131.188.12.211
addressftp.fau.de:443
connectionTLS
count10
min0.383987137
max0.385859349
average0.3847380236
stddev0.000548308989490823
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://ftp.gwdg.de/pub/android/fdroid/repo
ip134.76.12.6
VerificationExceptionJAR signature failed to verify: /tmp/tmp6gmx0yw3 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714881857
duration5.395956993103027
status200
TLSTLSv1.2
headers
Servernginx
DateSun, 05 May 2024 04:04:18 GMT
Content-Typeapplication/java-archive
Content-Length9934906
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
Connectionkeep-alive
ETag"6635d958-97983a"
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostftp.gwdg.de
ip134.76.12.6
addressftp.gwdg.de:443
connectionTLS
count10
min0.583266339
max0.588555374
average0.5853129516
stddev0.001709732319178317
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceindeterminate
cipher preference errorToo few ciphers supported
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceindeterminate
cipher preference errorToo few ciphers supported
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://ftp.lysator.liu.se/pub/fdroid/repo
ip130.236.254.253
VerificationExceptionJAR signature failed to verify: /tmp/tmpxx3e56ie The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714881873
duration24.955433130264282
status200
TLSTLSv1.3
headers
servernginx
dateSun, 05 May 2024 04:04:34 GMT
content-typeapplication/java-archive
content-length9934906
last-modifiedSat, 04 May 2024 06:44:40 GMT
etag"6635d958-97983a"
accept-rangesbytes
tlsping
hostftp.lysator.liu.se
ip130.236.254.251
addressftp.lysator.liu.se:443
connectionTLS
count10
min0.399849216
max0.4008622
average0.4003604893
stddev0.0003077379874250343
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.cyberbits.eu/fdroid/repo
ip62.210.124.230
VerificationExceptionJAR signature failed to verify: /tmp/tmpy1jz3b2q The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882053
duration2.5381011962890625
status200
TLSTLSv1.3
headers
Servernginx
DateSun, 05 May 2024 04:07:34 GMT
Content-Typeapplication/java-archive
Content-Length9934906
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
Connectionkeep-alive
ETag"6635d958-97983a"
Accept-Rangesbytes
tlsping
hostmirror.cyberbits.eu
ip62.210.124.230
addressmirror.cyberbits.eu:443
connectionTLS
count10
min0.358921006
max0.360187921
average0.3594508739
stddev0.00038487315991179793
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.fcix.net/fdroid/repo
ip23.152.160.16
VerificationExceptionJAR signature failed to verify: /tmp/tmp_7wps_eb The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714881926
duration0.9266660213470459
status200
TLSTLSv1.3
headers
Servernginx/1.18.0
DateSun, 05 May 2024 04:05:26 GMT
Content-Typeapplication/java-archive
Content-Length9934906
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
Connectionkeep-alive
ETag"6635d958-97983a"
ExpiresSun, 05 May 2024 04:10:26 GMT
Cache-Controlmax-age=300
Accept-Rangesbytes
tlsping
hostmirror.fcix.net
ip23.152.160.16
addressmirror.fcix.net:443
connectionTLS
count10
min0.093078127
max0.094176732
average0.09371245809999999
stddev0.0002910549558796257
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.kumi.systems/fdroid/repo
ip135.181.208.35
VerificationExceptionJAR signature failed to verify: /tmp/tmp_uw8611d The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714881929
duration2.988701820373535
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length9934906
Content-Typeapplication/java-archive
Etag"scy82g5wxtm"
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
ServerCaddy
DateSun, 05 May 2024 04:05:30 GMT
tlsping
hostmirror.kumi.systems
ip135.181.208.35
addressmirror.kumi.systems:443
connectionTLS
count10
min0.437259245
max0.437892138
average0.4375610790000001
stddev0.00020911949124507838
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.level66.network/fdroid/repo
ip141.98.136.67
VerificationExceptionJAR signature failed to verify: /tmp/tmp0i1zz3g0 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714881940
duration2.48571515083313
status200
TLSTLSv1.3
headers
Servernginx
DateSun, 05 May 2024 04:05:40 GMT
Content-Typeapplication/java-archive
Content-Length9934906
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
Connectionkeep-alive
ETag"6635d958-97983a"
Strict-Transport-Securitymax-age=31536000; includeSubDomains
Accept-Rangesbytes
tlsping
hostmirror.level66.network
ip141.98.136.67
addressmirror.level66.network:443
connectionTLS
count10
min0.374073892
max0.375889308
average0.375064964
stddev0.0005394786293583728
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.ossplanet.net/fdroid/repo
ip163.22.17.70
VerificationExceptionJAR signature failed to verify: /tmp/tmpvjeu4nr3 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714881955
duration4.769350051879883
status200
TLSTLSv1.2
headers
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Content-Typeapplication/java-archive
Accept-Rangesbytes
ETag"2352870872"
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
Content-Length9934906
DateSun, 05 May 2024 04:05:57 GMT
Serverlighttpd/1.4.35
tlsping
hostmirror.ossplanet.net
ip163.22.17.70
addressmirror.ossplanet.net:443
connectionTLS
count10
min0.573607767
max0.590115219
average0.5822218264999999
stddev0.005171130509841636
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
least strengthC
https://mirrors.dotsrc.org/fdroid/repo
ip130.225.254.116
VerificationExceptionJAR signature failed to verify: /tmp/tmpai2rnait The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882000
duration3.1180930137634277
status200
TLSTLSv1.3
headers
Servernginx/1.18.0 (Ubuntu)
DateSun, 05 May 2024 04:06:41 GMT
Content-Typeapplication/java-archive
Content-Length9934906
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
Connectionkeep-alive
ETag"6635d958-97983a"
X-Frame-OptionsSAMEORIGIN
Referrer-Policystrict-origin
Accept-Rangesbytes
tlsping
hostmirrors.dotsrc.org
ip130.225.254.116
addressmirrors.dotsrc.org:443
connectionTLS
count10
min0.39221843
max0.394444015
average0.39297276270000003
stddev0.000651191223351946
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://opencolo.mm.fcix.net/fdroid/repo
ip50.117.120.66
VerificationExceptionJAR signature failed to verify: /tmp/tmp34in30fn The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882021
duration0.7796018123626709
status200
TLSTLSv1.3
headers
Servernginx/1.20.1
DateSun, 05 May 2024 04:07:01 GMT
Content-Typeapplication/java-archive
Content-Length9934906
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
Connectionkeep-alive
ETag"6635d958-97983a"
Accept-Rangesbytes
tlsping
hostopencolo.mm.fcix.net
ip50.117.120.66
addressopencolo.mm.fcix.net:443
connectionTLS
count10
min0.096740572
max0.09826686
average0.0974884599
stddev0.0003990068494648795
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://plug-mirror.rcac.purdue.edu/fdroid/repo
ip128.211.151.252
VerificationExceptionJAR signature failed to verify: /tmp/tmpf8aoksh4 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882120
duration1.1678850650787354
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateSun, 05 May 2024 04:08:40 GMT
Content-Typeapplication/java-archive
Content-Length9934906
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
Connectionkeep-alive
ETag"6635d958-97983a"
Accept-Rangesbytes
tlsping
hostplug-mirror.rcac.purdue.edu
ip128.211.151.252
addressplug-mirror.rcac.purdue.edu:443
connectionTLS
count10
min0.158107957
max0.158990826
average0.15863347440000003
stddev0.00024904926391105815
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://bubu1.eu/fdroid/repo
ip176.9.145.28
VerificationExceptionJAR signature failed to verify: /tmp/tmpz8aw7zhz The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882062
duration3.2194769382476807
status200
TLSTLSv1.3
headers
Servernginx/1.25.4
DateSun, 05 May 2024 04:07:43 GMT
Content-Typeapplication/java-archive
Content-Length9934906
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
Connectionkeep-alive
ETag"6635d958-97983a"
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Accept-Rangesbytes
tlsping
hostbubu1.eu
ip176.9.145.28
addressbubu1.eu:443
connectionTLS
count10
min0.410611313
max0.411831279
average0.41112505739999994
stddev0.00031985703575822803
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.swedneck.xyz/fdroid/repo
ip104.17.64.14
starttime1714882073
duration2.5508430004119873
status500
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:07:55 GMT
Content-Typetext/plain; charset=utf-8
Content-Length93
Connectionkeep-alive
CF-Ray87edddc0ae3ef95f-SJC
CF-Cache-StatusMISS
Access-Control-Allow-Origin*
Cache-Controlno-store
VaryAccept-Encoding
access-control-allow-headersContent-Type, Range, User-Agent, X-Requested-With
access-control-allow-methodsGET
access-control-expose-headersContent-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-statusmiss
x-content-type-optionsnosniff
x-ipfs-path/ipns/fdroid.swedneck.xyz/fdroid/repo/index-v1.jar
Set-Cookie__cf_bm=LnXhMhrjfmjBltu4P9.1pZ6WDYMhrjovwC37XguFSuM-1714882075-1.0.1.1-XK_Ho8joWKXOhfb6unLIq1Ib4pNtwoUXLxUxX6cUHSv4fXT8iOVNhGuBJQ3PcydKYPcbzme4cCcOZpunsLINPw; path=/; expires=Sun, 05-May-24 04:37:55 GMT; domain=.fdroid.swedneck.xyz; HttpOnly; Secure; SameSite=None
Cloudflare-Web3-DeprecationThis hostname will be deprecated on January 15th, 2023. If you are the site administrator, please refer to https://developers.cloudflare.com/web3/reference/migration-guide
Servercloudflare
alt-svch3=":443"; ma=86400
tlsping
hostfdroid.swedneck.xyz
ip104.17.64.14
addressfdroid.swedneck.xyz:443
connectionTLS
count10
min0.097854072
max0.098756866
average0.0983046933
stddev0.0002960724097200037
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthC
https://mirror.jarsilio.com/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='mirror.jarsilio.com', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f5bbcf8dad0>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1714882100
duration0.5922539234161377
status200
TLS[Errno -2] Name or service not known
headers
DateSun, 05 May 2024 04:07:58 GMT
ServerApache/2.4.41 (Ubuntu)
Last-ModifiedSat, 04 May 2024 06:44:40 GMT
ETag"97983a-6179b2ba70600"
Accept-Rangesbytes
Content-Length9934906
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://ftp.osuosl.org/pub/fdroid/repo
ip140.211.166.134
starttime1714882102
duration0.04710793495178223
status404
TLSTLSv1.2
headers
DateSun, 05 May 2024 04:08:22 GMT
ServerApache
Content-Length261
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typetext/html; charset=iso-8859-1
tlsping
hostftp.osuosl.org
ip64.50.233.100
addressftp.osuosl.org:443
connectionTLS
count10
min0.249583139
max0.25194631
average0.2509325404
stddev0.0010665124579831372
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://mirror.scd31.com/fdroid/repo
ip156.57.38.55
starttime1714882103
duration0.537139892578125
status404
TLSTLSv1.2
headers
Servernginx/1.22.1
DateSun, 05 May 2024 04:08:23 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Content-Encodinggzip
tlsping
hostmirror.scd31.com
ip156.57.38.55
addressmirror.scd31.com:443
connectionTLS
count10
min0.336277311
max0.341107974
average0.3388265863
stddev0.0014574998684970082
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://fdroid.fi-do.io/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.fi-do.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f5bbcf8cb90>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1714882119
duration0.36583805084228516
status404
TLS[Errno -2] Name or service not known
headers
Servernginx/1.22.1
DateSun, 05 May 2024 04:08:23 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Content-Encodinggzip
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://android.izzysoft.de/repo
ip144.76.109.58
VerificationExceptionJAR signature failed to verify: /tmp/tmpb4lxgj0i jarsigner: java.util.zip.ZipException: zip END header not found
starttime1714882124
duration0.8057241439819336
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:08:44 GMT
ServerApache
Referrer-Policystrict-origin-when-cross-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Permissions-Policyinterest-cohort=()
Content-Security-Policybase-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self';
Strict-Transport-Securitymax-age=15552000; includeSubDomains
Cache-Controlmax-age=2592000
ExpiresTue, 04 Jun 2024 04:08:44 GMT
VaryAccept-Encoding
Content-Encodinggzip
Content-Length1871
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typetext/html; charset=UTF-8
tlsping
hostandroid.izzysoft.de
ip144.76.109.58
addressandroid.izzysoft.de:443
connectionTLS
count10
min0.389773805
max0.390295041
average0.3900587503
stddev0.00016846694644176476
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://anonymousmessenger.ly/fdroid/repo
SSLErrorHTTPSConnectionPool(host='anonymousmessenger.ly', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1714882131
duration0.3421649932861328
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
DateSun, 05 May 2024 04:08:44 GMT
ServerApache
Referrer-Policystrict-origin-when-cross-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Permissions-Policyinterest-cohort=()
Content-Security-Policybase-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self';
Strict-Transport-Securitymax-age=15552000; includeSubDomains
Cache-Controlmax-age=2592000
ExpiresTue, 04 Jun 2024 04:08:44 GMT
VaryAccept-Encoding
Content-Encodinggzip
Content-Length1871
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typetext/html; charset=UTF-8
tlspingNone
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
least strengthA
https://app.futo.org/fdroid/repo
ip159.65.228.96
VerificationExceptionJAR signature failed to verify: /tmp/tmpfklthcdk The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882139
duration0.743682861328125
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateSun, 05 May 2024 04:09:00 GMT
Content-Typeapplication/java-archive
Content-Length5644
Last-ModifiedSat, 13 Apr 2024 17:42:55 GMT
Connectionkeep-alive
ETag"661ac41f-160c"
Accept-Rangesbytes
tlsping
hostapp.futo.org
ip159.65.228.96
addressapp.futo.org:443
connectionTLS
count10
min0.206673078
max0.20773575
average0.20712980079999999
stddev0.00040034252754205386
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://app.usb0.net/repo
ip172.67.154.154
starttime1714882147
duration0.1866779327392578
status404
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:09:07 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Cache-Controlmax-age=14400
CF-Cache-StatusEXPIRED
Report-To{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oNXEe%2FFirEz8UDOZFRc9PNkd6LrAxRvZSp0YMkJm4usZ%2FrDRPDN3p7Eq4G7EeoZ2X8vE0a0d6rlYrDfErphLQHoR8UD4GR%2Fm9PknrwusRvgaWJ3OHnuw3116IHeussk%3D"}],"group":"cf-nel","max_age":604800}
NEL{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
VaryAccept-Encoding
Servercloudflare
CF-RAY87eddf8f5ed79e6b-SJC
Content-Encodingbr
alt-svch3=":443"; ma=86400
tlsping
hostapp.usb0.net
ip104.21.6.28
addressapp.usb0.net:443
connectionTLS
count10
min0.190633831
max0.191916025
average0.19116783759999997
stddev0.0003730486983650234
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://apt.izzysoft.de/fdroid/repo
ip144.76.109.58
VerificationExceptionJAR signature failed to verify: /tmp/tmpm7yre8nh The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882149
duration8.385424852371216
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:09:11 GMT
ServerApache
Referrer-Policystrict-origin-when-cross-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Permissions-Policyinterest-cohort=()
Content-Security-Policybase-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self';
Strict-Transport-Securitymax-age=15552000; includeSubDomains
Last-ModifiedSat, 04 May 2024 17:44:33 GMT
ETag"15f271-617a4639bb3d9"
Accept-Rangesbytes
Content-Length1438321
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostapt.izzysoft.de
ip144.76.109.58
addressapt.izzysoft.de:443
connectionTLS
count10
min0.403329236
max0.404168918
average0.40382182469999994
stddev0.0002546147451991112
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://archive.newpipe.net/fdroid/repo
ip159.69.138.33
VerificationExceptionJAR signature failed to verify: /tmp/tmpr963ndag The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882164
duration1.1457700729370117
status200
TLSTLSv1.3
headers
Servernginx
DateSun, 05 May 2024 04:09:25 GMT
Content-Typeapplication/java-archive
Content-Length27813
Last-ModifiedTue, 23 Apr 2024 20:45:27 GMT
Connectionkeep-alive
ETag"66281de7-6ca5"
X-Frame-OptionsSAMEORIGIN
Strict-Transport-Securitymax-age=31536000; includeSubDomains
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Referrer-Policystrict-origin
Permissions-Policyinterest-cohort=()
Content-Security-Policydefault-src 'self'; object-src 'none'; block-all-mixed-content
Accept-Rangesbytes
tlsping
hostarchive.newpipe.net
ip159.69.138.33
addressarchive.newpipe.net:443
connectionTLS
count10
min0.406508046
max0.408105566
average0.4074441795
stddev0.0006069670340953058
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://briarproject.org/fdroid/repo
ip157.90.23.135
VerificationExceptionJAR signature failed to verify: /tmp/tmp3zekuq9w The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882202
duration1.0281920433044434
status200
TLSTLSv1.2
headers
Servernginx/1.14.2
DateSun, 05 May 2024 04:10:03 GMT
Content-Typeapplication/java-archive
Content-Length4191
Last-ModifiedWed, 24 Apr 2024 14:04:59 GMT
Connectionkeep-alive
ETag"6629118b-105f"
Strict-Transport-Securitymax-age=31536000; includeSubDomains
Accept-Rangesbytes
tlsping
hostbriarproject.org
ip157.90.23.135
addressbriarproject.org:443
connectionTLS
count10
min0.55267749
max0.557632262
average0.5546948936
stddev0.0017903363941168982
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://bubu1.eu/fdroidclassic/fdroid/repo
ip176.9.145.28
VerificationExceptionThe repository's fingerprint does not match.
starttime1714882222
duration1.115811824798584
status200
TLSTLSv1.3
headers
Servernginx/1.25.4
DateSun, 05 May 2024 04:10:23 GMT
Content-Typeapplication/java-archive
Content-Length9793
Last-ModifiedWed, 08 Mar 2023 23:22:24 GMT
Connectionkeep-alive
ETag"640918b0-2641"
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Accept-Rangesbytes
tlsping
hostbubu1.eu
ip176.9.145.28
addressbubu1.eu:443
connectionTLS
count10
min0.408540674
max0.410008361
average0.4090907111999999
stddev0.00046899204578346415
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://calyxos.gitlab.io/calyx-fdroid-repo/fdroid/repo
ip35.185.44.232
VerificationExceptionJAR signature failed to verify: /tmp/tmpxyf2nb6d The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882231
duration0.614739179611206
status200
TLSTLSv1.3
headers
Cache-Controlmax-age=600
Content-Length10616
Content-Typeapplication/java-archive
Etag"0c4dc43547c08ec6a66f7b089bf5edca2ea141519a6da8365864494b2431bc6a"
ExpiresSun, 05 May 2024 04:20:31 UTC
Last-ModifiedSun, 05 May 2024 04:02:27 GMT
Permissions-Policyinterest-cohort=()
VaryOrigin
DateSun, 05 May 2024 04:10:31 GMT
tlsping
hostcalyxos.gitlab.io
ip35.185.44.232
addresscalyxos.gitlab.io:443
connectionTLS
count10
min0.202673203
max0.204439891
average0.203410802
stddev0.000654126609964313
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://cdn.kde.org/android/fdroid/repo
ip212.102.46.9
VerificationExceptionJAR signature failed to verify: /tmp/tmp3lvod0dp The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882235
duration1.5615899562835693
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:10:36 GMT
Content-Typeapplication/java-archive
Content-Length116322
Connectionkeep-alive
Last-ModifiedSat, 04 May 2024 14:25:05 GMT
Cache-Controlmax-age=0
ExpiresSun, 05 May 2024 04:10:36 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTEggB1GYuBwEhCAGP9DMTASE
X-77-NZT-Ray74b3202c805facb3bb063766d04b4424
X-77-CacheMISS
ServerCDN77-Turbo
X-CacheMISS
X-77-POPseattleUSWA
Accept-Rangesbytes
tlsping
hostcdn.kde.org
ip212.102.46.8
addresscdn.kde.org:443
connectionTLS
count10
min0.072765592
max0.073953963
average0.07333138210000001
stddev0.0003612202575920821
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://cdn.kde.org/android/stable-releases/fdroid/repo
ip185.93.1.23
VerificationExceptionJAR signature failed to verify: /tmp/tmp8aj3o1rr The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882238
duration1.3351900577545166
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:10:39 GMT
Content-Typeapplication/java-archive
Content-Length60821
Connectionkeep-alive
Last-ModifiedThu, 18 Apr 2024 16:41:25 GMT
Cache-Controlmax-age=0
ExpiresSun, 05 May 2024 04:10:38 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTEggBuV0BFAEhCAGckjviASE
X-77-NZT-Ray94686a1a77fb18f3be0637661d88202a
X-77-CacheMISS
ServerCDN77-Turbo
X-CacheMISS
X-77-POPchicagoUSIL
Accept-Rangesbytes
tlsping
hostcdn.kde.org
ip212.102.46.8
addresscdn.kde.org:443
connectionTLS
count10
min0.07330867
max0.074059317
average0.0737382815
stddev0.00026533330048271204
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://codeberg.org/florian-obernberger/fdroid-repo/raw/branch/main/repo
ip217.197.91.145
VerificationExceptionJAR signature failed to verify: /tmp/tmpeve02_k3 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882243
duration0.8401370048522949
status200
TLSTLSv1.3
headers
access-control-expose-headersContent-Disposition
cache-controlprivate, max-age=300
content-dispositioninline; filename="index-v1.jar"; filename*=UTF-8''index-v1.jar
content-length6958
content-typeapplication/octet-stream
etag"38006836c8cd11d96e21c0fb37782a32157c8395"
last-modifiedMon, 11 Mar 2024 19:15:13 GMT
set-cookiei_like_gitea=8fab313960f405c1; Path=/; HttpOnly; Secure; SameSite=Lax; Secure; SameSite=Lax, _csrf=e-aNyeuiBcSP1FA4EoGSAHuwTN46MTcxNDg4MjIzODExODA1NzExNQ; Path=/; Max-Age=86400; HttpOnly; Secure; SameSite=Lax; Secure; SameSite=Lax
dateSun, 05 May 2024 04:10:38 GMT
strict-transport-securitymax-age=63072000; includeSubDomains; preload
permissions-policyinterest-cohort=()
x-frame-optionssameorigin
x-content-type-optionsnosniff
tlsping
hostcodeberg.org
ip217.197.91.145
addresscodeberg.org:443
connectionTLS
count10
min0.40073076
max0.401507305
average0.4010798393
stddev0.00024896938851595024
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://divestos.org/apks/official/fdroid/repo
ip193.29.63.97
VerificationExceptionJAR signature failed to verify: /tmp/tmp1weo5ish The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882251
duration0.6592090129852295
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:10:51 GMT
ServerApache
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Upgradeh2
ConnectionUpgrade, Keep-Alive
Last-ModifiedWed, 01 May 2024 13:57:02 GMT
ETag"2c74-61764dc6f7804"
Accept-Rangesbytes
Content-Length11380
Onion-Locationhttp://2ceyag7ppvhliszes2v25n5lmpwhzqrc7sv72apqka6hwggfi42y2uid.onion/apks/official/fdroid/repo/index-v1.jar
Keep-Alivetimeout=5, max=100
Content-Typeapplication/java-archive
tlsping
hostdivestos.org
ip193.29.63.97
addressdivestos.org:443
connectionTLS
count10
min0.166334893
max0.167166317
average0.1667477248
stddev0.00025271816500592155
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://eutopia.cz/experimental/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /experimental/fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f5bb998ca90>: Failed to establish a new connection: [Errno 101] Network is unreachable'))
starttime1714882255
duration0.29421114921569824
status200
TLS[Errno 101] Network is unreachable
headers
DateSun, 05 May 2024 04:10:51 GMT
ServerApache
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Upgradeh2
ConnectionUpgrade, Keep-Alive
Last-ModifiedWed, 01 May 2024 13:57:02 GMT
ETag"2c74-61764dc6f7804"
Accept-Rangesbytes
Content-Length11380
Onion-Locationhttp://2ceyag7ppvhliszes2v25n5lmpwhzqrc7sv72apqka6hwggfi42y2uid.onion/apks/official/fdroid/repo/index-v1.jar
Keep-Alivetimeout=5, max=100
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://eutopia.cz/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f5bb998fbd0>: Failed to establish a new connection: [Errno 101] Network is unreachable'))
starttime1714882258
duration0.3505558967590332
status200
TLS[Errno 101] Network is unreachable
headers
DateSun, 05 May 2024 04:10:51 GMT
ServerApache
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Upgradeh2
ConnectionUpgrade, Keep-Alive
Last-ModifiedWed, 01 May 2024 13:57:02 GMT
ETag"2c74-61764dc6f7804"
Accept-Rangesbytes
Content-Length11380
Onion-Locationhttp://2ceyag7ppvhliszes2v25n5lmpwhzqrc7sv72apqka6hwggfi42y2uid.onion/apks/official/fdroid/repo/index-v1.jar
Keep-Alivetimeout=5, max=100
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://f-droid.i2p.io/repo
ConnectTimeoutHTTPSConnectionPool(host='f-droid.i2p.io', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by ConnectTimeoutError(<urllib3.connection.HTTPSConnection object at 0x7f5bb999ce10>, 'Connection to f-droid.i2p.io timed out. (connect timeout=60)'))
starttime1714882263
duration60.239217042922974
status200
TLS[Errno 110] Connection timed out
headers
DateSun, 05 May 2024 04:10:51 GMT
ServerApache
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Upgradeh2
ConnectionUpgrade, Keep-Alive
Last-ModifiedWed, 01 May 2024 13:57:02 GMT
ETag"2c74-61764dc6f7804"
Accept-Rangesbytes
Content-Length11380
Onion-Locationhttp://2ceyag7ppvhliszes2v25n5lmpwhzqrc7sv72apqka6hwggfi42y2uid.onion/apks/official/fdroid/repo/index-v1.jar
Keep-Alivetimeout=5, max=100
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://f-droid.monerujo.io/fdroid/repo
ip35.185.44.232
VerificationExceptionJAR signature failed to verify: /tmp/tmpqtggc5q8 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882467
duration0.9241220951080322
status200
TLSTLSv1.3
headers
Cache-Controlmax-age=600
Content-Length6815
Content-Typeapplication/java-archive
Etag"135e4e415bac54eb14f93cd2f4dda9949463ee6484fb6e0fe481e213bdcb6766"
ExpiresSun, 05 May 2024 04:24:27 UTC
Last-ModifiedMon, 18 Mar 2024 10:27:35 GMT
Permissions-Policyinterest-cohort=()
VaryOrigin
DateSun, 05 May 2024 04:14:27 GMT
tlsping
hostf-droid.monerujo.io
ip35.185.44.232
addressf-droid.monerujo.io:443
connectionTLS
count10
min0.208016535
max0.209148941
average0.20863942879999997
stddev0.0003865651019817489
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.a3.pm/seabear/repo
ip172.67.220.96
starttime1714882491
duration3.302353858947754
status523
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:14:54 GMT
Content-Typetext/html; charset=UTF-8
Content-Length7012
Connectionkeep-alive
Report-To{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ThLi0y%2FNd5sHM9CI2oO1SAsz8gBHhF3kYl8eZHyILgvlGRjNnHawFLuOabdzX9ODvxUknp2TBH%2BHi9KYdqtAqSlVEGL1jUGdZCaK%2BuKU6KbXr2Bm%2F77BvOXIv5cOgck%3D"}],"group":"cf-nel","max_age":604800}
NEL{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Content-Type-Optionsnosniff
X-Frame-OptionsSAMEORIGIN
Referrer-Policysame-origin
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Servercloudflare
CF-RAY87ede7f259a9cf0d-SJC
alt-svch3=":443"; ma=86400
tlsping
hostfdroid.a3.pm
ip104.21.78.107
addressfdroid.a3.pm:443
connectionTLS
count10
min0.085114077
max0.086299056
average0.0857903568
stddev0.00035341409967990927
error
ssl-enum-ciphers
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.beocode.eu/fdroid/repo
ip86.48.5.219
VerificationExceptionJAR signature failed to verify: /tmp/tmpp3twegi6 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882496
duration1.0612890720367432
status200
TLSTLSv1.3
headers
Servernginx
DateSun, 05 May 2024 04:14:57 GMT
Content-Typeapplication/java-archive
Content-Length10560
Last-ModifiedWed, 12 Apr 2023 20:00:57 GMT
Connectionkeep-alive
ETag"64370df9-2940"
Strict-Transport-Securitymax-age=63072000; includeSubdomains; preload;
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
X-Robots-Tagnone
X-Download-Optionsnoopen
X-Permitted-Cross-Domain-Policiesnone
Referrer-Policyno-referrer
X-Frame-OptionsSAMEORIGIN
Accept-Rangesbytes
tlsping
hostfdroid.beocode.eu
ip86.48.5.219
addressfdroid.beocode.eu:443
connectionTLS
count10
min0.594367856
max0.597569102
average0.5963441791999999
stddev0.0010468726241851752
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp521r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp521r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp521r1) - A
cipher preferenceserver
least strengthA
https://fdroid.bromite.org/fdroid/repo
ip92.243.18.230
VerificationExceptionJAR signature failed to verify: /tmp/tmpdjjc9yc0 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882505
duration0.8936560153961182
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:15:05 GMT
Content-Typeapplication/java-archive
Content-Length14302
Last-ModifiedMon, 19 Dec 2022 21:09:36 GMT
Connectionkeep-alive
ETag"63a0d310-37de"
ServerApache/2.4.9 (Unix)
Accept-Rangesbytes
tlsping
hostfdroid.bromite.org
ip92.243.18.230
addressfdroid.bromite.org:443
connectionTLS
count10
min0.33391376
max0.334824501
average0.3341904941
stddev0.0002477270081357473
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.cgeo.org/fdroid/repo
ip23.88.115.170
VerificationExceptionJAR signature failed to verify: /tmp/tmped9pwtx3 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882512
duration1.1785290241241455
status200
TLSTLSv1.3
headers
accept-rangesbytes
content-typeapplication/java-archive
dateSun, 05 May 2024 04:15:13 GMT
etag"662ac3c6-14cd"
last-modifiedThu, 25 Apr 2024 20:57:42 GMT
servernginx/1.25.3
content-length5325
tlsping
hostfdroid.cgeo.org
ip23.88.115.170
addressfdroid.cgeo.org:443
connectionTLS
count10
min0.410745376
max0.427202767
average0.4139025286
stddev0.0052201879323633535
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (dh 2048) of lower strength than certificate key
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.frostnerd.com/fdroid/repo
ip95.217.41.105
VerificationExceptionJAR signature failed to verify: /tmp/tmp5fbjsy_u The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882523
duration1.1250331401824951
status200
TLSTLSv1.3
headers
Servernginx/1.23.4
DateSun, 05 May 2024 04:15:24 GMT
Content-Typeapplication/java-archive
Content-Length3447
Last-ModifiedSat, 13 Aug 2022 21:28:48 GMT
Connectionkeep-alive
ETag"62f81790-d77"
Accept-Rangesbytes
tlsping
hostfdroid.frostnerd.com
ip95.217.41.105
addressfdroid.frostnerd.com:443
connectionTLS
count10
min0.424586325
max0.426225467
average0.42541773569999997
stddev0.00046976195186436415
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.i2pd.xyz/fdroid/repo
ip62.210.85.80
VerificationExceptionJAR signature failed to verify: /tmp/tmpn5cwuw71 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882551
duration1.1444149017333984
status200
TLSTLSv1.3
headers
Servernginx
DateSun, 05 May 2024 04:15:52 GMT
Content-Typeapplication/java-archive
Content-Length12561
Last-ModifiedSun, 07 Apr 2024 11:06:46 GMT
Connectionkeep-alive
ETag"66127e46-3111"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostfdroid.i2pd.xyz
ip62.210.85.80
addressfdroid.i2pd.xyz:443
connectionTLS
count10
min0.55342814
max0.55443855
average0.5538649814000001
stddev0.00028057187176343766
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp521r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp521r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
cipher preferenceclient
least strengthA
https://fdroid.koyu.space/fdroid/repo
ip104.21.4.29
VerificationExceptionJAR signature failed to verify: /tmp/tmpbodof4gl The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882565
duration0.6424059867858887
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:16:05 GMT
Content-Typeapplication/java-archive
Content-Length4920
Connectionkeep-alive
last-modifiedWed, 02 Feb 2022 21:32:32 GMT
access-control-allow-origin*
etag"61faf870-1338"
expiresSun, 05 May 2024 04:26:05 GMT
Cache-Controlmax-age=14400
x-proxy-cacheMISS
x-github-request-id23F0:2C9AEE:27149FF:285B71D:6636C38E
via1.1 varnish
x-served-bycache-sjc10056-SJC
x-cacheMISS
x-cache-hits0
x-timerS1714865038.359815,VS0,VE84
varyAccept-Encoding
x-fastly-request-id1a54ce68c4f96c2ded95ae8d9814dd59a278f056
CF-Cache-StatusREVALIDATED
Accept-Rangesbytes
Report-To{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BmrkpAD%2B3U%2B0cfg3glaNTpLv0n8RjTuZhmmDsefM7ichXukLRu05i9wcveSU5di3gowfJ3JGEqUmjbWx0aWQxAV0nVSUbtatz32rK600Ox6HQ6sJFPNmRicRKUWqZBpyLA2fvg%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Servercloudflare
CF-RAY87ede9c48f1e1749-SJC
alt-svch3=":443"; ma=86400
tlsping
hostfdroid.koyu.space
ip172.67.131.150
addressfdroid.koyu.space:443
connectionTLS
count10
min0.087664308
max0.088653722
average0.0882689307
stddev0.00025931602262454064
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthC
https://fdroid.krombel.de/riot-dev-fdroid/fdroid/repo
ip164.68.122.149
VerificationExceptionJAR signature failed to verify: /tmp/tmp8sa2yd3a The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882568
duration1.1941039562225342
status200
TLSTLSv1.3
headers
Servernginx
DateSun, 05 May 2024 04:16:09 GMT
Content-Typeapplication/java-archive
Content-Length4315
Last-ModifiedThu, 01 Aug 2019 17:05:29 GMT
Connectionkeep-alive
ETag"5d431bd9-10db"
Accept-Rangesbytes
tlsping
hostfdroid.krombel.de
ip164.68.122.149
addressfdroid.krombel.de:443
connectionTLS
count10
min0.578256556
max0.57998024
average0.5792008678
stddev0.0004767124024438192
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
cipher preferenceclient
least strengthA
https://fdroid.krombel.de/riot-stable/fdroid/repo
ip164.68.122.149
VerificationExceptionJAR signature failed to verify: /tmp/tmpcafn3df3 jarsigner: java.util.zip.ZipException: zip END header not found
starttime1714882577
duration0.9706258773803711
status200
TLSTLSv1.3
headers
Servernginx
DateSun, 05 May 2024 04:16:18 GMT
Content-Typetext/html
Content-Length45
Last-ModifiedWed, 17 Apr 2019 21:22:15 GMT
Connectionkeep-alive
ETag"5cb79907-2d"
Accept-Rangesbytes
tlsping
hostfdroid.krombel.de
ip164.68.122.149
addressfdroid.krombel.de:443
connectionTLS
count10
min0.576434762
max0.577250526
average0.5768585814
stddev0.0003064072489107434
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
cipher preferenceclient
least strengthA
https://fdroid.libretro.com/repo
ip5.9.202.202
VerificationExceptionJAR signature failed to verify: /tmp/tmpjpckd9qh The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882585
duration1.0412471294403076
status200
TLSTLSv1.2
headers
Content-Typeapplication/java-archive
Accept-Rangesbytes
ETag"1711916461"
Last-ModifiedWed, 18 Nov 2020 10:48:50 GMT
Content-Length5595
DateSun, 05 May 2024 04:16:26 GMT
Serverlighttpd/1.4.35
tlsping
hostfdroid.libretro.com
ip5.9.202.202
addressfdroid.libretro.com:443
connectionTLS
count10
min0.585529169
max0.592079891
average0.5890029562
stddev0.002087633824151927
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
least strengthD
https://fdroid.metatransapps.com/fdroid/repo
ip49.12.195.92
VerificationExceptionJAR signature failed to verify: /tmp/tmpgtkc12nj The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882610
duration1.4559009075164795
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:16:51 GMT
ServerApache/2.4.48 (Debian)
Permissions-Policyinterest-cohort=()
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
Content-Security-Policybase-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content;
Strict-Transport-Securitymax-age=15552000
Last-ModifiedSun, 25 Feb 2024 01:41:16 GMT
ETag"d3d8-6122ae39b8ad9"
Accept-Rangesbytes
Content-Length54232
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostfdroid.metatransapps.com
ip49.12.195.92
addressfdroid.metatransapps.com:443
connectionTLS
count10
min0.389216094
max0.390498744
average0.38996896989999996
stddev0.00044499913532195174
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.nordgedanken.dev/repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.nordgedanken.dev', port=443): Max retries exceeded with url: /repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f5bb998ec10>: Failed to establish a new connection: [Errno -5] No address associated with hostname'))
starttime1714882623
duration0.13070392608642578
status200
TLS[Errno -5] No address associated with hostname
headers
DateSun, 05 May 2024 04:16:51 GMT
ServerApache/2.4.48 (Debian)
Permissions-Policyinterest-cohort=()
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
Content-Security-Policybase-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content;
Strict-Transport-Securitymax-age=15552000
Last-ModifiedSun, 25 Feb 2024 01:41:16 GMT
ETag"d3d8-6122ae39b8ad9"
Accept-Rangesbytes
Content-Length54232
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.partidopirata.com.ar/fdroid/repo
ip151.236.30.90
VerificationExceptionJAR signature failed to verify: /tmp/tmph56ad21f The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882624
duration0.8948018550872803
status200
TLSTLSv1.3
headers
Servernginx/1.24.0
DateSun, 05 May 2024 04:17:05 GMT
Content-Typeapplication/java-archive
Content-Length5211
Last-ModifiedTue, 07 Jun 2022 01:05:55 GMT
Connectionkeep-alive
ETag"629ea473-145b"
Cache-Controlno-cache
Access-Control-Allow-Origin*.partidopirata.com.ar
Strict-Transport-Securitymax-age=15552000; includeSubDomains; preload
Accept-Rangesbytes
tlsping
hostfdroid.partidopirata.com.ar
ip151.236.30.90
addressfdroid.partidopirata.com.ar:443
connectionTLS
count10
min0.402022206
max0.415837081
average0.40476353119999997
stddev0.004279786078642828
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.pixelfed.net/fdroid/repo
ip165.227.195.166
VerificationExceptionJAR signature failed to verify: /tmp/tmpd_7v4y0g The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882640
duration0.5375490188598633
status200
TLSTLSv1.3
headers
Servernginx
DateSun, 05 May 2024 04:17:21 GMT
Content-Typeapplication/java-archive
Content-Length3696
Last-ModifiedMon, 20 Nov 2023 23:59:14 GMT
Connectionkeep-alive
ETag"655bf2d2-e70"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostfdroid.pixelfed.net
ip165.227.195.166
addressfdroid.pixelfed.net:443
connectionTLS
count10
min0.219949119
max0.223061507
average0.22136980030000003
stddev0.0010658140469687047
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.rakshazi.me/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.rakshazi.me', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f5bb997fed0>: Failed to establish a new connection: [Errno -5] No address associated with hostname'))
starttime1714882644
duration0.11877298355102539
status200
TLS[Errno -5] No address associated with hostname
headers
Servernginx
DateSun, 05 May 2024 04:17:21 GMT
Content-Typeapplication/java-archive
Content-Length3696
Last-ModifiedMon, 20 Nov 2023 23:59:14 GMT
Connectionkeep-alive
ETag"655bf2d2-e70"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.rami.io/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.rami.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f5bb997e190>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1714882645
duration0.21833109855651855
status200
TLS[Errno -2] Name or service not known
headers
Servernginx
DateSun, 05 May 2024 04:17:21 GMT
Content-Typeapplication/java-archive
Content-Length3696
Last-ModifiedMon, 20 Nov 2023 23:59:14 GMT
Connectionkeep-alive
ETag"655bf2d2-e70"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.videlibri.de/repo
ip95.143.172.218
VerificationExceptionJAR signature failed to verify: /tmp/tmpy9g09_ot The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882646
duration1.1095199584960938
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:17:26 GMT
Content-Typeapplication/x-java-archive
Content-Length6636
Connectionkeep-alive
Servernginx
Last-ModifiedSat, 04 May 2024 19:11:09 GMT
ETag"19ec-617a5995350a8"
Accept-Rangesbytes
X-Xss-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
tlsping
hostfdroid.videlibri.de
ip95.143.172.218
addressfdroid.videlibri.de:443
connectionTLS
count10
min0.565979674
max0.567299935
average0.5666528451
stddev0.00036251617824046314
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
cipher preferenceclient
least strengthA
https://fdroidfamily.codeberg.page/repo
ip217.197.91.145
starttime1714882655
duration0.9747841358184814
status404
TLSTLSv1.3
headers
AllowGET, HEAD, OPTIONS
Cache-Controlpublic, max-age=600
Content-Typetext/html; charset=utf-8
Referrer-Policystrict-origin-when-cross-origin
Serverpages-server
Strict-Transport-Securitymax-age=63072000; includeSubdomains; preload
DateSun, 05 May 2024 04:17:30 GMT
Transfer-Encodingchunked
tlsping
hostfdroidfamily.codeberg.page
ip217.197.91.145
addressfdroidfamily.codeberg.page:443
connectionTLS
count10
min0.387859564
max0.388935543
average0.38837019419999996
stddev0.0003306888587687243
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://freeyourgadget.codeberg.page/fdroid/repo
ip217.197.91.145
VerificationExceptionJAR signature failed to verify: /tmp/tmp9bq9ngt6 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882662
duration0.831669807434082
status200
TLSTLSv1.3
headers
AllowGET, HEAD, OPTIONS
Cache-Controlpublic, max-age=600
Content-Length5301
Content-Typeapplication/x-java-archive
Etag"fbedbe829d87e169227754fdd2204af9833f3676"
Last-ModifiedSat, 04 May 2024 21:56:41 UTC
Referrer-Policystrict-origin-when-cross-origin
Serverpages-server
Strict-Transport-Securitymax-age=63072000; includeSubdomains; preload
X-Pages-Cachetrue
DateSun, 05 May 2024 04:17:37 GMT
tlsping
hostfreeyourgadget.codeberg.page
ip217.197.91.145
addressfreeyourgadget.codeberg.page:443
connectionTLS
count10
min0.388736402
max0.389826019
average0.38927677250000003
stddev0.0004212712936249673
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://github.com/onionshare/onionshare-android-nightly/raw/master/fdroid/repo
ip185.199.111.133
VerificationExceptionJAR signature failed to verify: /tmp/tmp9k_0ls82 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882669
duration0.7475841045379639
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length3662
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"177e0a0917da070855917ca4148540cfa324dbc62bfe752915ffbeed2b9df1de"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id5C1E:29F91F:23629EA:25544EC:6637086E
Accept-Rangesbytes
DateSun, 05 May 2024 04:17:50 GMT
Via1.1 varnish
X-Served-Bycache-pdx12328-PDX
X-CacheMISS
X-Cache-Hits0
X-TimerS1714882670.249548,VS0,VE88
VaryAuthorization,Accept-Encoding,Origin
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-IDdb0c75b1026c2e7a92d21dea1ec88bc3aaaca44a
ExpiresSun, 05 May 2024 04:22:50 GMT
Source-Age0
tlsping
hostgithub.com
ip140.82.116.4
addressgithub.com:443
connectionTLS
count10
min0.131556001
max0.135562787
average0.1328934959
stddev0.0013110309370307342
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://gitlab.com/fdroid/fdroidclient-nightly/raw/master/fdroid/repo
ip172.65.251.78
VerificationExceptionJAR signature failed to verify: /tmp/tmp94ij0mz_ The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882671
duration0.5878901481628418
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:17:51 GMT
Content-Typeapplication/octet-stream
Content-Length5684
Connectionkeep-alive
cache-controlmax-age=60, public, must-revalidate, stale-while-revalidate=60, stale-if-error=300, s-maxage=60
content-dispositionattachment
content-security-policybase-uri 'self'; child-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ 'self' https://gitlab.com/assets/ blob: data:; connect-src 'self' https://gitlab.com wss://gitlab.com https://sentry.gitlab.net https://new-sentry.gitlab.net https://customers.gitlab.com https://snowplow.trx.gitlab.net https://sourcegraph.com https://collector.prd-278964.gl-product-analytics.com snowplow.trx.gitlab.net; default-src 'self'; font-src 'self'; form-action 'self' https: http:; frame-ancestors 'self'; frame-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/; img-src 'self' data: blob: http: https:; manifest-src 'self'; media-src 'self' data: blob: http: https:; object-src 'none'; report-uri https://new-sentry.gitlab.net/api/4/security/?sentry_key=f5573e26de8f4293b285e556c35dfd6e&sentry_environment=gprd; script-src 'strict-dynamic' 'self' 'unsafe-inline' 'unsafe-eval' https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.recaptcha.net/ https://apis.google.com https://*.zuora.com/apps/PublicHostedPageLite.do 'nonce-XUegTsrog+uJzi+VjftJMw=='; style-src 'self' 'unsafe-inline'; worker-src 'self' https://gitlab.com/assets/ blob: data:
etag"d5df3ef55ec6295f874dc50e88e9133d"
permissions-policyinterest-cohort=()
referrer-policystrict-origin-when-cross-origin
x-content-type-optionsnosniff
x-download-optionsnoopen
x-frame-optionsSAMEORIGIN
x-gitlab-meta{"correlation_id":"01HWYW6Q606HTT7X9T622NZ719","version":"1"}
x-permitted-cross-domain-policiesnone
x-request-id01HWYW6Q606HTT7X9T622NZ719
x-runtime0.214226
x-ua-compatibleIE=edge
x-xss-protection1; mode=block
gitlab-lbhaproxy-main-07-lb-gprd
gitlab-svweb-gke-us-east1-c
CF-Cache-StatusREVALIDATED
Accept-Rangesbytes
Report-To{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=j2XPxpMpTD7Qb73ZhwyEF38CXOFZld8MgdZfKMGaBRE%2BhARRUIyulzlJrfQ52N9Sfl9U2BbnaN3X1mGyYZEDewElnlzPQEZQ9%2F8JGWytxMxJ7flYrNvtoDvWmI8%3D"}],"group":"cf-nel","max_age":604800}
NEL{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
VaryAccept-Encoding
Strict-Transport-Securitymax-age=31536000
Set-Cookie_cfuvid=Aw7Uk.WHppVML7AJ2ux7k1waohDe8wuGWJN9cydiSRo-1714882671856-0.0.1.1-604800000; path=/; domain=.gitlab.com; HttpOnly; Secure; SameSite=None
Servercloudflare
CF-RAY87edec59ed139e4d-SJC
tlsping
hostgitlab.com
ip172.65.251.78
addressgitlab.com:443
connectionTLS
count10
min0.084239415
max0.085160966
average0.0848146397
stddev0.0003294356592893547
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://grobox.de/fdroid/repo
ip217.197.86.172
VerificationExceptionJAR signature failed to verify: /tmp/tmp1jb8ftv_ The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882674
duration1.20278000831604
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:17:54 GMT
ServerApache
Upgradeh2,h2c
ConnectionUpgrade, Keep-Alive
Last-ModifiedMon, 15 Jan 2024 12:27:21 GMT
ETag"28d2-60efb22b2e710"
Accept-Rangesbytes
Content-Length10450
Keep-Alivetimeout=5, max=100
Content-Typeapplication/java-archive
tlsping
hostgrobox.de
ip217.197.86.172
addressgrobox.de:443
connectionTLS
count10
min0.580721244
max0.965842081
average0.6425406741
stddev0.10895199282391214
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://guardianproject-wind.s3.amazonaws.com/fdroid/repo
ip54.231.128.145
VerificationExceptionJAR signature failed to verify: /tmp/tmpgblbk2u4 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882686
duration0.8583259582519531
status200
TLSTLSv1.2
headers
x-amz-id-2gzAMjGYiPmHtVhG/b1m0+M/Bl2C7kVTyG552MT35x8eSgZ8f000nPIyY1f+IbNI+2VRKyRl0PZQ=
x-amz-request-id0V2D9WAH6H7X6MVT
DateSun, 05 May 2024 04:18:07 GMT
Last-ModifiedSat, 04 May 2024 07:52:38 GMT
ETag"cd5ba622a5d617e3987e761e0f5cbfc3"
x-amz-server-side-encryptionAES256
x-amz-meta-s3cmd-attrsatime:1714808580/ctime:1714808580/gid:1000/gname:geheimnis/md5:cd5ba622a5d617e3987e761e0f5cbfc3/mode:33188/mtime:1714808580/uid:1000/uname:geheimnis
Accept-Rangesbytes
Content-Typeapplication/zip
ServerAmazonS3
Content-Length627690
tlsping
hostguardianproject-wind.s3.amazonaws.com
ip52.217.87.52
addressguardianproject-wind.s3.amazonaws.com:443
connectionTLS
count10
min0.265628218
max0.270926274
average0.26817329450000005
stddev0.0019234977867734196
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://guardianproject.info/fdroid/repo
ip162.247.75.177
VerificationExceptionJAR signature failed to verify: /tmp/tmpqc9reqze The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882694
duration0.8156840801239014
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:18:14 GMT
ServerApache/2.4.38 (Debian)
Permissions-Policyinterest-cohort=()
Feature-Policyambient-light-sensor 'none'; autoplay 'none'; accelerometer 'none'; camera 'none'; display-capture 'none'; document-domain 'none'; encrypted-media 'none'; fullscreen 'none'; geolocation 'none'; gyroscope 'none'; magnetometer 'none'; microphone 'none'; midi 'none'; payment 'none'; picture-in-picture 'none'; speaker 'none'; sync-xhr 'none'; usb 'none'; wake-lock 'none'; webauthn 'none'; vr 'none'; xr 'none';
Content-Security-Policydefault-src 'none'; base-uri 'self'; block-all-mixed-content; connect-src 'self'; font-src 'self'; form-action 'self'; frame-ancestors 'self'; img-src 'self' https://*.static.flickr.com https://*.staticflickr.com; media-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline';
Strict-Transport-Securitymax-age=31536000
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
X-Xss-Protection1; mode=block
VaryUser-Agent
Last-ModifiedSat, 04 May 2024 06:47:00 GMT
ETag"30409-6179b3403461b"
Accept-Rangesbytes
Content-Length197641
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostguardianproject.info
ip162.247.75.177
addressguardianproject.info:443
connectionTLS
count10
min0.1740761
max0.174938545
average0.1745711157
stddev0.0002297468292029498
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://haagch.frickel.club/files/fdroid/repo
ip45.136.28.37
VerificationExceptionJAR signature failed to verify: /tmp/tmpajguzcyr The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882703
duration0.7992660999298096
status200
TLSTLSv1.3
headers
Servernginx/1.24.0
DateSun, 05 May 2024 04:18:23 GMT
Content-Typeapplication/java-archive
Content-Length7603
Last-ModifiedThu, 06 Jan 2022 03:00:10 GMT
Connectionkeep-alive
ETag"61d65b3a-1db3"
Accept-Rangesbytes
tlsping
hosthaagch.frickel.club
ip45.136.28.37
addresshaagch.frickel.club:443
connectionTLS
count10
min0.371471222
max0.373110243
average0.3723465347
stddev0.0004966734016653338
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://jak-linux.org/fdroid/repo
ip195.201.138.240
VerificationExceptionJAR signature failed to verify: /tmp/tmpmn40bmwi The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882712
duration0.8140659332275391
status200
TLSTLSv1.3
headers
Servernginx/1.24.0 (Ubuntu)
DateSun, 05 May 2024 04:18:33 GMT
Content-Typeapplication/java-archive
Content-Length4052
Last-ModifiedTue, 23 Mar 2021 17:51:53 GMT
Connectionkeep-alive
ETag"605a2ab9-fd4"
Strict-Transport-Securitymax-age=15768000
X-Frame-OptionsDENY
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Accept-Rangesbytes
tlsping
hostjak-linux.org
ip195.201.138.240
addressjak-linux.org:443
connectionTLS
count10
min0.379415202
max0.381102415
average0.3802879376
stddev0.0004505048459007323
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://jhass.github.io/insporation/fdroid/repo
ip185.199.108.153
VerificationExceptionJAR signature failed to verify: /tmp/tmp_gpk6t3q The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882722
duration0.47684502601623535
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length2948
ServerGitHub.com
Content-Typeapplication/java-archive
permissions-policyinterest-cohort=()
Last-ModifiedThu, 22 Feb 2024 04:10:47 GMT
Access-Control-Allow-Origin*
ETag"65d6c947-b84"
expiresSun, 05 May 2024 04:28:42 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-Id3D2E:B1EB7:929207:9868D8:6637089F
Accept-Rangesbytes
Age0
DateSun, 05 May 2024 04:18:42 GMT
Via1.1 varnish
X-Served-Bycache-pdx12320-PDX
X-CacheMISS
X-Cache-Hits0
X-TimerS1714882722.394194,VS0,VE86
VaryAccept-Encoding
X-Fastly-Request-ID8c0cbdc1f7525f0850426f3a61e1707bdc940b96
tlsping
hostjhass.github.io
ip185.199.108.153
addressjhass.github.io:443
connectionTLS
count10
min0.053503008
max0.054942407
average0.0542256748
stddev0.0003956296157900212
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://kaffeemitkoffein.de/fdroid/repo
ip77.10.3.118
VerificationExceptionJAR signature failed to verify: /tmp/tmpv6aeq6dj The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882723
duration1.357576847076416
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:18:44 GMT
ServerApache/2.4.38 (Raspbian)
Last-ModifiedWed, 01 May 2024 14:50:48 GMT
ETag"2005-617659cb955e0"
Accept-Rangesbytes
Content-Length8197
Strict-Transport-Securitymax-age=15768000
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostkaffeemitkoffein.de
ip77.10.3.118
addresskaffeemitkoffein.de:443
connectionTLS
count10
min0.713202387
max0.80077879
average0.7536653298
stddev0.03779461535156456
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://microg.org/fdroid/repo
ip109.230.233.131
VerificationExceptionJAR signature failed to verify: /tmp/tmpqh5rhzu0 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882790
duration1.2820990085601807
status200
TLSTLSv1.3
headers
Servernginx
DateSun, 05 May 2024 04:16:06 GMT
Content-Typeapplication/java-archive
Content-Length6468
Last-ModifiedThu, 28 Mar 2024 11:45:40 GMT
Connectionkeep-alive
ETag"66055864-1944"
Accept-Rangesbytes
tlsping
hostmicrog.org
ip109.230.233.131
addressmicrog.org:443
connectionTLS
count10
min0.385755345
max0.443203899
average0.40406916279999994
stddev0.020573765730769203
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mobileapp.bitwarden.com/fdroid/repo
ip146.75.81.91
VerificationExceptionJAR signature failed to verify: /tmp/tmplywfp3n3 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882803
duration0.5543098449707031
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length4188
ServerGitHub.com
Content-Typeapplication/java-archive
x-origin-cacheHIT
Last-ModifiedMon, 15 Apr 2024 21:27:24 GMT
Access-Control-Allow-Origin*
ETag"661d9bbc-105c"
expiresFri, 26 Apr 2024 02:30:07 GMT
x-proxy-cacheHIT
X-GitHub-Request-Id9DFE:1C61AA:186BF:1C3BE:662B0F87
Via1.1 varnish, 1.1 varnish
X-Fastly-Request-IDc4ebd331d994eae24cb58d31f3c757642bc5ab10
Fastly-Debug-StatesDELIVER
Cache-Controlpublic, max-age=0, must-revalidate
Accept-Rangesbytes
DateSun, 05 May 2024 04:20:03 GMT
Age234
X-Served-Bycache-chi-klot8100151-CHI, cache-chi-klot8100145-CHI
X-CacheHIT, HIT
X-Cache-Hits0, 1
X-TimerS1714882804.855689,VS0,VE1
VaryAccept-Encoding
X-Content-Type-Optionsnosniff
X-Service-Version27
Strict-Transport-Securitymax-age=31557600
tlsping
hostmobileapp.bitwarden.com
ip199.232.145.91
addressmobileapp.bitwarden.com:443
connectionTLS
count10
min0.055880858
max0.058086286
average0.0572836876
stddev0.0006182591442347145
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://molly.im/fdroid/repo
ip185.199.111.153
VerificationExceptionJAR signature failed to verify: /tmp/tmpqkf23dno The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882805
duration0.5461311340332031
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length5658
ServerGitHub.com
Content-Typeapplication/java-archive
Last-ModifiedSat, 20 Apr 2024 21:19:38 GMT
Access-Control-Allow-Origin*
ETag"6624316a-161a"
expiresSun, 05 May 2024 04:30:05 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-Id21DE:1A3CFE:F7C252:FFF306:663708F4
Accept-Rangesbytes
Age0
DateSun, 05 May 2024 04:20:05 GMT
Via1.1 varnish
X-Served-Bycache-pdx12320-PDX
X-CacheMISS
X-Cache-Hits0
X-TimerS1714882805.351073,VS0,VE76
VaryAccept-Encoding
X-Fastly-Request-IDaa685af05d73927ae3030d62266053e91e600a89
tlsping
hostmolly.im
ip185.199.111.153
addressmolly.im:443
connectionTLS
count10
min0.053667993
max0.05457363
average0.0540019768
stddev0.00027764825643673726
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://nanolx.org/fdroid/repo
ip87.118.120.112
VerificationExceptionJAR signature failed to verify: /tmp/tmp0z0ethld The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882806
duration1.0486159324645996
status200
TLSTLSv1.3
headers
Servernginx
DateSun, 05 May 2024 04:20:07 GMT
Content-Typeapplication/java-archive
Content-Length4978
Last-ModifiedFri, 21 May 2021 19:39:16 GMT
Connectionkeep-alive
ETag"60a80c64-1372"
Strict-Transport-Securitymax-age=15768000; includeSubDomains
X-Powered-ByPleskLin
Accept-Rangesbytes
tlsping
hostnanolx.org
ip87.118.120.112
addressnanolx.org:443
connectionTLS
count10
min0.381627764
max0.382923571
average0.3825322719
stddev0.00039134111652226793
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://onosendai.herokuapp.com/repo
ip54.159.116.102
starttime1714882815
duration0.40728092193603516
status404
TLSTLSv1.2
headers
Content-Length563
Cache-Controlno-cache, no-store
Content-Typetext/html; charset=utf-8
Date2024-05-05 04:20:15.563851473 +0000 UTC
Serverheroku-router
tlsping
hostonosendai.herokuapp.com
ip3.209.172.72
addressonosendai.herokuapp.com:443
connectionTLS
count10
min0.265306955
max0.27104027
average0.2680654811
stddev0.0016571716535888766
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://platschi.net/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='platschi.net', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f5bb9a38dd0>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1714882822
duration0.0670621395111084
status404
TLS[Errno -2] Name or service not known
headers
Content-Length563
Cache-Controlno-cache, no-store
Content-Typetext/html; charset=utf-8
Date2024-05-05 04:20:15.563851473 +0000 UTC
Serverheroku-router
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/2br-2b/Fdroid-repo/master/fdroid/repo
ip185.199.111.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpjd64e_ll The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882822
duration0.4460411071777344
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length4999
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"070addb24bc77e917a11a8ee6ea1f3c786744d1cb98cc339fb2c6b24d782c415"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-IdFAD2:B2005:825E9B:8A6275:66370906
Accept-Rangesbytes
DateSun, 05 May 2024 04:20:22 GMT
Via1.1 varnish
X-Served-Bycache-pdx12333-PDX
X-CacheMISS
X-Cache-Hits0
X-TimerS1714882823.811268,VS0,VE122
VaryAuthorization,Accept-Encoding,Origin
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID855b2f29baaaea5be8d510549c3a4558dcf7f7aa
ExpiresSun, 05 May 2024 04:25:22 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.111.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.053585194
max0.054919112
average0.0543019641
stddev0.0004580593792796834
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/MM2-0/fdroid/main/fdroid/repo
ip185.199.111.133
starttime1714882823
duration0.16006112098693848
status404
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length14
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
Content-Typetext/plain; charset=utf-8
X-GitHub-Request-Id9640:2A9FB9:2323B84:25159C0:66370907
Accept-Rangesbytes
DateSun, 05 May 2024 04:20:24 GMT
Via1.1 varnish
X-Served-Bycache-pdx12334-PDX
X-CacheMISS
X-Cache-Hits0
X-TimerS1714882824.965864,VS0,VE109
VaryAuthorization,Accept-Encoding,Origin
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID1d4d61322e796ce4b85d6174495d199ea6b78d01
ExpiresSun, 05 May 2024 04:25:24 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.111.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.053334225
max0.054309152
average0.0538850446
stddev0.0003070022649917099
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://releases.nailyk.fr/repo
ip144.76.164.24
VerificationExceptionJAR signature failed to verify: /tmp/tmploh2roew The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882824
duration1.1939260959625244
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:20:25 GMT
ServerApache
Last-ModifiedSat, 04 May 2024 19:03:48 GMT
ETag"11e6-617a57f075de9"
Accept-Rangesbytes
Content-Length4582
Content-Typeapplication/java-archive
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
tlsping
hostreleases.nailyk.fr
ip144.76.164.24
addressreleases.nailyk.fr:443
connectionTLS
count10
min0.422019191
max0.424145309
average0.4234836931
stddev0.0006549037701309196
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://releases.threema.ch/fdroid/repo
ip185.88.236.97
VerificationExceptionJAR signature failed to verify: /tmp/tmp9ljkxtuk The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882833
duration0.996286153793335
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:20:34 GMT
ServerApache
Last-ModifiedThu, 02 May 2024 10:52:14 GMT
ETag"1d80-6177665567e8e"
Accept-Rangesbytes
Content-Length7552
Access-Control-Allow-Origin*
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/x-java-archive
tlsping
hostreleases.threema.ch
ip185.88.236.97
addressreleases.threema.ch:443
connectionTLS
count10
min0.388349896
max0.389367826
average0.3888549954
stddev0.0002675665397093491
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://repo.kuschku.de/repo
ip148.251.132.182
starttime1714882848
duration1.3464488983154297
status404
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:20:50 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
VaryAccept-Encoding
Content-Encodingbr
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
tlsping
hostrepo.kuschku.de
ip148.251.132.182
addressrepo.kuschku.de:443
connectionTLS
count10
min0.600414007
max0.601929897
average0.6014070724
stddev0.0005363953728540548
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://repo.mobilsicher.de/fdroid/repo
ip92.204.55.54
VerificationExceptionJAR signature failed to verify: /tmp/tmpxd5ar1q_ The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882858
duration1.1229841709136963
status200
TLSTLSv1.3
headers
Servernginx
DateSun, 05 May 2024 04:20:59 GMT
Content-Typeapplication/x-java-archive
Content-Length20958
Connectionkeep-alive
Last-ModifiedMon, 11 Sep 2023 14:07:59 GMT
ETag"51de-60515da955584"
X-Cache-StatusMISS
Accept-Rangesbytes
tlsping
hostrepo.mobilsicher.de
ip92.204.55.54
addressrepo.mobilsicher.de:443
connectionTLS
count10
min0.379191843
max0.380690846
average0.3799965704
stddev0.0005720232785405239
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://repo.netsyms.com/fdroid/repo
ip104.21.39.203
VerificationExceptionJAR signature failed to verify: /tmp/tmpm569uu50 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882867
duration0.41054701805114746
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:21:07 GMT
Content-Typeapplication/java-archive
Content-Length11099
Connectionkeep-alive
VaryUser-Agent, Accept-Encoding
Last-ModifiedSat, 18 Nov 2023 06:40:11 GMT
ETag"2b5b-60a67864e3f1c"
Permissions-Policyinterest-cohort=()
X-Content-Type-Optionsnosniff
Cache-Controlmax-age=14400
CF-Cache-StatusHIT
Age1355
Accept-Rangesbytes
Report-To{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yYPtWQd4bnSnwB6ZsaKpWDa1ghQFohJGDjXEwPVU6uwXGBpTAPC4%2Bp5kKpcUWIbDqV9TBFxVD04idKuCrPgeNyL%2BFM%2BXLdVgFgZ5e442%2FZ9fZeJnPC1lWOC1mb4Bm%2BOE8C34"}],"group":"cf-nel","max_age":604800}
NEL{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Servercloudflare
CF-RAY87edf1226d66cf72-SJC
alt-svch3=":443"; ma=86400
tlsping
hostrepo.netsyms.com
ip104.21.39.203
addressrepo.netsyms.com:443
connectionTLS
count10
min0.085952557
max0.086788615
average0.0863826015
stddev0.0002369832753357284
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthC
https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo
ip35.185.44.232
VerificationExceptionJAR signature failed to verify: /tmp/tmp3tht1wsv The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882869
duration0.5790309906005859
status200
TLSTLSv1.3
headers
Cache-Controlmax-age=600
Content-Length5344
Content-Typeapplication/java-archive
Etag"3d92ff74ff4ff33631e6a34d932de6b84d461ebad7d0dcf9f99fd3005016a5f2"
ExpiresSun, 05 May 2024 04:31:09 UTC
Last-ModifiedThu, 30 Mar 2023 10:54:50 GMT
Permissions-Policyinterest-cohort=()
VaryOrigin
DateSun, 05 May 2024 04:21:09 GMT
tlsping
hostrfc2822.gitlab.io
ip35.185.44.232
addressrfc2822.gitlab.io:443
connectionTLS
count10
min0.202690082
max0.204352383
average0.20355137210000002
stddev0.0005165845856888213
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://s3.amazonaws.com/storymaker/fdroid/repo
ip52.216.93.45
starttime1714882873
duration0.36566710472106934
status403
TLSTLSv1.2
headers
x-amz-request-idGDV7MK1AP9245115
x-amz-id-2CSXpPewMY/m0xAYuPliLgs6rP5Vdjd6KwCdxcJ6Het6tKFFqBMlNnE7QVb/Hy9kRA0MaHnAm+9A=
Content-Typeapplication/xml
Transfer-Encodingchunked
DateSun, 05 May 2024 04:21:12 GMT
ServerAmazonS3
tlsping
hosts3.amazonaws.com
ip52.216.93.165
addresss3.amazonaws.com:443
connectionTLS
count10
min0.183406563
max0.184671027
average0.1841268094
stddev0.0004042455346648113
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://secfirst.org/fdroid/repo
ip52.50.17.13
VerificationExceptionJAR signature failed to verify: /tmp/tmppf0wf98x The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882880
duration1.0980000495910645
status200
TLSTLSv1.2
headers
Servernginx/1.12.2
DateSun, 05 May 2024 05:05:33 GMT
Content-Typeapplication/java-archive
Content-Length4629
Last-ModifiedMon, 04 May 2020 04:40:24 GMT
Connectionkeep-alive
ETag"5eaf9cb8-1215"
Strict-Transport-Securitymax-age=15768000
X-Frame-OptionsDENY
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostsecfirst.org
ip52.50.17.13
addresssecfirst.org:443
connectionTLS
count10
min0.525203641
max0.535608609
average0.5295456087
stddev0.002848172781832922
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://service.tagesschau.de/app/repo
ip34.160.251.4
VerificationExceptionJAR signature failed to verify: /tmp/tmpfgzo4cxz The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882900
duration1.36092209815979
status200
TLSTLSv1.3
headers
ExpiresSun, 05 May 2024 05:21:41 GMT
DateSun, 05 May 2024 04:21:41 GMT
Cache-Controlpublic, max-age=3600
Last-ModifiedWed, 20 Dec 2023 12:57:01 GMT
ETag"a3df9d023d7cea631bcebe0526fe96af"
x-goog-generation1703077021062002
x-goog-metageneration1
x-goog-stored-content-encodingidentity
x-goog-stored-content-length5204
x-goog-meta-goog-reserved-file-mtime1703076975
Content-Typeapplication/octet-stream
x-goog-hashcrc32c=rq8/JA==, md5=o9+dAj186mMbzr4FJv6Wrw==
x-goog-storage-classSTANDARD
Accept-Rangesbytes
Content-Length5204
X-GUploader-UploadIDABPtcPrUuBd1lRbdC058JgnXYmycjGvoMEKitm03OD07fh8cVKrg1KXtPVk3GfNmjaAmmGpcfhU
ServerUploadServer
Alt-Svch3=":443"; ma=2592000,h3-29=":443"; ma=2592000
tlsping
hostservice.tagesschau.de
ip34.117.212.51
addressservice.tagesschau.de:443
connectionTLS
count10
min0.063071836
max0.065151647
average0.0640118168
stddev0.000607471251595463
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthC
https://static.cryptomator.org/android/fdroid/repo
ip104.21.5.32
VerificationExceptionJAR signature failed to verify: /tmp/tmpyvoqog3u The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882903
duration0.37769007682800293
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:21:43 GMT
Content-Typeapplication/java-archive
Content-Length6251
Connectionkeep-alive
etag"16cfae252b0a8ac4df96e5d947852b73"
last-modifiedTue, 06 Jun 2023 15:34:30 GMT
x-amz-id-2txg69328ca2434545bfabbb-0066313366
x-amz-request-idtxg69328ca2434545bfabbb-0066313366
x-amz-storage-classONEZONE_IA
Cache-Controlmax-age=28800
CF-Cache-StatusHIT
Age6559
Accept-Rangesbytes
Report-To{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nkGNn6C0xweV63SnCJngjcGQa3FaoF75cMcEcvNyiRsTiHl5oPd74wWlwwu%2FpvvWKMtfT55wx2pzLcewPsOmahPftXGFOkXNRLw0PAZpU8AUtqMDZr5ciRBECB2SKUcjb7nlXxKZezrm"}],"group":"cf-nel","max_age":604800}
NEL{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
VaryAccept-Encoding
Servercloudflare
CF-RAY87edf2037e822566-SJC
alt-svch3=":443"; ma=86400
tlsping
hoststatic.cryptomator.org
ip104.21.5.32
addressstatic.cryptomator.org:443
connectionTLS
count10
min0.086637791
max0.087931438
average0.0875267742
stddev0.00037542777208293855
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256-draft (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://store.nethunter.com/repo
ip192.124.249.56
VerificationExceptionJAR signature failed to verify: /tmp/tmpgmlegeuw The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882905
duration0.4674389362335205
status200
TLSTLSv1.3
headers
ServerSucuri/Cloudproxy
DateSun, 05 May 2024 04:21:45 GMT
Content-Typeapplication/java-archive
Content-Length45952
Connectionkeep-alive
X-Sucuri-ID11026
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN, DENY
X-Content-Type-Optionsnosniff
Content-Security-Policyupgrade-insecure-requests;
Last-ModifiedWed, 28 Feb 2024 09:05:03 GMT
ETag"b380-6126d703a86d0"
Referrer-Policysame-origin
X-Sucuri-CacheHIT
Accept-Rangesbytes
tlsping
hoststore.nethunter.com
ip192.124.249.56
addressstore.nethunter.com:443
connectionTLS
count10
min0.0801533
max0.08097824
average0.0806575102
stddev0.0002237887032876341
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://submarine.strangled.net/fdroid/repo
ip178.68.43.225
VerificationExceptionJAR signature failed to verify: /tmp/tmpb9zxgeex The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882908
duration0.9593238830566406
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:21:48 GMT
ServerApache/2.4.29 (Ubuntu)
Last-ModifiedSun, 27 Mar 2022 17:57:26 GMT
ETag"106a-5db36edbdf31a"
Accept-Rangesbytes
Content-Length4202
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostsubmarine.strangled.net
ip178.68.43.225
addresssubmarine.strangled.net:443
connectionTLS
count10
min0.480265388
max0.820359575
average0.7468911756
stddev0.09252103147698738
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://thecapslock.gitlab.io/fdroid-patched-apps/fdroid/repo
ip35.185.44.232
VerificationExceptionJAR signature failed to verify: /tmp/tmpjp1dna7d The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882936
duration0.6494040489196777
status200
TLSTLSv1.3
headers
Cache-Controlmax-age=600
Content-Length5615
Content-Typeapplication/java-archive
Etag"eee43ea0f44142b348e26fe012d838bfe86c4bc99f4a700c8a5cffb12d618ec3"
ExpiresSun, 05 May 2024 04:32:17 UTC
Last-ModifiedSun, 21 Apr 2024 08:48:39 GMT
Permissions-Policyinterest-cohort=()
VaryOrigin
DateSun, 05 May 2024 04:22:17 GMT
tlsping
hostthecapslock.gitlab.io
ip35.185.44.232
addressthecapslock.gitlab.io:443
connectionTLS
count10
min0.202060954
max0.202855835
average0.20245587020000003
stddev0.00027628593294404594
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://www.collaboraoffice.com/downloads/fdroid/repo
ip116.203.209.85
VerificationExceptionJAR signature failed to verify: /tmp/tmp5om9t82m The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882940
duration0.9047560691833496
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:22:21 GMT
ServerApache/2.4.56 (Debian)
X-Content-Type-Optionsnosniff
Strict-Transport-Securitymax-age=31536000; includeSubdomains; preload
Referrer-Policystrict-origin-when-cross-origin
Last-ModifiedSun, 05 May 2024 00:20:54 GMT
ETag"11bb-617a9ed183096"
Accept-Rangesbytes
Content-Length4539
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostwww.collaboraoffice.com
ip116.203.209.85
addresswww.collaboraoffice.com:443
connectionTLS
count10
min0.3956573
max0.589639559
average0.4526537639
stddev0.08668796930189517
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 3072) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (dh 3072) of lower strength than certificate key
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.cromite.org/fdroid/repo
ip89.46.108.70
VerificationExceptionJAR signature failed to verify: /tmp/tmp_i5zz65d The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882948
duration1.0858149528503418
status200
TLSTLSv1.3
headers
Serveraruba-proxy
DateSun, 05 May 2024 04:22:29 GMT
Content-Typeapplication/java-archive
Content-Length4228
Connectionkeep-alive
Last-ModifiedFri, 03 May 2024 06:43:49 GMT
Accept-Rangesbytes
X-ServerNameipvsproxy163.ad.aruba.it
tlsping
hostwww.cromite.org
ip89.46.108.70
addresswww.cromite.org:443
connectionTLS
count10
min0.413068552
max0.414932025
average0.4140563104
stddev0.0006336336866357776
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://www.droidware.info/fdroid/repo
VerificationExceptionJAR signature failed to verify: /tmp/tmp4xizgp6n jarsigner: java.util.zip.ZipException: zip END header not found
starttime1714882972
duration0.46329402923583984
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:22:51 GMT
Content-Typetext/html; charset=utf-8
Content-Length1090
X-Request-Ida9ba87ee-a383-463a-b239-86b9141c4f6a
Cache-Controlno-store, max-age=0
Accept-Chsec-ch-prefers-color-scheme
Critical-Chsec-ch-prefers-color-scheme
Varysec-ch-prefers-color-scheme
X-Adblock-KeyMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_ULvrqBTOMUvtT98QhdmljZpnLzKTFj6o34PoUH9nNYTpyTv3HGpPUg2bojardPVFxCkfOTqVfM3yPMu6m1WNZA==
Set-Cookieparking_session=a9ba87ee-a383-463a-b239-86b9141c4f6a; expires=Sun, 05 May 2024 04:37:52 GMT; path=/
Connectionclose
tlsping
hostwww.droidware.info
ip199.59.243.225
addresswww.droidware.info:443
connectionTLS
count10
min0.253816474
max0.254548465
average0.25412428699999995
stddev0.00022365814229130895
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://www.ma-nic.de/fdroid/repo
ip46.142.89.102
VerificationExceptionJAR signature failed to verify: /tmp/tmpm60eg5q4 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1714882976
duration1.0501408576965332
status200
TLSTLSv1.3
headers
DateSun, 05 May 2024 04:22:56 GMT
ServerApache/2.4.59 (Debian)
Last-ModifiedTue, 06 Jun 2023 16:06:08 GMT
ETag"1094-5fd7832786fe5"
Accept-Rangesbytes
Content-Length4244
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostwww.ma-nic.de
ip46.142.89.102
addresswww.ma-nic.de:443
connectionTLS
count10
min0.440943037
max0.444346103
average0.44285497209999997
stddev0.001015789793913823
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA