| https://f-droid.org/repo | | ip | 37.218.243.72 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmput5xh1v0
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191128 |
|---|
| duration | 1.7539710998535156 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.22.1 |
|---|
| Date | Mon, 12 Jan 2026 04:12:08 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11432681 |
|---|
| Connection | keep-alive |
|---|
| Strict-Transport-Security | max-age=63072000 |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| ETag | "ae72e9-6481f6f845f82" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | f-droid.org |
|---|
| ip | 37.218.247.73 |
|---|
| address | f-droid.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.228473451 |
|---|
| max | 0.231137771 |
|---|
| average | 0.2297392651 |
|---|
| stddev | 0.0009038669471563224 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.tetaneutral.net/fdroid/repo | | ip | 91.224.148.45 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmprv4748q3
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190788 |
|---|
| duration | 2.111644983291626 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.22.1 |
|---|
| Date | Mon, 12 Jan 2026 04:06:28 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11432681 |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6963d2d0-ae72e9" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | fdroid.tetaneutral.net |
|---|
| ip | 91.224.148.45 |
|---|
| address | fdroid.tetaneutral.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.237717401 |
|---|
| max | 0.240222561 |
|---|
| average | 0.23895639000000002 |
|---|
| stddev | 0.0008367741368666915 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://ftp.agdsn.de/fdroid/repo | | ip | 141.30.235.39 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpa5fq7r2s
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190592 |
|---|
| duration | 7.6692609786987305 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.26.3 |
|---|
| Date | Mon, 12 Jan 2026 04:03:12 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11432681 |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6963d2d0-ae72e9" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | ftp.agdsn.de |
|---|
| ip | 141.30.235.39 |
|---|
| address | ftp.agdsn.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.257147484 |
|---|
| max | 0.259727644 |
|---|
| average | 0.258425378 |
|---|
| stddev | 0.0008812856673996278 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://ftp.fau.de/fdroid/repo | | ip | 131.188.12.211 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp8p0owgyu
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190815 |
|---|
| duration | 2.0759079456329346 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:06:56 GMT |
|---|
| Server | Apache/2.4.58 (Ubuntu) |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| ETag | "ae72e9-6481f6f7e5400" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 11432681 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | ftp.fau.de |
|---|
| ip | 131.188.12.211 |
|---|
| address | ftp.fau.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.484193821 |
|---|
| max | 0.575344398 |
|---|
| average | 0.5359425891 |
|---|
| stddev | 0.03364823067221487 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://ftp.gwdg.de/pub/android/fdroid/repo | | ip | 134.76.12.6 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp9bkaff_g
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190613 |
|---|
| duration | 2.313887119293213 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:03:34 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11432681 |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6963d2d0-ae72e9" |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | ftp.gwdg.de |
|---|
| ip | 134.76.12.6 |
|---|
| address | ftp.gwdg.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.379011115 |
|---|
| max | 1.03391374 |
|---|
| average | 0.493019313 |
|---|
| stddev | 0.19458356230077278 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | indeterminate |
|---|
| cipher preference error | Too few ciphers supported |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | indeterminate |
|---|
| cipher preference error | Too few ciphers supported |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://ftp.lysator.liu.se/pub/fdroid/repo | | ip | 130.236.254.251 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpf9tzem67
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190622 |
|---|
| duration | 2.202070951461792 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | server | nginx |
|---|
| date | Mon, 12 Jan 2026 04:03:42 GMT |
|---|
| content-type | application/java-archive |
|---|
| content-length | 11432681 |
|---|
| last-modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| etag | "6963d2d0-ae72e9" |
|---|
| accept-ranges | bytes |
|---|
|
|---|
| tlsping | | host | ftp.lysator.liu.se |
|---|
| ip | 130.236.254.251 |
|---|
| address | ftp.lysator.liu.se:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.25800884 |
|---|
| max | 0.26059771 |
|---|
| average | 0.259326495 |
|---|
| stddev | 0.0008564321406188507 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.cyberbits.eu/fdroid/repo | | ip | 51.159.104.35 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpjbywdvh5
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190804 |
|---|
| duration | 1.8034749031066895 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Accept-Ranges | bytes |
|---|
| Alt-Svc | h3=":443"; ma=2592000 |
|---|
| Content-Length | 11432681 |
|---|
| Content-Type | application/java-archive |
|---|
| Etag | "dflwrg303g1s6t1ih" |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| Server | Caddy |
|---|
| Vary | Accept-Encoding |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | DENY |
|---|
| Date | Mon, 12 Jan 2026 04:06:45 GMT |
|---|
|
|---|
| tlsping | | host | mirror.cyberbits.eu |
|---|
| ip | 51.159.104.35 |
|---|
| address | mirror.cyberbits.eu:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.276398399 |
|---|
| max | 0.302681038 |
|---|
| average | 0.2925185975 |
|---|
| stddev | 0.01106384049169963 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.eu.ossplanet.net/fdroid/repo | | ip | 65.21.121.21 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpcw_venmc
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190641 |
|---|
| duration | 2.1543960571289062 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.24.0 (Ubuntu) |
|---|
| Date | Mon, 12 Jan 2026 04:04:02 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11432681 |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6963d2d0-ae72e9" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | mirror.eu.ossplanet.net |
|---|
| ip | 65.21.121.21 |
|---|
| address | mirror.eu.ossplanet.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.297351309 |
|---|
| max | 0.335657887 |
|---|
| average | 0.3262338513 |
|---|
| stddev | 0.012981903855783015 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.fcix.net/fdroid/repo | | ip | 23.152.160.16 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpkop7xc94
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190648 |
|---|
| duration | 1.3647148609161377 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.18.0 |
|---|
| Date | Mon, 12 Jan 2026 04:04:08 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11432681 |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6963d2d0-ae72e9" |
|---|
| Expires | Mon, 12 Jan 2026 04:09:08 GMT |
|---|
| Cache-Control | max-age=300 |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | mirror.fcix.net |
|---|
| ip | 23.152.160.16 |
|---|
| address | mirror.fcix.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.171736293 |
|---|
| max | 0.174182943 |
|---|
| average | 0.17293905399999998 |
|---|
| stddev | 0.0008561451297583816 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.kumi.systems/fdroid/repo | | ip | 110.172.148.96 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp1i6lw11d
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190652 |
|---|
| duration | 2.725731134414673 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Accept-Ranges | bytes |
|---|
| Alt-Svc | h3=":443"; ma=2592000 |
|---|
| Content-Length | 11432681 |
|---|
| Content-Type | application/java-archive |
|---|
| Etag | "dflwrg303g1s6t1ih" |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| Server | Caddy |
|---|
| Vary | Accept-Encoding |
|---|
| Date | Mon, 12 Jan 2026 04:04:13 GMT |
|---|
|
|---|
| tlsping | | host | mirror.kumi.systems |
|---|
| ip | 110.172.148.96 |
|---|
| address | mirror.kumi.systems:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.356946176 |
|---|
| max | 0.388638025 |
|---|
| average | 0.37623633549999996 |
|---|
| stddev | 0.010704862125951961 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.level66.network/fdroid/repo | | ip | 141.98.136.67 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp45pom_dw
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190660 |
|---|
| duration | 2.36240291595459 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:04:21 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11432681 |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6963d2d0-ae72e9" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | mirror.level66.network |
|---|
| ip | 141.98.136.67 |
|---|
| address | mirror.level66.network:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.230291991 |
|---|
| max | 0.232624201 |
|---|
| average | 0.23148630000000003 |
|---|
| stddev | 0.0008046061104596462 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.ossplanet.net/fdroid/repo | | ip | 163.22.17.70 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpqmu3l4pi
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190670 |
|---|
| duration | 7.815751075744629 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.18.0 (Ubuntu) |
|---|
| Date | Mon, 12 Jan 2026 04:04:34 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11432681 |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6963d2d0-ae72e9" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | mirror.ossplanet.net |
|---|
| ip | 163.22.17.70 |
|---|
| address | mirror.ossplanet.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 3.01276572 |
|---|
| max | 3.6406839680000003 |
|---|
| average | 3.0978561417000003 |
|---|
| stddev | 0.18149013817829762 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirrors.dotsrc.org/fdroid/repo | | ip | 130.225.254.116 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpqnfiwyfa
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190716 |
|---|
| duration | 2.2747578620910645 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.28.0 |
|---|
| Date | Mon, 12 Jan 2026 04:05:17 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11421230 |
|---|
| Last-Modified | Sat, 10 Jan 2026 19:24:45 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6962a77d-ae462e" |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Referrer-Policy | strict-origin |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | mirrors.dotsrc.org |
|---|
| ip | 130.225.254.116 |
|---|
| address | mirrors.dotsrc.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.27463083 |
|---|
| max | 0.27719758 |
|---|
| average | 0.27587704900000004 |
|---|
| stddev | 0.0009039838357343585 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://opencolo.mm.fcix.net/fdroid/repo | | ip | 50.117.120.66 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp8k6e5ljt
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190732 |
|---|
| duration | 1.4368340969085693 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.20.1 |
|---|
| Date | Mon, 12 Jan 2026 04:05:32 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11432681 |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6963d2d0-ae72e9" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | opencolo.mm.fcix.net |
|---|
| ip | 50.117.120.66 |
|---|
| address | opencolo.mm.fcix.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.217621446 |
|---|
| max | 0.245598276 |
|---|
| average | 0.228320656 |
|---|
| stddev | 0.010696076332287462 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_CCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://plug-mirror.rcac.purdue.edu/fdroid/repo | | ip | 128.211.151.251 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpu5j2ie4y
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190838 |
|---|
| duration | 0.8781051635742188 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:07:18 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11432681 |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6963d2d0-ae72e9" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | plug-mirror.rcac.purdue.edu |
|---|
| ip | 128.211.151.251 |
|---|
| address | plug-mirror.rcac.purdue.edu:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.137498204 |
|---|
| max | 0.171451833 |
|---|
| average | 0.16001526850000003 |
|---|
| stddev | 0.010072624439288512 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.init7.net/fdroid/repo | | ip | 109.202.202.202 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpo3x44iit
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190738 |
|---|
| duration | 2.0744619369506836 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.26.3 |
|---|
| Date | Mon, 12 Jan 2026 04:05:39 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11432681 |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6963d2d0-ae72e9" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | mirror.init7.net |
|---|
| ip | 109.202.202.202 |
|---|
| address | mirror.init7.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.24901982 |
|---|
| max | 0.25146415 |
|---|
| average | 0.25029370799999995 |
|---|
| stddev | 0.0008319495422656325 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.freedif.org/fdroid/repo | | ip | 66.96.199.63 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp35787lx5
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190763 |
|---|
| duration | 3.858459949493408 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:06:04 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11432681 |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6963d2d0-ae72e9" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | mirror.freedif.org |
|---|
| ip | 66.96.199.63 |
|---|
| address | mirror.freedif.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.522299089 |
|---|
| max | 0.548690858 |
|---|
| average | 0.5362421008 |
|---|
| stddev | 0.008690490599184312 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://bubu1.eu/fdroid/repo | | ip | 176.9.145.28 |
|---|
| starttime | 1768190810 |
|---|
| duration | 0.4657268524169922 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.29.3 |
|---|
| Date | Mon, 12 Jan 2026 04:06:50 GMT |
|---|
| Content-Type | text/html; charset=utf-8 |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | keep-alive |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
|---|
| Referrer-Policy | strict-origin |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| Content-Encoding | gzip |
|---|
|
|---|
| tlsping | | host | bubu1.eu |
|---|
| ip | 176.9.145.28 |
|---|
| address | bubu1.eu:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.25848276 |
|---|
| max | 0.273356439 |
|---|
| average | 0.2617045119 |
|---|
| stddev | 0.00429023422162363 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.swedneck.xyz/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='fdroid.swedneck.xyz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a629ff450>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1768190815 |
|---|
| duration | 0.14891815185546875 |
|---|
| status | 404 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Server | nginx/1.29.3 |
|---|
| Date | Mon, 12 Jan 2026 04:06:50 GMT |
|---|
| Content-Type | text/html; charset=utf-8 |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | keep-alive |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
|---|
| Referrer-Policy | strict-origin |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| Content-Encoding | gzip |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.jarsilio.com/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='mirror.jarsilio.com', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a629ff650>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1768190824 |
|---|
| duration | 0.13223719596862793 |
|---|
| status | 200 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:06:56 GMT |
|---|
| Server | Apache/2.4.58 (Ubuntu) |
|---|
| Last-Modified | Sun, 11 Jan 2026 16:41:52 GMT |
|---|
| ETag | "ae72e9-6481f6f7e5400" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 11432681 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://ftp.osuosl.org/pub/fdroid/repo | | ip | 140.211.166.134 |
|---|
| starttime | 1768190825 |
|---|
| duration | 0.32480311393737793 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:07:05 GMT |
|---|
| Server | Apache |
|---|
| Content-Length | 261 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | text/html; charset=iso-8859-1 |
|---|
|
|---|
| tlsping | | host | ftp.osuosl.org |
|---|
| ip | 140.211.166.134 |
|---|
| address | ftp.osuosl.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.26242403 |
|---|
| max | 0.26909537 |
|---|
| average | 0.266413094 |
|---|
| stddev | 0.0022149237728156745 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.scd31.com/fdroid/repo | | ip | 205.209.125.10 |
|---|
| starttime | 1768190834 |
|---|
| duration | 0.17052102088928223 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Server | nginx/1.22.1 |
|---|
| Date | Mon, 12 Jan 2026 04:07:14 GMT |
|---|
| Content-Type | text/html |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | keep-alive |
|---|
| Content-Encoding | gzip |
|---|
|
|---|
| tlsping | | host | mirror.scd31.com |
|---|
| ip | 205.209.125.10 |
|---|
| address | mirror.scd31.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.090270776 |
|---|
| max | 0.093062546 |
|---|
| average | 0.09185603299999999 |
|---|
| stddev | 0.0008904876966701999 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.fi-do.io/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='fdroid.fi-do.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62a0ee90>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1768190837 |
|---|
| duration | 0.020720958709716797 |
|---|
| status | 404 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Server | nginx/1.22.1 |
|---|
| Date | Mon, 12 Jan 2026 04:07:14 GMT |
|---|
| Content-Type | text/html |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | keep-alive |
|---|
| Content-Encoding | gzip |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://android.izzysoft.de/repo | | ip | 144.76.109.58 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpdjx0j1o4
jarsigner: java.util.zip.ZipException: zip END header not found
|
|---|
| starttime | 1768190840 |
|---|
| duration | 0.7463290691375732 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:07:20 GMT |
|---|
| Server | Apache |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| Content-Security-Policy | base-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self'; |
|---|
| Strict-Transport-Security | max-age=15552000; includeSubDomains |
|---|
| Cache-Control | max-age=2592000 |
|---|
| Expires | Wed, 11 Feb 2026 04:07:20 GMT |
|---|
| Vary | Accept-Encoding |
|---|
| Content-Encoding | gzip |
|---|
| Content-Length | 1964 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
|
|---|
| tlsping | | host | android.izzysoft.de |
|---|
| ip | 144.76.109.58 |
|---|
| address | android.izzysoft.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.24367705 |
|---|
| max | 0.353119036 |
|---|
| average | 0.29379937479999996 |
|---|
| stddev | 0.050717042340742764 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://anonymousmessenger.ly/fdroid/repo | | ip | 185.176.41.167 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpwr9ehg4q
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190847 |
|---|
| duration | 1.0836341381072998 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.27.0 |
|---|
| Date | Mon, 12 Jan 2026 04:07:28 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 5581 |
|---|
| Last-Modified | Thu, 21 Jul 2022 14:06:02 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "62d95d4a-15cd" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | anonymousmessenger.ly |
|---|
| ip | 185.176.41.167 |
|---|
| address | anonymousmessenger.ly:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.324810988 |
|---|
| max | 0.357425046 |
|---|
| average | 0.338557683 |
|---|
| stddev | 0.012225940622575853 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://app.futo.org/fdroid/repo | | ip | 159.65.228.96 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpbxplpxzr
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190856 |
|---|
| duration | 0.47203493118286133 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.22.1 |
|---|
| Date | Mon, 12 Jan 2026 04:07:36 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 5160 |
|---|
| Last-Modified | Thu, 25 Dec 2025 00:11:31 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "694c8133-1428" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | app.futo.org |
|---|
| ip | 159.65.228.96 |
|---|
| address | app.futo.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.123779905 |
|---|
| max | 0.153782513 |
|---|
| average | 0.14135878490000003 |
|---|
| stddev | 0.010083613783467192 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://app.usb0.net/repo | | ip | 104.21.6.28 |
|---|
| starttime | 1768190859 |
|---|
| duration | 0.26572394371032715 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:07:40 GMT |
|---|
| Content-Type | text/html |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | keep-alive |
|---|
| Server | cloudflare |
|---|
| Cache-Control | max-age=14400 |
|---|
| cf-cache-status | EXPIRED |
|---|
| Nel | {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800} |
|---|
| Vary | accept-encoding |
|---|
| Report-To | {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=pxlGcSkey%2BoX95SQ0Ro0l%2BcjteCNtD3Wypn2E4kDeDD5zC4M2TX%2FC7tOmC0TgZHIxXssjDh8qeSVqUN905hK7wL4IEzcVV9WUOc%3D"}]} |
|---|
| Content-Encoding | br |
|---|
| CF-RAY | 9bc9c9ca597eb543-ATL |
|---|
| alt-svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | | host | app.usb0.net |
|---|
| ip | 104.21.6.28 |
|---|
| address | app.usb0.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.121463295 |
|---|
| max | 0.206340051 |
|---|
| average | 0.1854417685 |
|---|
| stddev | 0.025445691470415602 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://apt.izzysoft.de/fdroid/repo | | ip | 144.76.109.58 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpa8khxqpd
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190861 |
|---|
| duration | 1.6286439895629883 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:07:41 GMT |
|---|
| Server | Apache |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| Content-Security-Policy | base-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self'; |
|---|
| Strict-Transport-Security | max-age=15552000; includeSubDomains |
|---|
| Last-Modified | Sun, 11 Jan 2026 18:48:11 GMT |
|---|
| ETag | "3017df-648213347504d" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 3151839 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | apt.izzysoft.de |
|---|
| ip | 144.76.109.58 |
|---|
| address | apt.izzysoft.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.243999091 |
|---|
| max | 0.24628046 |
|---|
| average | 0.24512477709999997 |
|---|
| stddev | 0.0007956665565823978 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://archive.newpipe.net/fdroid/repo | | ip | 159.69.138.33 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp09phtdsx
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190868 |
|---|
| duration | 0.8848409652709961 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:07:48 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 28559 |
|---|
| Last-Modified | Sun, 11 Jan 2026 23:19:23 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69642ffb-6f8f" |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| Referrer-Policy | strict-origin |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| Content-Security-Policy | default-src 'self'; object-src 'none'; block-all-mixed-content |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | archive.newpipe.net |
|---|
| ip | 159.69.138.33 |
|---|
| address | archive.newpipe.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.248778602 |
|---|
| max | 0.251275632 |
|---|
| average | 0.250078361 |
|---|
| stddev | 0.0008527297357480869 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://brave-browser-apk-nightly.s3.brave.com/fdroid/repo | | ip | 3.166.160.25 |
|---|
| VerificationException | The repository's fingerprint does not match. |
|---|
| starttime | 1768190891 |
|---|
| duration | 1.2858860492706299 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Content-Type | application/java-archive |
|---|
| Content-Length | 142200 |
|---|
| Connection | keep-alive |
|---|
| Date | Mon, 12 Jan 2026 04:08:12 GMT |
|---|
| Last-Modified | Sun, 11 Jan 2026 01:55:58 GMT |
|---|
| ETag | "3dc4398a434c95354c9ddbc5ed97f222" |
|---|
| x-amz-server-side-encryption | AES256 |
|---|
| x-amz-version-id | bEvC5tTA233X9R2cSGrpD3hd73G00_rk |
|---|
| Accept-Ranges | bytes |
|---|
| Server | AmazonS3 |
|---|
| X-Cache | Miss from cloudfront |
|---|
| Via | 1.1 454cea9dce953b32cce75c52c4877336.cloudfront.net (CloudFront) |
|---|
| X-Amz-Cf-Pop | MIA50-P3 |
|---|
| Alt-Svc | h3=":443"; ma=86400 |
|---|
| X-Amz-Cf-Id | 6v1U6TKAelAJU7eHHQiv_QdVh3ebYKrbPPiWPsdfYCJ6MvYPPcPHTQ== |
|---|
|
|---|
| tlsping | | host | brave-browser-apk-nightly.s3.brave.com |
|---|
| ip | 3.166.160.25 |
|---|
| address | brave-browser-apk-nightly.s3.brave.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.06346967 |
|---|
| max | 0.066117001 |
|---|
| average | 0.06477672809999999 |
|---|
| stddev | 0.000880400443743689 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://brave-browser-apk-release.s3.brave.com/fdroid/repo | | ip | 18.173.166.55 |
|---|
| VerificationException | The repository's fingerprint does not match. |
|---|
| starttime | 1768190893 |
|---|
| duration | 1.0830049514770508 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Content-Type | application/java-archive |
|---|
| Content-Length | 39017 |
|---|
| Connection | keep-alive |
|---|
| Date | Mon, 12 Jan 2026 04:08:15 GMT |
|---|
| Last-Modified | Thu, 11 Dec 2025 20:11:57 GMT |
|---|
| ETag | "2620e55ecf85c97a8b19590759cb96fe" |
|---|
| x-amz-server-side-encryption | AES256 |
|---|
| x-amz-version-id | umUH14_GQhPwlh8xofyrCy04Nm7um55l |
|---|
| Accept-Ranges | bytes |
|---|
| Server | AmazonS3 |
|---|
| X-Cache | Miss from cloudfront |
|---|
| Via | 1.1 702ef314013a608397b521ec26967856.cloudfront.net (CloudFront) |
|---|
| X-Amz-Cf-Pop | MIA3-P7 |
|---|
| Alt-Svc | h3=":443"; ma=86400 |
|---|
| X-Amz-Cf-Id | RvKZnSAn1fT4ZXVKvXfkOyquz1CEIPX3f9SgkS2x3QFGAlJN8aYr6A== |
|---|
|
|---|
| tlsping | | host | brave-browser-apk-release.s3.brave.com |
|---|
| ip | 18.173.166.55 |
|---|
| address | brave-browser-apk-release.s3.brave.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.06055916 |
|---|
| max | 0.06304563 |
|---|
| average | 0.0618513776 |
|---|
| stddev | 0.0008411014706828436 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://breezy-weather.github.io/fdroid-repo/fdroid/repo | | ip | 185.199.108.153 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpp5vlmif1
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190896 |
|---|
| duration | 0.420306921005249 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 18961 |
|---|
| Server | GitHub.com |
|---|
| Content-Type | application/java-archive |
|---|
| Last-Modified | Mon, 12 Jan 2026 02:13:57 GMT |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Strict-Transport-Security | max-age=31556952 |
|---|
| ETag | "696458e5-4a11" |
|---|
| expires | Mon, 12 Jan 2026 04:18:16 GMT |
|---|
| Cache-Control | max-age=600 |
|---|
| x-proxy-cache | MISS |
|---|
| X-GitHub-Request-Id | E163:BE581:12FE3:156FE:696473B0 |
|---|
| Accept-Ranges | bytes |
|---|
| Age | 0 |
|---|
| Date | Mon, 12 Jan 2026 04:08:16 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-iad-kjyo7100120-IAD |
|---|
| X-Cache | MISS |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1768190896.172874,VS0,VE18 |
|---|
| Vary | Accept-Encoding |
|---|
| X-Fastly-Request-ID | 242f102ed8fbf3bf716537e0eac2d1d956371e1e |
|---|
|
|---|
| tlsping | | host | breezy-weather.github.io |
|---|
| ip | 185.199.108.153 |
|---|
| address | breezy-weather.github.io:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.062604561 |
|---|
| max | 0.066284421 |
|---|
| average | 0.064457768 |
|---|
| stddev | 0.0012368110074177051 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://briarproject.org/fdroid/repo | | ip | 157.90.23.135 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpxswkc617
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190897 |
|---|
| duration | 0.7863249778747559 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.22.1 |
|---|
| Date | Mon, 12 Jan 2026 04:06:32 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 4274 |
|---|
| Last-Modified | Thu, 11 Dec 2025 10:35:57 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "693a9e8d-10b2" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | briarproject.org |
|---|
| ip | 157.90.23.135 |
|---|
| address | briarproject.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.241222704 |
|---|
| max | 0.243578064 |
|---|
| average | 0.242398352 |
|---|
| stddev | 0.000802491839494956 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://bubu1.eu/fdroidclassic/fdroid/repo | | ip | 176.9.145.28 |
|---|
| VerificationException | The repository's fingerprint does not match. |
|---|
| starttime | 1768190902 |
|---|
| duration | 0.8644399642944336 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.29.3 |
|---|
| Date | Mon, 12 Jan 2026 04:08:22 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 9793 |
|---|
| Last-Modified | Wed, 08 Mar 2023 23:22:24 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "640918b0-2641" |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
|---|
| Referrer-Policy | strict-origin |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | bubu1.eu |
|---|
| ip | 176.9.145.28 |
|---|
| address | bubu1.eu:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.252857653 |
|---|
| max | 0.256152953 |
|---|
| average | 0.254529945 |
|---|
| stddev | 0.001141467059365271 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://calyxos.gitlab.io/calyx-fdroid-repo/fdroid/repo | | ip | 35.185.44.232 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmphw5ry32u
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190908 |
|---|
| duration | 0.47164297103881836 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Cache-Control | max-age=600 |
|---|
| Content-Length | 6874 |
|---|
| Content-Type | application/java-archive |
|---|
| Etag | "1981ccf49733b550a8cde9619f1d4c2cc6444ec15ebc2504c283e1287f416f7d" |
|---|
| Expires | Mon, 12 Jan 2026 04:18:28 UTC |
|---|
| Last-Modified | Mon, 12 Jan 2026 04:01:30 GMT |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| Vary | Origin |
|---|
| X-Request-Id | 01KER685MJKDVAPF5NB9RQGXXG |
|---|
| Date | Mon, 12 Jan 2026 04:08:28 GMT |
|---|
|
|---|
| tlsping | | host | calyxos.gitlab.io |
|---|
| ip | 35.185.44.232 |
|---|
| address | calyxos.gitlab.io:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.03971881 |
|---|
| max | 0.04364348 |
|---|
| average | 0.041665073 |
|---|
| stddev | 0.001356060587968325 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://cdn.kde.org/android/fdroid/repo | | ip | 89.222.120.5 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpiklx4nfj
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190908 |
|---|
| duration | 1.035283088684082 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:08:29 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 165847 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Mon, 12 Jan 2026 02:57:40 GMT |
|---|
| Cache-Control | max-age=0 |
|---|
| Expires | Mon, 12 Jan 2026 04:08:29 GMT |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-77-NZT | k6jfpAsag3i/x9WHp4UJXScSFJEdvFRgAmwGkOlVq+YNq7NmqB2TFHY |
|---|
| X-77-NZT-Ray | 416cb7244cac1b65bd73646927aca300 |
|---|
| X-77-Cache | MISS |
|---|
| Server | CDN77-Turbo |
|---|
| X-77-POP | miamiUSFL |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | cdn.kde.org |
|---|
| ip | 89.222.120.5 |
|---|
| address | cdn.kde.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.111227332 |
|---|
| max | 0.135566942 |
|---|
| average | 0.1221689429 |
|---|
| stddev | 0.009294248225926146 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://cdn.kde.org/android/stable-releases/fdroid/repo | | ip | 89.222.120.5 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpogwfx3xs
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768190911 |
|---|
| duration | 0.7192251682281494 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:08:31 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 79123 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Sun, 11 Jan 2026 08:58:43 GMT |
|---|
| Cache-Control | max-age=0 |
|---|
| Expires | Mon, 12 Jan 2026 04:08:31 GMT |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-77-NZT | kwWQ8izkU2XlxJZ1YWTHPPeM/A2DcW19N9arWof6SySJHvXHRpMVyu0 |
|---|
| X-77-NZT-Ray | 416cb724239f41b5bf7364691b1e3f17 |
|---|
| X-77-Cache | MISS |
|---|
| Server | CDN77-Turbo |
|---|
| X-77-POP | miamiUSFL |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | cdn.kde.org |
|---|
| ip | 89.222.120.5 |
|---|
| address | cdn.kde.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.090626522 |
|---|
| max | 0.131848493 |
|---|
| average | 0.11385345089999999 |
|---|
| stddev | 0.01588054047246268 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://eutopia.cz/experimental/fdroid/repo | | SSLError | HTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /experimental/fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'"))) |
|---|
| starttime | 1768190913 |
|---|
| duration | 0.4681558609008789 |
|---|
| status | 200 |
|---|
| TLS | [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992) |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:08:31 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 79123 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Sun, 11 Jan 2026 08:58:43 GMT |
|---|
| Cache-Control | max-age=0 |
|---|
| Expires | Mon, 12 Jan 2026 04:08:31 GMT |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-77-NZT | kwWQ8izkU2XlxJZ1YWTHPPeM/A2DcW19N9arWof6SySJHvXHRpMVyu0 |
|---|
| X-77-NZT-Ray | 416cb724239f41b5bf7364691b1e3f17 |
|---|
| X-77-Cache | MISS |
|---|
| Server | CDN77-Turbo |
|---|
| X-77-POP | miamiUSFL |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://eutopia.cz/fdroid/repo | | SSLError | HTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'"))) |
|---|
| starttime | 1768190918 |
|---|
| duration | 0.25012898445129395 |
|---|
| status | 200 |
|---|
| TLS | [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992) |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:08:31 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 79123 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Sun, 11 Jan 2026 08:58:43 GMT |
|---|
| Cache-Control | max-age=0 |
|---|
| Expires | Mon, 12 Jan 2026 04:08:31 GMT |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-77-NZT | kwWQ8izkU2XlxJZ1YWTHPPeM/A2DcW19N9arWof6SySJHvXHRpMVyu0 |
|---|
| X-77-NZT-Ray | 416cb724239f41b5bf7364691b1e3f17 |
|---|
| X-77-Cache | MISS |
|---|
| Server | CDN77-Turbo |
|---|
| X-77-POP | miamiUSFL |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://f-droid.i2p.io/repo | | ConnectTimeout | HTTPSConnectionPool(host='f-droid.i2p.io', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by ConnectTimeoutError(<urllib3.connection.HTTPSConnection object at 0x7d7a62a200d0>, 'Connection to f-droid.i2p.io timed out. (connect timeout=60)')) |
|---|
| starttime | 1768190923 |
|---|
| duration | 60.15693497657776 |
|---|
| status | 200 |
|---|
| TLS | [Errno 110] Connection timed out |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:08:31 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 79123 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Sun, 11 Jan 2026 08:58:43 GMT |
|---|
| Cache-Control | max-age=0 |
|---|
| Expires | Mon, 12 Jan 2026 04:08:31 GMT |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-77-NZT | kwWQ8izkU2XlxJZ1YWTHPPeM/A2DcW19N9arWof6SySJHvXHRpMVyu0 |
|---|
| X-77-NZT-Ray | 416cb724239f41b5bf7364691b1e3f17 |
|---|
| X-77-Cache | MISS |
|---|
| Server | CDN77-Turbo |
|---|
| X-77-POP | miamiUSFL |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://f-droid.monerujo.io/fdroid/repo | | ip | 35.185.44.232 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp2hhphfau
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191127 |
|---|
| duration | 0.5053129196166992 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Cache-Control | max-age=600 |
|---|
| Content-Length | 7600 |
|---|
| Content-Type | application/java-archive |
|---|
| Etag | "affdb5c6a9b95f4decc4c67a141ea146e5e87e303f64dbea67d8404c48779732" |
|---|
| Expires | Mon, 12 Jan 2026 04:22:07 UTC |
|---|
| Last-Modified | Tue, 17 Jun 2025 17:27:43 GMT |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| Vary | Origin |
|---|
| X-Request-Id | 01KER6EW799VYMMSEXGC18S7HW |
|---|
| Date | Mon, 12 Jan 2026 04:12:07 GMT |
|---|
|
|---|
| tlsping | | host | f-droid.monerujo.io |
|---|
| ip | 35.185.44.232 |
|---|
| address | f-droid.monerujo.io:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.045397408 |
|---|
| max | 0.048995088 |
|---|
| average | 0.047091389000000004 |
|---|
| stddev | 0.0011886648196564908 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.a3.pm/seabear/repo | | ip | 172.67.220.96 |
|---|
| starttime | 1768191138 |
|---|
| duration | 6.455489158630371 |
|---|
| status | 523 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:12:25 GMT |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
| Content-Length | 7167 |
|---|
| Connection | keep-alive |
|---|
| Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
|---|
| Expires | Thu, 01 Jan 1970 00:00:01 GMT |
|---|
| Referrer-Policy | same-origin |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9bc9d099ea15b4be-ATL |
|---|
| alt-svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | | host | fdroid.a3.pm |
|---|
| ip | 172.67.220.96 |
|---|
| address | fdroid.a3.pm:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.125901946 |
|---|
| max | 0.205179872 |
|---|
| average | 0.18038601640000002 |
|---|
| stddev | 0.02299727961511865 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.1 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.beocode.eu/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='fdroid.beocode.eu', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62a45850>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1768191146 |
|---|
| duration | 0.046729087829589844 |
|---|
| status | 523 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:12:25 GMT |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
| Content-Length | 7167 |
|---|
| Connection | keep-alive |
|---|
| Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
|---|
| Expires | Thu, 01 Jan 1970 00:00:01 GMT |
|---|
| Referrer-Policy | same-origin |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9bc9d099ea15b4be-ATL |
|---|
| alt-svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.1 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.bromite.org/fdroid/repo | | SSLError | HTTPSConnectionPool(host='fdroid.bromite.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)'))) |
|---|
| starttime | 1768191146 |
|---|
| duration | 0.24914002418518066 |
|---|
| status | 523 |
|---|
| TLS | [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992) |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:12:25 GMT |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
| Content-Length | 7167 |
|---|
| Connection | keep-alive |
|---|
| Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
|---|
| Expires | Thu, 01 Jan 1970 00:00:01 GMT |
|---|
| Referrer-Policy | same-origin |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9bc9d099ea15b4be-ATL |
|---|
| alt-svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.cgeo.org/fdroid/repo | | ip | 23.88.115.170 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmph0f2l6i3
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191150 |
|---|
| duration | 0.9110419750213623 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | accept-ranges | bytes |
|---|
| content-type | application/java-archive |
|---|
| date | Mon, 12 Jan 2026 04:12:31 GMT |
|---|
| etag | "6957af4b-17ff" |
|---|
| last-modified | Fri, 02 Jan 2026 11:43:07 GMT |
|---|
| server | nginx/1.27.5 |
|---|
| content-length | 6143 |
|---|
|
|---|
| tlsping | | host | fdroid.cgeo.org |
|---|
| ip | 23.88.115.170 |
|---|
| address | fdroid.cgeo.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.25103491 |
|---|
| max | 0.25414 |
|---|
| average | 0.252527596 |
|---|
| stddev | 0.0010946509297049879 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - Key exchange (ecdh_x25519) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.cgeo.org/repo | | ip | 23.88.115.170 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpd82ipqi6
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191156 |
|---|
| duration | 0.7398738861083984 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | accept-ranges | bytes |
|---|
| content-type | application/java-archive |
|---|
| date | Mon, 12 Jan 2026 04:12:36 GMT |
|---|
| etag | "6957af4b-17ff" |
|---|
| last-modified | Fri, 02 Jan 2026 11:43:07 GMT |
|---|
| server | nginx/1.27.5 |
|---|
| content-length | 6143 |
|---|
|
|---|
| tlsping | | host | fdroid.cgeo.org |
|---|
| ip | 23.88.115.170 |
|---|
| address | fdroid.cgeo.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.255170616 |
|---|
| max | 0.269763125 |
|---|
| average | 0.2579531491 |
|---|
| stddev | 0.004033026338013286 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - Key exchange (ecdh_x25519) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.fedilab.app/repo | | ip | 54.38.93.15 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpj5g_3qoj
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191161 |
|---|
| duration | 0.8820891380310059 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | date | Mon, 12 Jan 2026 04:12:41 GMT |
|---|
| content-type | application/java-archive |
|---|
| content-length | 41020 |
|---|
| last-modified | Tue, 30 Sep 2025 18:41:32 GMT |
|---|
| etag | "68dc245c-a03c" |
|---|
| accept-ranges | bytes |
|---|
| permissions-policy | microphone=(), camera=(), geolocation=(), interest-cohort=() |
|---|
| x-frame-options | deny |
|---|
| x-content-type-options | nosniff |
|---|
|
|---|
| tlsping | | host | fdroid.fedilab.app |
|---|
| ip | 54.38.93.15 |
|---|
| address | fdroid.fedilab.app:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.268313089 |
|---|
| max | 0.313670439 |
|---|
| average | 0.29791206459999997 |
|---|
| stddev | 0.012634143588298221 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.frostnerd.com/fdroid/repo | | ip | 152.53.101.189 |
|---|
| starttime | 1768191166 |
|---|
| duration | 0.5199730396270752 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Alt-Svc | h3=":443"; ma=2592000 |
|---|
| Expect-Ct | max-age=86400, enforce |
|---|
| Feature-Policy | microphone 'none'; camera 'none' |
|---|
| Permissions-Policy | camera=(), geolocation=(), microphone=(), interest-cohort=() |
|---|
| Referrer-Policy | same-origin |
|---|
| Server | Caddy |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| X-Xss-Protection | 0 |
|---|
| Date | Mon, 12 Jan 2026 04:12:47 GMT |
|---|
| Content-Length | 0 |
|---|
|
|---|
| tlsping | | host | fdroid.frostnerd.com |
|---|
| ip | 152.53.101.189 |
|---|
| address | fdroid.frostnerd.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.290486029 |
|---|
| max | 0.331593387 |
|---|
| average | 0.31116864499999997 |
|---|
| stddev | 0.013166582253083356 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.i2pd.xyz/fdroid/repo | | ip | 62.210.85.80 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpix6dp5ue
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191171 |
|---|
| duration | 0.8752210140228271 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:12:52 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 37848 |
|---|
| Last-Modified | Tue, 09 Sep 2025 13:55:17 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "68c031c5-93d8" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-Xss-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | fdroid.i2pd.xyz |
|---|
| ip | 62.210.85.80 |
|---|
| address | fdroid.i2pd.xyz:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.382284526 |
|---|
| max | 0.397398375 |
|---|
| average | 0.39157262160000006 |
|---|
| stddev | 0.005266967043683589 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp521r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp521r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.koyu.space/fdroid/repo | | SSLError | HTTPSConnectionPool(host='fdroid.koyu.space', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLError(1, '[SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992)'))) |
|---|
| starttime | 1768191180 |
|---|
| duration | 0.2780289649963379 |
|---|
| status | 200 |
|---|
| TLS | [SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992) |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:12:52 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 37848 |
|---|
| Last-Modified | Tue, 09 Sep 2025 13:55:17 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "68c031c5-93d8" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-Xss-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.krombel.de/riot-dev-fdroid/fdroid/repo | | ip | 164.68.122.149 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpf865caiy
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191183 |
|---|
| duration | 0.8254151344299316 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:13:04 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 4315 |
|---|
| Last-Modified | Thu, 01 Aug 2019 17:05:29 GMT |
|---|
| Connection | keep-alive |
|---|
| Vary | Accept-Encoding |
|---|
| ETag | "5d431bd9-10db" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | fdroid.krombel.de |
|---|
| ip | 164.68.122.149 |
|---|
| address | fdroid.krombel.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.237203051 |
|---|
| max | 0.239469711 |
|---|
| average | 0.23824256500000002 |
|---|
| stddev | 0.0007789769394044981 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.krombel.de/riot-stable/fdroid/repo | | ip | 164.68.122.149 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp9tib33od
jarsigner: java.util.zip.ZipException: zip END header not found
|
|---|
| starttime | 1768191189 |
|---|
| duration | 0.7483811378479004 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:13:09 GMT |
|---|
| Content-Type | text/html |
|---|
| Content-Length | 45 |
|---|
| Last-Modified | Wed, 17 Apr 2019 21:22:15 GMT |
|---|
| Connection | keep-alive |
|---|
| Vary | Accept-Encoding |
|---|
| ETag | "5cb79907-2d" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | fdroid.krombel.de |
|---|
| ip | 164.68.122.149 |
|---|
| address | fdroid.krombel.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.231845454 |
|---|
| max | 0.234257794 |
|---|
| average | 0.233083059 |
|---|
| stddev | 0.0008302955454445118 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.libretro.com/repo | | ip | 5.9.202.202 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp1gpj61so
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191194 |
|---|
| duration | 0.9004859924316406 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Content-Type | application/java-archive |
|---|
| Accept-Ranges | bytes |
|---|
| ETag | "1711916461" |
|---|
| Last-Modified | Wed, 18 Nov 2020 10:48:50 GMT |
|---|
| Content-Length | 5595 |
|---|
| Date | Mon, 12 Jan 2026 04:13:15 GMT |
|---|
| Server | lighttpd/1.4.35 |
|---|
|
|---|
| tlsping | | host | fdroid.libretro.com |
|---|
| ip | 5.9.202.202 |
|---|
| address | fdroid.libretro.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.357745422 |
|---|
| max | 0.362313921 |
|---|
| average | 0.35994111 |
|---|
| stddev | 0.0017358819068924011 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
- Key exchange (dh 1024) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
- Key exchange (dh 1024) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
- Key exchange (dh 1024) of lower strength than certificate key
|
|---|
|
|---|
| least strength | D |
|---|
|
|---|
|
|---|
| https://fdroid.metatransapps.com/fdroid/repo | | ip | 49.12.195.92 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp8k0gcu6f
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191210 |
|---|
| duration | 1.1331760883331299 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:13:31 GMT |
|---|
| Server | Apache/2.4.48 (Debian) |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| Content-Security-Policy | base-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content; |
|---|
| Strict-Transport-Security | max-age=15552000 |
|---|
| Last-Modified | Fri, 12 Sep 2025 00:41:19 GMT |
|---|
| ETag | "d3aa-63e8fe98d2964" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 54186 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | fdroid.metatransapps.com |
|---|
| ip | 49.12.195.92 |
|---|
| address | fdroid.metatransapps.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.242551942 |
|---|
| max | 0.244733122 |
|---|
| average | 0.24360229700000002 |
|---|
| stddev | 0.0007821402837630855 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.nordgedanken.dev/repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo | | ConnectionError | HTTPSConnectionPool(host='fdroid.nordgedanken.dev', port=443): Max retries exceeded with url: /repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62a63ad0>: Failed to establish a new connection: [Errno -5] No address associated with hostname')) |
|---|
| starttime | 1768191218 |
|---|
| duration | 0.21735286712646484 |
|---|
| status | 200 |
|---|
| TLS | [Errno -5] No address associated with hostname |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:13:31 GMT |
|---|
| Server | Apache/2.4.48 (Debian) |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| Content-Security-Policy | base-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content; |
|---|
| Strict-Transport-Security | max-age=15552000 |
|---|
| Last-Modified | Fri, 12 Sep 2025 00:41:19 GMT |
|---|
| ETag | "d3aa-63e8fe98d2964" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 54186 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.partidopirata.com.ar/fdroid/repo | | ip | 151.236.30.90 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpgvpf51hl
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191218 |
|---|
| duration | 0.8211829662322998 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.26.1 |
|---|
| Date | Mon, 12 Jan 2026 04:13:38 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 5211 |
|---|
| Last-Modified | Tue, 07 Jun 2022 01:05:55 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "629ea473-145b" |
|---|
| Cache-Control | no-cache |
|---|
| Access-Control-Allow-Origin | *.partidopirata.com.ar |
|---|
| Strict-Transport-Security | max-age=15552000; includeSubDomains; preload |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | fdroid.partidopirata.com.ar |
|---|
| ip | 151.236.30.90 |
|---|
| address | fdroid.partidopirata.com.ar:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.268583303 |
|---|
| max | 0.296283242 |
|---|
| average | 0.27593649319999997 |
|---|
| stddev | 0.009554500588146218 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.pixelfed.net/fdroid/repo | | ip | 165.227.195.166 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpeif_tkqg
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191229 |
|---|
| duration | 0.45848917961120605 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:13:49 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 3920 |
|---|
| Last-Modified | Wed, 03 Sep 2025 11:12:20 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "68b82294-f50" |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | fdroid.pixelfed.net |
|---|
| ip | 165.227.195.166 |
|---|
| address | fdroid.pixelfed.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.178712664 |
|---|
| max | 0.218325933 |
|---|
| average | 0.2055385662 |
|---|
| stddev | 0.013845348468618117 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.rakshazi.me/repo | | ConnectionError | HTTPSConnectionPool(host='fdroid.rakshazi.me', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62a508d0>: Failed to establish a new connection: [Errno -5] No address associated with hostname')) |
|---|
| starttime | 1768191231 |
|---|
| duration | 0.032820940017700195 |
|---|
| status | 200 |
|---|
| TLS | [Errno -5] No address associated with hostname |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:13:49 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 3920 |
|---|
| Last-Modified | Wed, 03 Sep 2025 11:12:20 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "68b82294-f50" |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.rami.io/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='fdroid.rami.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62a6c350>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1768191231 |
|---|
| duration | 0.20047283172607422 |
|---|
| status | 200 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:13:49 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 3920 |
|---|
| Last-Modified | Wed, 03 Sep 2025 11:12:20 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "68b82294-f50" |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.tagesschau.de/repo | | ip | 34.160.251.4 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpp3mv9dtx
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191231 |
|---|
| duration | 0.5272879600524902 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | X-GUploader-UploadID | AJRbA5WMGfDLEtJBGxq-89gxUz8FnKdxDFnFevXxauwEbAifWARSSg1XLwYrC--nJRCPTdJa |
|---|
| x-goog-generation | 1753799322237430 |
|---|
| x-goog-metageneration | 1 |
|---|
| x-goog-stored-content-encoding | identity |
|---|
| x-goog-stored-content-length | 5415 |
|---|
| x-goog-meta-goog-reserved-file-mtime | 1753799290 |
|---|
| x-goog-hash | crc32c=jP+mJA==, md5=bo6TmFtlOnJBvkenJX41AQ== |
|---|
| x-goog-storage-class | STANDARD |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 5415 |
|---|
| Server | UploadServer |
|---|
| Date | Mon, 12 Jan 2026 04:13:51 GMT |
|---|
| Expires | Mon, 12 Jan 2026 05:13:51 GMT |
|---|
| Cache-Control | public, max-age=3600 |
|---|
| Last-Modified | Tue, 29 Jul 2025 14:28:42 GMT |
|---|
| ETag | "6e8e93985b653a7241be47a7257e3501" |
|---|
| Content-Type | application/octet-stream |
|---|
| Age | 1 |
|---|
| Alt-Svc | h3=":443"; ma=2592000,h3-29=":443"; ma=2592000 |
|---|
|
|---|
| tlsping | | host | fdroid.tagesschau.de |
|---|
| ip | 34.160.251.4 |
|---|
| address | fdroid.tagesschau.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.041813969 |
|---|
| max | 0.046421309 |
|---|
| average | 0.044085857 |
|---|
| stddev | 0.0014851445427957516 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | C |
|---|
|
|---|
|
|---|
| https://fdroid.videlibri.de/repo | | ip | 95.143.172.218 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpk45dqp02
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191232 |
|---|
| duration | 0.8281610012054443 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:13:53 GMT |
|---|
| Content-Type | application/x-java-archive |
|---|
| Content-Length | 6633 |
|---|
| Connection | keep-alive |
|---|
| Server | nginx |
|---|
| Last-Modified | Sat, 29 Nov 2025 17:10:00 GMT |
|---|
| ETag | "19e9-644bed0f37273" |
|---|
| Accept-Ranges | bytes |
|---|
| X-Xss-Protection | 1; mode=block |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
|
|---|
| tlsping | | host | fdroid.videlibri.de |
|---|
| ip | 95.143.172.218 |
|---|
| address | fdroid.videlibri.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.399339141 |
|---|
| max | 0.402389281 |
|---|
| average | 0.40092599999999995 |
|---|
| stddev | 0.0010380388746906329 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroidfamily.codeberg.page/repo | | ip | 217.197.84.141 |
|---|
| starttime | 1768191238 |
|---|
| duration | 0.6397860050201416 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Allow | GET, HEAD, OPTIONS |
|---|
| Alt-Svc | h3=":443"; ma=2592000,h3=":443"; ma=2592000 |
|---|
| Cache-Control | public, max-age=600 |
|---|
| Content-Type | text/html; charset=utf-8 |
|---|
| Date | Mon, 12 Jan 2026 04:13:59 GMT |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| Server | git-pages (git-pages), pages-server |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubdomains; preload |
|---|
| Via | 1.1 Caddy |
|---|
| Transfer-Encoding | chunked |
|---|
|
|---|
| tlsping | | host | fdroidfamily.codeberg.page |
|---|
| ip | 217.197.84.141 |
|---|
| address | fdroidfamily.codeberg.page:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.306093709 |
|---|
| max | 0.338102437 |
|---|
| average | 0.319508362 |
|---|
| stddev | 0.013107825058058041 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://freeyourgadget.codeberg.page/fdroid/repo | | ip | 217.197.84.141 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpeshaovu6
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191244 |
|---|
| duration | 0.8880009651184082 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Allow | GET, HEAD, OPTIONS |
|---|
| Alt-Svc | h3=":443"; ma=2592000,h3=":443"; ma=2592000 |
|---|
| Cache-Control | public, max-age=600 |
|---|
| Content-Length | 5636 |
|---|
| Content-Type | application/java-archive |
|---|
| Date | Mon, 12 Jan 2026 04:14:04 GMT |
|---|
| Etag | "bcc8e2dbf85eaac468141c926cc5c70fdf9a4514" |
|---|
| Last-Modified | Sat, 10 Jan 2026 22:03:14 GMT |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| Server | git-pages (git-pages), pages-server |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubdomains; preload |
|---|
| Via | 1.1 Caddy |
|---|
|
|---|
| tlsping | | host | freeyourgadget.codeberg.page |
|---|
| ip | 217.197.84.141 |
|---|
| address | freeyourgadget.codeberg.page:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.316081149 |
|---|
| max | 0.341573358 |
|---|
| average | 0.3287948107 |
|---|
| stddev | 0.008065395638496686 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://github.com/onionshare/onionshare-android-nightly/raw/master/fdroid/repo | | ip | 185.199.108.133 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpifz37k3a
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191249 |
|---|
| duration | 0.5573289394378662 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 3658 |
|---|
| Cache-Control | max-age=300 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Content-Type | application/octet-stream |
|---|
| ETag | W/"625338d4adeafd16c42bfe19d44f2e72c7513ebbd0a32f307c3182fcffdc650c" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-GitHub-Request-Id | 2952:3BDF62:2D509:3B2CD:69647506 |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Mon, 12 Jan 2026 04:14:09 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-iad-kjyo7100135-IAD |
|---|
| X-Cache | MISS |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1768191249.488605,VS0,VE24 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | 33b00a326b32dc1fa8369b1ee35fb170ef91c27c |
|---|
| Expires | Mon, 12 Jan 2026 04:19:09 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | github.com |
|---|
| ip | 140.82.113.4 |
|---|
| address | github.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.172506886 |
|---|
| max | 0.269073953 |
|---|
| average | 0.2402702551 |
|---|
| stddev | 0.029471608001217738 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (ecdh_x25519) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://gitlab.com/fdroid/fdroidclient-nightly/raw/master/fdroid/repo | | ip | 172.65.251.78 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp8rnutab8
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191251 |
|---|
| duration | 0.5156738758087158 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:14:11 GMT |
|---|
| Content-Type | application/octet-stream |
|---|
| Content-Length | 6083 |
|---|
| Connection | keep-alive |
|---|
| Server | cloudflare |
|---|
| CF-Ray | 9bc9d3598b53af98-ATL |
|---|
| CF-Cache-Status | REVALIDATED |
|---|
| Accept-Ranges | bytes |
|---|
| Cache-Control | max-age=60, public, must-revalidate, stale-while-revalidate=60, stale-if-error=300, s-maxage=60 |
|---|
| Content-Disposition | attachment |
|---|
| ETag | "dce237e7b330ec8afce665b73fde1ff1" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| Vary | Accept-Encoding |
|---|
| content-security-policy | base-uri 'self'; child-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ 'self' blob: data: https://embed.figma.com https://www.figma.com https://www.youtube.com; connect-src 'self' https://gitlab.com wss://gitlab.com https://sentry.gitlab.net https://new-sentry.gitlab.net https://customers.gitlab.com https://snowplow.trx.gitlab.net https://sourcegraph.com https://collector.prd-278964.gl-product-analytics.com https://analytics.gitlab.com snowplowprd.trx.gitlab.net; default-src 'self'; font-src 'self'; form-action 'self' https: http:; frame-ancestors 'self'; frame-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ https://embed.figma.com https://www.figma.com https://www.youtube.com; img-src 'self' data: blob: http: https:; manifest-src 'self'; media-src 'self' data: blob: http: https:; object-src 'none'; report-uri https://new-sentry.gitlab.net/api/4/security/?sentry_key=f5573e26de8f4293b285e556c35dfd6e&sentry_environment=gprd; script-src 'strict-dynamic' 'self' 'unsafe-inline' 'unsafe-eval' https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.recaptcha.net/ https://apis.google.com https://*.zuora.com/apps/PublicHostedPageLite.do 'nonce-Knb3cVR1FST9Zf5tyBn1iQ=='; style-src 'self' 'unsafe-inline'; worker-src 'self' https://gitlab.com/assets/ blob: data: |
|---|
| gitlab-lb | haproxy-main-14-lb-gprd |
|---|
| gitlab-sv | web-gke-us-east1-c |
|---|
| nel | {"max_age": 0} |
|---|
| permissions-policy | interest-cohort=() |
|---|
| ratelimit-limit | 500 |
|---|
| ratelimit-name | throttle_unauthenticated_web |
|---|
| ratelimit-observed | 2 |
|---|
| ratelimit-remaining | 498 |
|---|
| ratelimit-reset | 1767021600 |
|---|
| referrer-policy | strict-origin-when-cross-origin |
|---|
| x-content-type-options | nosniff |
|---|
| x-download-options | noopen |
|---|
| x-frame-options | SAMEORIGIN |
|---|
| x-gitlab-meta | {"correlation_id":"9b5a467cb5b2275e-ATL","version":"1"} |
|---|
| x-permitted-cross-domain-policies | none |
|---|
| x-request-id | 9b5a467cb5b2275e-ATL |
|---|
| x-runtime | 0.146755 |
|---|
| x-ua-compatible | IE=edge |
|---|
| x-xss-protection | 1; mode=block |
|---|
| Set-Cookie | __cf_bm=qJZguivMDGMPRayVghN1Pfgk7jJkHriCEt8DoGOtsJE-1768191251-1.0.1.1-ayB3VtI6ccISoVHl62nxk9WdkGMp1gly2sGXnmqll1AFkBHIj8MmfV7pXYrsJBzywiDIjyL8PaLmGCHWMq6Ez6nszSh_bfG97WgPJ_uTmw4; path=/; expires=Mon, 12-Jan-26 04:44:11 GMT; domain=.gitlab.com; HttpOnly; Secure; SameSite=None, _cfuvid=pa3yEu5j7nly8WLqT2aSCA547YVfbA_6AwmMuPIVBSY-1768191251582-0.0.1.1-604800000; path=/; domain=.gitlab.com; HttpOnly; Secure; SameSite=None |
|---|
|
|---|
| tlsping | | host | gitlab.com |
|---|
| ip | 172.65.251.78 |
|---|
| address | gitlab.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.063165417 |
|---|
| max | 0.066630477 |
|---|
| average | 0.064835804 |
|---|
| stddev | 0.0011810317420886706 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://grobox.de/fdroid/repo | | ip | 217.197.86.172 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpvkqram63
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191253 |
|---|
| duration | 0.9805469512939453 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:14:13 GMT |
|---|
| Server | Apache |
|---|
| Upgrade | h2,h2c |
|---|
| Connection | Upgrade, Keep-Alive |
|---|
| Last-Modified | Fri, 12 Dec 2025 12:46:08 GMT |
|---|
| ETag | "2965-645c0a543a8d3" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 10597 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | grobox.de |
|---|
| ip | 217.197.86.172 |
|---|
| address | grobox.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.402349789 |
|---|
| max | 0.661341406 |
|---|
| average | 0.4563737855 |
|---|
| stddev | 0.08497713972333093 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 3072) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - Key exchange (dh 3072) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://guardianproject-wind.s3.amazonaws.com/fdroid/repo | | ip | 16.15.191.36 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpbucsl065
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191265 |
|---|
| duration | 0.5833470821380615 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | x-amz-id-2 | bpVmthgHcsISauicaOa9C6shKEVV9LKwlD2z8V4uCaqVzNRt0JDts98oOIT7beil25dV+UvebFixxZh65DiwthOZP1xE8fgW |
|---|
| x-amz-request-id | J2YM9NDCY5QX2WQH |
|---|
| Date | Mon, 12 Jan 2026 04:14:26 GMT |
|---|
| Last-Modified | Fri, 31 Jan 2025 07:13:53 GMT |
|---|
| ETag | "e3e79c0ad41eb80a8f3bd87727c953d5" |
|---|
| x-amz-server-side-encryption | AES256 |
|---|
| x-amz-meta-s3cmd-attrs | atime:1738307518/ctime:1738307518/gid:1000/gname:geheimnis/md5:e3e79c0ad41eb80a8f3bd87727c953d5/mode:33188/mtime:1738307518/uid:1000/uname:geheimnis |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Type | application/zip |
|---|
| Content-Length | 507773 |
|---|
| Server | AmazonS3 |
|---|
|
|---|
| tlsping | | host | guardianproject-wind.s3.amazonaws.com |
|---|
| ip | 16.15.191.36 |
|---|
| address | guardianproject-wind.s3.amazonaws.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.076682106 |
|---|
| max | 0.079543566 |
|---|
| average | 0.0780841006 |
|---|
| stddev | 0.0010245396641903315 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://guardianproject.info/fdroid/repo | | ip | 204.19.241.151 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp4vubpqw1
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191269 |
|---|
| duration | 0.6109628677368164 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:14:30 GMT |
|---|
| Server | Apache/2.4.59 (Debian) |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| Feature-Policy | ambient-light-sensor 'none'; autoplay 'none'; accelerometer 'none'; camera 'none'; display-capture 'none'; document-domain 'none'; encrypted-media 'none'; fullscreen 'none'; geolocation 'none'; gyroscope 'none'; magnetometer 'none'; microphone 'none'; midi 'none'; payment 'none'; picture-in-picture 'none'; speaker 'none'; sync-xhr 'none'; usb 'none'; wake-lock 'none'; webauthn 'none'; vr 'none'; xr 'none'; |
|---|
| Content-Security-Policy | default-src 'none'; base-uri 'self'; block-all-mixed-content; connect-src 'self'; font-src 'self'; form-action 'self'; frame-ancestors 'self'; img-src 'self' https://*.static.flickr.com https://*.staticflickr.com; media-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| Referrer-Policy | strict-origin |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| X-Xss-Protection | 1; mode=block |
|---|
| Vary | User-Agent |
|---|
| Last-Modified | Sun, 11 Jan 2026 06:50:27 GMT |
|---|
| ETag | "30ae9-648172c75cc9d" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 199401 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | guardianproject.info |
|---|
| ip | 204.19.241.151 |
|---|
| address | guardianproject.info:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.083377777 |
|---|
| max | 0.085721286 |
|---|
| average | 0.0845507884 |
|---|
| stddev | 0.000804149439979063 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://haagch.frickel.club/files/fdroid/repo | | ip | 159.195.50.59 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpmbbqm8q8
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191272 |
|---|
| duration | 0.8797109127044678 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.28.0 |
|---|
| Date | Mon, 12 Jan 2026 04:14:33 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 7603 |
|---|
| Last-Modified | Thu, 06 Jan 2022 03:00:10 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "61d65b3a-1db3" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | haagch.frickel.club |
|---|
| ip | 159.195.50.59 |
|---|
| address | haagch.frickel.club:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.242621975 |
|---|
| max | 0.245205325 |
|---|
| average | 0.243916906 |
|---|
| stddev | 0.000853502679286367 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://jak-linux.org/fdroid/repo | | ip | 195.201.138.240 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpga9n5km7
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191279 |
|---|
| duration | 0.67165207862854 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.24.0 (Ubuntu) |
|---|
| Date | Mon, 12 Jan 2026 04:14:39 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 4052 |
|---|
| Last-Modified | Tue, 23 Mar 2021 17:51:53 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "605a2ab9-fd4" |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| X-Frame-Options | DENY |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | jak-linux.org |
|---|
| ip | 195.201.138.240 |
|---|
| address | jak-linux.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.241046618 |
|---|
| max | 0.243609718 |
|---|
| average | 0.2422682687 |
|---|
| stddev | 0.0008867731986905195 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://jhass.github.io/insporation/fdroid/repo | | ip | 185.199.110.153 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp8z5ybqsh
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191285 |
|---|
| duration | 0.4013960361480713 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 2948 |
|---|
| Server | GitHub.com |
|---|
| Content-Type | application/java-archive |
|---|
| Last-Modified | Thu, 22 Feb 2024 04:10:47 GMT |
|---|
| Access-Control-Allow-Origin | * |
|---|
| ETag | "65d6c947-b84" |
|---|
| expires | Mon, 12 Jan 2026 04:13:45 GMT |
|---|
| Cache-Control | max-age=600 |
|---|
| x-proxy-cache | MISS |
|---|
| X-GitHub-Request-Id | DB1C:1F4BDD:2DFDB4B:33A393E:696472A1 |
|---|
| Accept-Ranges | bytes |
|---|
| Age | 0 |
|---|
| Date | Mon, 12 Jan 2026 04:14:45 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-iad-kjyo7100137-IAD |
|---|
| X-Cache | HIT |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1768191285.131126,VS0,VE14 |
|---|
| Vary | Accept-Encoding |
|---|
| X-Fastly-Request-ID | 691671ccc450e49f836c75f74b41e62c5bf51866 |
|---|
|
|---|
| tlsping | | host | jhass.github.io |
|---|
| ip | 185.199.110.153 |
|---|
| address | jhass.github.io:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.062231587 |
|---|
| max | 0.065776386 |
|---|
| average | 0.06401720270000001 |
|---|
| stddev | 0.001253952022271113 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://julianfairfax.gitlab.io/fdroid-repo/fdroid/repo | | starttime | 1768191286 |
|---|
| duration | 0.45970892906188965 |
|---|
| status | 403 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:14:46 GMT |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | close |
|---|
| accept-ch | Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA |
|---|
| cf-mitigated | challenge |
|---|
| critical-ch | Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA |
|---|
| cross-origin-embedder-policy | require-corp |
|---|
| cross-origin-resource-policy | same-origin |
|---|
| origin-agent-cluster | ?1 |
|---|
| permissions-policy | accelerometer=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=() |
|---|
| referrer-policy | same-origin |
|---|
| server-timing | chlray;desc="9bc9d436ebebbd28" |
|---|
| x-content-type-options | nosniff |
|---|
| x-frame-options | SAMEORIGIN |
|---|
| Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
|---|
| Expires | Thu, 01 Jan 1970 00:00:01 GMT |
|---|
| Report-To | {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dvtIf6UoYNqh2JCQUHKrPlWhxWfaJLf%2FclWy0DWpAuHJZtgmLAIqjNxe5vUr%2FDNiy4pBI8WDztR%2FFw%2BiETNDjQQf0Tgk5tvS7gx7o34YfYTdrOcOIiRsyCGYbH8%3D"}],"group":"cf-nel","max_age":604800} |
|---|
| NEL | {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800} |
|---|
| Vary | Accept-Encoding |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9bc9d436ebebbd28-ATL |
|---|
| Content-Encoding | br |
|---|
|
|---|
| tlsping | | host | julianfairfax.gitlab.io |
|---|
| ip | 35.185.44.232 |
|---|
| address | julianfairfax.gitlab.io:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.038694479 |
|---|
| max | 0.099502917 |
|---|
| average | 0.0725074104 |
|---|
| stddev | 0.0176471769909648 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://kaffeemitkoffein.de/fdroid/repo | | ip | 95.113.179.177 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpizf7e32k
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191287 |
|---|
| duration | 0.9761049747467041 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:14:48 GMT |
|---|
| Server | Apache/2.4.65 (Raspbian) |
|---|
| Last-Modified | Sun, 04 Jan 2026 14:34:12 GMT |
|---|
| ETag | "21d3-64790d60a3b6d" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 8659 |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | kaffeemitkoffein.de |
|---|
| ip | 95.113.179.177 |
|---|
| address | kaffeemitkoffein.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.458016489 |
|---|
| max | 0.6895835 |
|---|
| average | 0.5260092548 |
|---|
| stddev | 0.06679889150588193 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 3072) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 3072) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 3072) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - Key exchange (dh 3072) of lower strength than certificate key
- Key exchange (ecdh_x25519) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://microg.org/fdroid/repo | | ip | 109.230.233.153 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpdox2st30
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191326 |
|---|
| duration | 0.8504009246826172 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Accept-Ranges | bytes |
|---|
| Alt-Svc | h3=":443"; ma=2592000 |
|---|
| Content-Length | 7942 |
|---|
| Content-Type | application/java-archive |
|---|
| Etag | "dex42v9yx1xo64m" |
|---|
| Last-Modified | Sat, 13 Dec 2025 13:09:15 GMT |
|---|
| Server | Caddy |
|---|
| Vary | Accept-Encoding |
|---|
| Date | Mon, 12 Jan 2026 04:15:26 GMT |
|---|
|
|---|
| tlsping | | host | microg.org |
|---|
| ip | 109.230.233.153 |
|---|
| address | microg.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.288843296 |
|---|
| max | 0.308319645 |
|---|
| average | 0.29780527059999995 |
|---|
| stddev | 0.006284009657827804 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mobileapp.bitwarden.com/fdroid/repo | | ip | 151.101.1.91 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpijk5_lt3
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191331 |
|---|
| duration | 0.41776299476623535 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 6274 |
|---|
| Server | GitHub.com |
|---|
| Content-Type | application/java-archive |
|---|
| Last-Modified | Mon, 15 Dec 2025 14:38:04 GMT |
|---|
| Access-Control-Allow-Origin | * |
|---|
| ETag | "69401d4c-1882" |
|---|
| expires | Mon, 12 Jan 2026 03:23:24 GMT |
|---|
| x-proxy-cache | MISS |
|---|
| X-GitHub-Request-Id | 6D76:A92BF:1C2B:207C:696466D3 |
|---|
| Via | 1.1 varnish, 1.1 varnish |
|---|
| X-Fastly-Request-ID | b5fad0a5fa7160ce0e0770783b756c3e5200c664 |
|---|
| Fastly-Debug-States | DELIVER |
|---|
| Cache-Control | public, max-age=0, must-revalidate |
|---|
| Accept-Ranges | bytes |
|---|
| Age | 0 |
|---|
| Date | Mon, 12 Jan 2026 04:15:31 GMT |
|---|
| X-Served-By | cache-iad-kcgs7200116-IAD, cache-iad-kiad7000094-IAD |
|---|
| X-Cache | MISS, HIT |
|---|
| X-Cache-Hits | 0, 0 |
|---|
| X-Timer | S1768191331.347926,VS0,VE14 |
|---|
| Vary | Accept-Encoding |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Service-Version | 31 |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
|
|---|
| tlsping | | host | mobileapp.bitwarden.com |
|---|
| ip | 151.101.1.91 |
|---|
| address | mobileapp.bitwarden.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.060987897 |
|---|
| max | 0.063559547 |
|---|
| average | 0.06227319099999999 |
|---|
| stddev | 0.0008871821745977543 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://molly.im/fdroid/repo | | ip | 185.199.109.153 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp_jenumzv
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191332 |
|---|
| duration | 0.6192550659179688 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 5808 |
|---|
| Server | GitHub.com |
|---|
| Content-Type | application/java-archive |
|---|
| Last-Modified | Sat, 27 Dec 2025 13:09:33 GMT |
|---|
| Access-Control-Allow-Origin | * |
|---|
| ETag | "694fda8d-16b0" |
|---|
| expires | Mon, 12 Jan 2026 04:25:32 GMT |
|---|
| Cache-Control | max-age=600 |
|---|
| x-proxy-cache | MISS |
|---|
| X-GitHub-Request-Id | D876:1168E5:2E3C831:33E8D2A:69647564 |
|---|
| Accept-Ranges | bytes |
|---|
| Age | 0 |
|---|
| Date | Mon, 12 Jan 2026 04:15:32 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-iad-kjyo7100106-IAD |
|---|
| X-Cache | MISS |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1768191333.838245,VS0,VE16 |
|---|
| Vary | Accept-Encoding |
|---|
| X-Fastly-Request-ID | e203a864384fc4a38c73203ec7c202220f086891 |
|---|
|
|---|
| tlsping | | host | molly.im |
|---|
| ip | 185.199.109.153 |
|---|
| address | molly.im:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.061986897 |
|---|
| max | 0.064742177 |
|---|
| average | 0.06336872299999999 |
|---|
| stddev | 0.0008902909470864009 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://nanolx.org/fdroid/repo | | ip | 87.118.120.112 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp0_ichcn6
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191334 |
|---|
| duration | 0.8432350158691406 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:15:34 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 4978 |
|---|
| Last-Modified | Fri, 21 May 2021 19:39:16 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "60a80c64-1372" |
|---|
| Strict-Transport-Security | max-age=15768000; includeSubDomains |
|---|
| X-Powered-By | PleskLin |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | nanolx.org |
|---|
| ip | 87.118.120.112 |
|---|
| address | nanolx.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.250452178 |
|---|
| max | 0.253079767 |
|---|
| average | 0.2517816789 |
|---|
| stddev | 0.0008817027354565072 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://onosendai.herokuapp.com/repo | | ip | 54.165.58.209 |
|---|
| starttime | 1768191342 |
|---|
| duration | 0.1370849609375 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Content-Length | 548 |
|---|
| Cache-Control | no-cache, no-store |
|---|
| Content-Type | text/html; charset=utf-8 |
|---|
| Date | 2026-01-12 04:15:42.353638654 +0000 UTC |
|---|
| Server | heroku-router |
|---|
|
|---|
| tlsping | | host | onosendai.herokuapp.com |
|---|
| ip | 54.165.58.209 |
|---|
| address | onosendai.herokuapp.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.100339855 |
|---|
| max | 0.102000055 |
|---|
| average | 0.101366034 |
|---|
| stddev | 0.0005420521198639482 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://pili.qi0.de/fdroid/repo | | ip | 89.244.198.232 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpv64tcuny
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191344 |
|---|
| duration | 1.2502679824829102 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.28.1 |
|---|
| Date | Mon, 12 Jan 2026 04:15:45 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 24904 |
|---|
| Last-Modified | Tue, 05 Aug 2025 08:01:40 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6891ba64-6148" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | pili.qi0.de |
|---|
| ip | 89.244.198.232 |
|---|
| address | pili.qi0.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.402947352 |
|---|
| max | 0.405873022 |
|---|
| average | 0.404331541 |
|---|
| stddev | 0.0009310493446692373 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://platschi.net/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='platschi.net', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62924690>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1768191358 |
|---|
| duration | 0.03327488899230957 |
|---|
| status | 200 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Server | nginx/1.28.1 |
|---|
| Date | Mon, 12 Jan 2026 04:15:45 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 24904 |
|---|
| Last-Modified | Tue, 05 Aug 2025 08:01:40 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6891ba64-6148" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://raw.githubusercontent.com/2br-2b/Fdroid-repo/master/fdroid/repo | | ip | 185.199.108.133 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpsteqo7tk
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191358 |
|---|
| duration | 0.421734094619751 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 4999 |
|---|
| Cache-Control | max-age=300 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Content-Type | application/octet-stream |
|---|
| ETag | W/"070addb24bc77e917a11a8ee6ea1f3c786744d1cb98cc339fb2c6b24d782c415" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-GitHub-Request-Id | 846F:2816E2:374FE:464B3:6964757A |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Mon, 12 Jan 2026 04:15:58 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-iad-kjyo7100141-IAD |
|---|
| X-Cache | MISS |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1768191359.917893,VS0,VE34 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | 302b85c9abbf964132a393c26940f086b3d92297 |
|---|
| Expires | Mon, 12 Jan 2026 04:20:58 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | raw.githubusercontent.com |
|---|
| ip | 185.199.108.133 |
|---|
| address | raw.githubusercontent.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.063018177 |
|---|
| max | 0.066623207 |
|---|
| average | 0.064870293 |
|---|
| stddev | 0.0012540373248767379 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://raw.githubusercontent.com/MM2-0/fdroid/main/fdroid/repo | | ip | 185.199.108.133 |
|---|
| starttime | 1768191360 |
|---|
| duration | 0.11527705192565918 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 14 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| Content-Type | text/plain; charset=utf-8 |
|---|
| X-GitHub-Request-Id | A975:33B8FA:200D3:2D5CA:6964757F |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Mon, 12 Jan 2026 04:16:00 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-iad-kjyo7100056-IAD |
|---|
| X-Cache | MISS |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1768191360.355458,VS0,VE48 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | 16187f0123aff0eac294dcbe1266e4c936c4aa25 |
|---|
| Expires | Mon, 12 Jan 2026 04:21:00 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | raw.githubusercontent.com |
|---|
| ip | 185.199.111.133 |
|---|
| address | raw.githubusercontent.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.062727317 |
|---|
| max | 0.066789067 |
|---|
| average | 0.064700066 |
|---|
| stddev | 0.0013113681259543392 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://raw.githubusercontent.com/Tobi823/ffupdaterrepo/master/fdroid/repo | | ip | 185.199.109.133 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpe5v8mv1_
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191361 |
|---|
| duration | 0.4302990436553955 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 8579 |
|---|
| Cache-Control | max-age=300 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Content-Type | application/octet-stream |
|---|
| ETag | W/"5ab32ffb61def9d7b2934061c2f42990c676a8d3547333d9097258bbf37ca087" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-GitHub-Request-Id | 7639:33B8FA:2014C:2D66A:69647581 |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Mon, 12 Jan 2026 04:16:01 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-iad-kjyo7100114-IAD |
|---|
| X-Cache | MISS |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1768191362.568613,VS0,VE30 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | 43e83b4a00b11ddaabaeaeae542cbc5dbc5270b6 |
|---|
| Expires | Mon, 12 Jan 2026 04:21:01 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | raw.githubusercontent.com |
|---|
| ip | 185.199.110.133 |
|---|
| address | raw.githubusercontent.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.063664027 |
|---|
| max | 0.067636427 |
|---|
| average | 0.065696117 |
|---|
| stddev | 0.0013440448791688458 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://raw.githubusercontent.com/chrisgch/tca/master/fdroid/repo | | ip | 185.199.108.133 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp9aevx25o
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191362 |
|---|
| duration | 0.3892710208892822 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 12648 |
|---|
| Cache-Control | max-age=300 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Content-Type | application/octet-stream |
|---|
| ETag | W/"532beef6ea36bf714bd587f06d693b07c3aaf9ca72cb812e91b67df4cff4b1b7" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-GitHub-Request-Id | 68D3:8FE18:F9C925:13E5877:696470CA |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Mon, 12 Jan 2026 04:16:02 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-iad-kjyo7100118-IAD |
|---|
| X-Cache | HIT |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1768191363.952932,VS0,VE21 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | 1ef02919e71f8be29006d40dad5e67dfa1b9e62e |
|---|
| Expires | Mon, 12 Jan 2026 04:21:02 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | raw.githubusercontent.com |
|---|
| ip | 185.199.109.133 |
|---|
| address | raw.githubusercontent.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.065954606 |
|---|
| max | 0.069729096 |
|---|
| average | 0.067840787 |
|---|
| stddev | 0.0012737241131222257 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://raw.githubusercontent.com/oxcl/fdroid-repo-tasker/refs/heads/main/direct-purchase/fdroid/repo | | ip | 185.199.108.133 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpv57y0f6u
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191364 |
|---|
| duration | 0.41468000411987305 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 10073 |
|---|
| Cache-Control | max-age=300 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Content-Type | application/octet-stream |
|---|
| ETag | W/"02b55943b27271d31d485f88c25aca8026d9c1f2d60f4a47053949d3d995fd8a" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-GitHub-Request-Id | 747A:22D8FA:1C34A51:238FCCD:69647582 |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Mon, 12 Jan 2026 04:16:04 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-iad-kjyo7100173-IAD |
|---|
| X-Cache | MISS |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1768191364.347369,VS0,VE35 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | ab360675c45d116420b6616f95f1bc041473d16f |
|---|
| Expires | Mon, 12 Jan 2026 04:21:04 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | raw.githubusercontent.com |
|---|
| ip | 185.199.108.133 |
|---|
| address | raw.githubusercontent.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.062703307 |
|---|
| max | 0.066792116 |
|---|
| average | 0.0647055715 |
|---|
| stddev | 0.001361835525067637 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://raw.githubusercontent.com/xarantolus/fdroid/main/fdroid/repo | | ip | 185.199.108.133 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpo6l_wavj
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191365 |
|---|
| duration | 0.43857407569885254 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 7501 |
|---|
| Cache-Control | max-age=300 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Content-Type | application/octet-stream |
|---|
| ETag | W/"d06f156ecb82c0aa36029fad7a2595a36e1861269450b58e53807b6bfb60dc3c" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-GitHub-Request-Id | D9B8:3D972:292FF:368C3:6964756C |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Mon, 12 Jan 2026 04:16:05 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-iad-kjyo7100045-IAD |
|---|
| X-Cache | MISS |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1768191366.735574,VS0,VE49 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | 2ebb3bbf348da92421e198dec41571b3cfcf758b |
|---|
| Expires | Mon, 12 Jan 2026 04:21:05 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | raw.githubusercontent.com |
|---|
| ip | 185.199.108.133 |
|---|
| address | raw.githubusercontent.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.064025137 |
|---|
| max | 0.067690717 |
|---|
| average | 0.065814522 |
|---|
| stddev | 0.001259723219729237 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://releases.nailyk.fr/repo | | ip | 144.76.164.24 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp3g_l1zj1
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191367 |
|---|
| duration | 0.8033580780029297 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:16:07 GMT |
|---|
| Server | Apache |
|---|
| Last-Modified | Mon, 12 Jan 2026 03:40:51 GMT |
|---|
| ETag | "198c-64828a4366899" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 6540 |
|---|
| Content-Type | application/java-archive |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
|
|---|
| tlsping | | host | releases.nailyk.fr |
|---|
| ip | 144.76.164.24 |
|---|
| address | releases.nailyk.fr:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.304826357 |
|---|
| max | 0.384562503 |
|---|
| average | 0.36127544899999997 |
|---|
| stddev | 0.02320977328735136 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://releases.threema.ch/fdroid/repo | | ip | 203.56.112.72 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp9dcrp_71
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191371 |
|---|
| duration | 0.7799999713897705 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:16:12 GMT |
|---|
| Server | Apache |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Last-Modified | Tue, 09 Dec 2025 13:40:21 GMT |
|---|
| ETag | "18e2-645850d9f51a5" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 6370 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/x-java-archive |
|---|
|
|---|
| tlsping | | host | releases.threema.ch |
|---|
| ip | 203.56.112.72 |
|---|
| address | releases.threema.ch:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.435622438 |
|---|
| max | 0.524864433 |
|---|
| average | 0.49302766360000005 |
|---|
| stddev | 0.02652292516365753 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://repo.kuschku.de/repo | | ip | 148.251.132.182 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpgt7qblo6
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191379 |
|---|
| duration | 0.9222478866577148 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:16:19 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 7678 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Wed, 03 Sep 2025 15:16:34 GMT |
|---|
| ETag | "68b85bd2-1dfe" |
|---|
| Accept-Ranges | bytes |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
|---|
|
|---|
| tlsping | | host | repo.kuschku.de |
|---|
| ip | 148.251.132.182 |
|---|
| address | repo.kuschku.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.401407782 |
|---|
| max | 0.403954101 |
|---|
| average | 0.40278181669999996 |
|---|
| stddev | 0.0008312837520499322 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://repo.mobilsicher.de/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='repo.mobilsicher.de', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62937710>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1768191384 |
|---|
| duration | 0.12322998046875 |
|---|
| status | 200 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:16:19 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 7678 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Wed, 03 Sep 2025 15:16:34 GMT |
|---|
| ETag | "68b85bd2-1dfe" |
|---|
| Accept-Ranges | bytes |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://repo.netsyms.com/fdroid/repo | | ip | 172.67.148.121 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp_vyqve5_
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191385 |
|---|
| duration | 0.4770669937133789 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:16:25 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11099 |
|---|
| Connection | keep-alive |
|---|
| Server | cloudflare |
|---|
| Vary | User-Agent, accept-encoding |
|---|
| cf-cache-status | HIT |
|---|
| Report-To | {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=qTM0kYb6wX7VqpsAaQUFMIu5s9HPLbGc3vI1J1h%2Bar%2B%2B7zcuJGgP7h4GI5gRBbI5y4%2Bg0tLIwp%2BJhrU7GNAsh%2Fk06YeNVi9iKLFmbgvGzdg%3D"}]} |
|---|
| Last-Modified | Sat, 18 Nov 2023 06:40:11 GMT |
|---|
| etag | "2b5b-60a67864e3f1c" |
|---|
| Accept-Ranges | bytes |
|---|
| Nel | {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800} |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Age | 1029 |
|---|
| Cache-Control | max-age=14400 |
|---|
| CF-RAY | 9bc9d69e6a310f57-ATL |
|---|
| alt-svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | | host | repo.netsyms.com |
|---|
| ip | 172.67.148.121 |
|---|
| address | repo.netsyms.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.151778144 |
|---|
| max | 0.211198662 |
|---|
| average | 0.18955873500000003 |
|---|
| stddev | 0.020181696752348512 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo | | starttime | 1768191386 |
|---|
| duration | 0.3162569999694824 |
|---|
| status | 403 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:16:27 GMT |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | close |
|---|
| accept-ch | Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA |
|---|
| cf-mitigated | challenge |
|---|
| critical-ch | Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA |
|---|
| cross-origin-embedder-policy | require-corp |
|---|
| cross-origin-resource-policy | same-origin |
|---|
| origin-agent-cluster | ?1 |
|---|
| permissions-policy | accelerometer=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=() |
|---|
| referrer-policy | same-origin |
|---|
| server-timing | chlray;desc="9bc9d6a97df09320" |
|---|
| x-content-type-options | nosniff |
|---|
| x-frame-options | SAMEORIGIN |
|---|
| Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
|---|
| Expires | Thu, 01 Jan 1970 00:00:01 GMT |
|---|
| Report-To | {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QVbUu19rNG1Arupe0Q6%2F2wwgn0hEa9E8MMI%2B9Mv0EaWSBq6jcQguV6KDrNSGme2OHkKtf49N1TalPmDiN220aGNqL7McI5NGmyjGCy2Zo%2Bws6%2BFmaK5p43tz9FU%3D"}],"group":"cf-nel","max_age":604800} |
|---|
| NEL | {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800} |
|---|
| Vary | Accept-Encoding |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9bc9d6a97df09320-ATL |
|---|
| Content-Encoding | br |
|---|
|
|---|
| tlsping | | host | rfc2822.gitlab.io |
|---|
| ip | 35.185.44.232 |
|---|
| address | rfc2822.gitlab.io:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.042234139 |
|---|
| max | 0.048873078 |
|---|
| average | 0.0449371897 |
|---|
| stddev | 0.0018876981673407994 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://s2.spiritcroc.de/fdroid/repo | | ip | 23.88.107.207 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp1jhjamp3
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191387 |
|---|
| duration | 0.9066481590270996 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:16:28 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11350 |
|---|
| Last-Modified | Mon, 22 Dec 2025 11:07:53 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69492689-2c56" |
|---|
| Strict-Transport-Security | max-age=15768000; includeSubDomains; preload |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | s2.spiritcroc.de |
|---|
| ip | 23.88.107.207 |
|---|
| address | s2.spiritcroc.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.361482436 |
|---|
| max | 0.367460136 |
|---|
| average | 0.364525481 |
|---|
| stddev | 0.00205812516912966 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - Key exchange (ecdh_x25519) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://s3.amazonaws.com/storymaker/fdroid/repo | | ip | 16.182.40.160 |
|---|
| starttime | 1768191394 |
|---|
| duration | 0.10952186584472656 |
|---|
| status | 403 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | x-amz-request-id | 0SB43RERCZMBDNW6 |
|---|
| x-amz-id-2 | H5tBXFbkQMq8w8PXUekUrOUdvjjWHWoczDPBi4KHP2GoBIF5VoXHcser7nTJskfwRLo2GXU7V3A= |
|---|
| Content-Type | application/xml |
|---|
| Transfer-Encoding | chunked |
|---|
| Date | Mon, 12 Jan 2026 04:16:34 GMT |
|---|
| Server | AmazonS3 |
|---|
|
|---|
| tlsping | | host | s3.amazonaws.com |
|---|
| ip | 54.231.140.96 |
|---|
| address | s3.amazonaws.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.074708177 |
|---|
| max | 0.077433257 |
|---|
| average | 0.07594888999999999 |
|---|
| stddev | 0.000931271755386688 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://secfirst.org/fdroid/repo | | SSLError | HTTPSConnectionPool(host='secfirst.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)'))) |
|---|
| starttime | 1768191396 |
|---|
| duration | 0.33318591117858887 |
|---|
| status | 403 |
|---|
| TLS | [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992) |
|---|
| headers | | x-amz-request-id | 0SB43RERCZMBDNW6 |
|---|
| x-amz-id-2 | H5tBXFbkQMq8w8PXUekUrOUdvjjWHWoczDPBi4KHP2GoBIF5VoXHcser7nTJskfwRLo2GXU7V3A= |
|---|
| Content-Type | application/xml |
|---|
| Transfer-Encoding | chunked |
|---|
| Date | Mon, 12 Jan 2026 04:16:34 GMT |
|---|
| Server | AmazonS3 |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://static.cryptomator.org/android/fdroid/repo | | ip | 172.67.132.219 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp8fr5t2sh
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191409 |
|---|
| duration | 0.9259629249572754 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:16:49 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 6188 |
|---|
| Connection | keep-alive |
|---|
| Accept-Ranges | bytes |
|---|
| etag | "342f5a8ebdf8a77587b0b8f9095c2075" |
|---|
| last-modified | Mon, 06 Oct 2025 16:58:07 GMT |
|---|
| x-amz-id-2 | txg6d5788059d194842a650-00696475b1 |
|---|
| x-amz-request-id | txg6d5788059d194842a650-00696475b1 |
|---|
| Cache-Control | max-age=28800 |
|---|
| cf-cache-status | MISS |
|---|
| Nel | {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800} |
|---|
| Vary | accept-encoding |
|---|
| Report-To | {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=f5YD9%2FUEpRLXCXsHieJsyaIdi7hQQ0KXzZ8GAWGEGBgTeende%2FsleD5bM6C%2Fb1et2pgBEjvFR8%2B3tAfEChN6N8I6vakFDl53NzKuGG%2BJlk2sIwrPGFk%3D"}]} |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9bc9d732df2b57b4-ATL |
|---|
| alt-svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | | host | static.cryptomator.org |
|---|
| ip | 172.67.132.219 |
|---|
| address | static.cryptomator.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.165695004 |
|---|
| max | 0.214563252 |
|---|
| average | 0.1967373885 |
|---|
| stddev | 0.015957200019650078 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://store.nethunter.com/repo | | ip | 45.33.83.228 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpdykni_xv
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191411 |
|---|
| duration | 0.5198688507080078 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Server | nginx |
|---|
| Date | Mon, 12 Jan 2026 04:16:51 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 45628 |
|---|
| Last-Modified | Thu, 08 Jan 2026 12:23:24 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "695fa1bc-b23c" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | store.nethunter.com |
|---|
| ip | 45.33.83.228 |
|---|
| address | store.nethunter.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.144738894 |
|---|
| max | 0.167524654 |
|---|
| average | 0.1529096933 |
|---|
| stddev | 0.008065386079291912 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://submarine.strangled.net/fdroid/repo | | ip | 178.68.58.166 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpgwpy8omv
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191412 |
|---|
| duration | 0.8086509704589844 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:16:53 GMT |
|---|
| Server | Apache/2.4.29 (Ubuntu) |
|---|
| Last-Modified | Sun, 01 Dec 2024 22:35:25 GMT |
|---|
| ETag | "1087-6283d0c58d7a9" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 4231 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | submarine.strangled.net |
|---|
| ip | 178.68.58.166 |
|---|
| address | submarine.strangled.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.325137677 |
|---|
| max | 0.475193622 |
|---|
| average | 0.3411909045 |
|---|
| stddev | 0.04467394975556376 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://www.anonymousmessenger.ly/fdroid/repo | | ip | 185.176.41.167 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpdwaqig99
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191430 |
|---|
| duration | 0.8733260631561279 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.27.0 |
|---|
| Date | Mon, 12 Jan 2026 04:17:11 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 5581 |
|---|
| Last-Modified | Thu, 21 Jul 2022 14:06:02 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "62d95d4a-15cd" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | www.anonymousmessenger.ly |
|---|
| ip | 185.176.41.167 |
|---|
| address | www.anonymousmessenger.ly:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.350746671 |
|---|
| max | 0.361541431 |
|---|
| average | 0.35522147800000003 |
|---|
| stddev | 0.004271853890579711 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://www.collaboraoffice.com/downloads/fdroid/repo | | ip | 157.90.115.48 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpztmbou7o
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191440 |
|---|
| duration | 0.7181241512298584 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:17:21 GMT |
|---|
| Server | Apache/2.4.65 (Debian) |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubdomains; preload |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| Last-Modified | Sun, 11 Jan 2026 02:30:47 GMT |
|---|
| ETag | "118e-648138bd17945" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 4494 |
|---|
| x-robots-tag | noindex |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | www.collaboraoffice.com |
|---|
| ip | 157.90.115.48 |
|---|
| address | www.collaboraoffice.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.267400629 |
|---|
| max | 0.270566779 |
|---|
| average | 0.268912836 |
|---|
| stddev | 0.0010961479322158052 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://www.cromite.org/fdroid/repo | | ip | 89.46.108.70 |
|---|
| starttime | 1768191445 |
|---|
| duration | 5.668020963668823 |
|---|
| status | 502 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | aruba-proxy |
|---|
| Date | Mon, 12 Jan 2026 04:17:31 GMT |
|---|
| Content-Type | text/html |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | keep-alive |
|---|
| ETag | W/"69414629-1bf25" |
|---|
| Alt-Svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | | host | www.cromite.org |
|---|
| ip | 89.46.108.70 |
|---|
| address | www.cromite.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.27166506 |
|---|
| max | 0.27496156 |
|---|
| average | 0.273329212 |
|---|
| stddev | 0.0010847307951634816 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://www.droidware.info/fdroid/repo | | ip | 104.18.27.114 |
|---|
| starttime | 1768191456 |
|---|
| duration | 0.32492709159851074 |
|---|
| status | 403 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:17:36 GMT |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | keep-alive |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Referrer-Policy | same-origin |
|---|
| Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
|---|
| Expires | Thu, 01 Jan 1970 00:00:01 GMT |
|---|
| Vary | Accept-Encoding |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9bc9d85b5dc0bd11-ATL |
|---|
| Content-Encoding | gzip |
|---|
|
|---|
| tlsping | | host | www.droidware.info |
|---|
| ip | 104.21.89.103 |
|---|
| address | www.droidware.info:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.146953124 |
|---|
| max | 0.210922332 |
|---|
| average | 0.1832816392 |
|---|
| stddev | 0.01997063474762759 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://www.ma-nic.de/fdroid/repo | | ip | 109.250.136.203 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp5r21t30n
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1768191457 |
|---|
| duration | 0.7402000427246094 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Mon, 12 Jan 2026 04:17:37 GMT |
|---|
| Server | Apache/2.4.65 (Debian) |
|---|
| Last-Modified | Tue, 06 Jun 2023 16:06:08 GMT |
|---|
| ETag | "1094-5fd7832786fe5" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 4244 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | www.ma-nic.de |
|---|
| ip | 109.250.136.203 |
|---|
| address | www.ma-nic.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.311253579 |
|---|
| max | 0.484999894 |
|---|
| average | 0.38119078500000003 |
|---|
| stddev | 0.0603599572044753 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|