| https://f-droid.org/repo | | ip | 37.218.247.73 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp7uf_6gy9
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437532 |
|---|
| duration | 2.1712629795074463 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.22.1 |
|---|
| Date | Sat, 07 Feb 2026 04:12:12 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11447991 |
|---|
| Connection | keep-alive |
|---|
| Strict-Transport-Security | max-age=63072000 |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| ETag | "aeaeb7-64a2f999c9911" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | f-droid.org |
|---|
| ip | 37.218.247.73 |
|---|
| address | f-droid.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.229989675 |
|---|
| max | 0.232631675 |
|---|
| average | 0.2313458883 |
|---|
| stddev | 0.0009101382817986568 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.tetaneutral.net/fdroid/repo | | ip | 91.224.148.45 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp4fhrdcmv
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437197 |
|---|
| duration | 2.536267042160034 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.22.1 |
|---|
| Date | Sat, 07 Feb 2026 04:06:37 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11447991 |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69866ff1-aeaeb7" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | fdroid.tetaneutral.net |
|---|
| ip | 91.224.148.45 |
|---|
| address | fdroid.tetaneutral.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.236265335 |
|---|
| max | 0.238967726 |
|---|
| average | 0.23753927559999996 |
|---|
| stddev | 0.0008773879172729946 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://ftp.agdsn.de/fdroid/repo | | ip | 141.30.235.39 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpp97q_v2l
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770436991 |
|---|
| duration | 2.664047956466675 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.26.3 |
|---|
| Date | Sat, 07 Feb 2026 04:03:11 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11447991 |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69866ff1-aeaeb7" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | ftp.agdsn.de |
|---|
| ip | 141.30.235.39 |
|---|
| address | ftp.agdsn.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.256342961 |
|---|
| max | 0.258928782 |
|---|
| average | 0.25760569959999996 |
|---|
| stddev | 0.0008653095877850032 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://ftp.fau.de/fdroid/repo | | ip | 131.188.12.211 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp2s5aspn4
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437226 |
|---|
| duration | 2.4953229427337646 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:07:06 GMT |
|---|
| Server | Apache/2.4.58 (Ubuntu) |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| ETag | "aeaeb7-64a2f99971e40" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 11447991 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | ftp.fau.de |
|---|
| ip | 131.188.12.211 |
|---|
| address | ftp.fau.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.452832371 |
|---|
| max | 0.565279641 |
|---|
| average | 0.52401523 |
|---|
| stddev | 0.04485075299224695 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://ftp.gwdg.de/pub/android/fdroid/repo | | ip | 134.76.12.6 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmphrppld4h
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437007 |
|---|
| duration | 3.079746961593628 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:03:28 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11447991 |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69866ff1-aeaeb7" |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | ftp.gwdg.de |
|---|
| ip | 134.76.12.6 |
|---|
| address | ftp.gwdg.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.392167362 |
|---|
| max | 0.431090267 |
|---|
| average | 0.4116431065 |
|---|
| stddev | 0.012382840303197315 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | indeterminate |
|---|
| cipher preference error | Too few ciphers supported |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | indeterminate |
|---|
| cipher preference error | Too few ciphers supported |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://ftp.lysator.liu.se/pub/fdroid/repo | | ip | 130.236.254.251 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpd8lps06g
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437016 |
|---|
| duration | 2.779270887374878 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | server | nginx |
|---|
| date | Sat, 07 Feb 2026 04:03:37 GMT |
|---|
| content-type | application/java-archive |
|---|
| content-length | 11447991 |
|---|
| last-modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| etag | "69866ff1-aeaeb7" |
|---|
| accept-ranges | bytes |
|---|
|
|---|
| tlsping | | host | ftp.lysator.liu.se |
|---|
| ip | 130.236.254.251 |
|---|
| address | ftp.lysator.liu.se:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.26142925 |
|---|
| max | 0.26376793 |
|---|
| average | 0.2626540245 |
|---|
| stddev | 0.0007987109037556975 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.cyberbits.eu/fdroid/repo | | ip | 51.159.104.35 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp7z_v9nw1
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437214 |
|---|
| duration | 2.2695729732513428 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Accept-Ranges | bytes |
|---|
| Alt-Svc | h3=":443"; ma=2592000 |
|---|
| Content-Length | 11447991 |
|---|
| Content-Type | application/java-archive |
|---|
| Etag | "dg88uz612tc06tdbr" |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| Server | Caddy |
|---|
| Vary | Accept-Encoding |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | DENY |
|---|
| Date | Sat, 07 Feb 2026 04:06:54 GMT |
|---|
|
|---|
| tlsping | | host | mirror.cyberbits.eu |
|---|
| ip | 51.159.104.35 |
|---|
| address | mirror.cyberbits.eu:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.270154987 |
|---|
| max | 0.302771406 |
|---|
| average | 0.2895902347 |
|---|
| stddev | 0.013553997502618096 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.eu.ossplanet.net/fdroid/repo | | ip | 65.21.121.21 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpcncibnqq
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437037 |
|---|
| duration | 2.420442819595337 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.24.0 (Ubuntu) |
|---|
| Date | Sat, 07 Feb 2026 04:03:57 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11447991 |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69866ff1-aeaeb7" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | mirror.eu.ossplanet.net |
|---|
| ip | 65.21.121.21 |
|---|
| address | mirror.eu.ossplanet.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.307248228 |
|---|
| max | 0.343040989 |
|---|
| average | 0.3300374532 |
|---|
| stddev | 0.012292559967464258 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.fcix.net/fdroid/repo | | ip | 23.152.160.16 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpbjbfoynd
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437044 |
|---|
| duration | 1.8790950775146484 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.18.0 |
|---|
| Date | Sat, 07 Feb 2026 04:04:04 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11447991 |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69866ff1-aeaeb7" |
|---|
| Expires | Sat, 07 Feb 2026 04:09:04 GMT |
|---|
| Cache-Control | max-age=300 |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | mirror.fcix.net |
|---|
| ip | 23.152.160.16 |
|---|
| address | mirror.fcix.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.171785844 |
|---|
| max | 0.174322614 |
|---|
| average | 0.173025319 |
|---|
| stddev | 0.0008648788326031566 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.kumi.systems/fdroid/repo | | ip | 86.106.182.45 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpfvwywwg7
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437048 |
|---|
| duration | 3.4429919719696045 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Accept-Ranges | bytes |
|---|
| Alt-Svc | h3=":443"; ma=2592000 |
|---|
| Content-Length | 11447991 |
|---|
| Content-Type | application/java-archive |
|---|
| Etag | "dg88uz612tc06tdbr" |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| Server | Caddy |
|---|
| Vary | Accept-Encoding |
|---|
| Date | Sat, 07 Feb 2026 04:04:09 GMT |
|---|
|
|---|
| tlsping | | host | mirror.kumi.systems |
|---|
| ip | 86.106.182.45 |
|---|
| address | mirror.kumi.systems:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.360572863 |
|---|
| max | 0.391568183 |
|---|
| average | 0.37666461100000004 |
|---|
| stddev | 0.010705217237221103 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.level66.network/fdroid/repo | | ip | 141.98.136.67 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpwt7kc68k
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437057 |
|---|
| duration | 2.7935709953308105 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:04:18 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11447991 |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69866ff1-aeaeb7" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | mirror.level66.network |
|---|
| ip | 141.98.136.67 |
|---|
| address | mirror.level66.network:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.232208162 |
|---|
| max | 0.234575662 |
|---|
| average | 0.233353278 |
|---|
| stddev | 0.0007976627870121576 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.ossplanet.net/fdroid/repo | | ip | 163.22.17.70 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp_yqg52ky
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437068 |
|---|
| duration | 24.150791883468628 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.18.0 (Ubuntu) |
|---|
| Date | Sat, 07 Feb 2026 04:04:48 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11447991 |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69866ff1-aeaeb7" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirrors.dotsrc.org/fdroid/repo | | ip | 130.225.254.116 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpi81ihxr4
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437135 |
|---|
| duration | 2.746289014816284 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.28.0 |
|---|
| Date | Sat, 07 Feb 2026 04:05:36 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11447081 |
|---|
| Last-Modified | Fri, 06 Feb 2026 07:39:21 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69859aa9-aeab29" |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Referrer-Policy | strict-origin |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | mirrors.dotsrc.org |
|---|
| ip | 130.225.254.116 |
|---|
| address | mirrors.dotsrc.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.276339719 |
|---|
| max | 0.278794199 |
|---|
| average | 0.27758331 |
|---|
| stddev | 0.0008169642803017838 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://opencolo.mm.fcix.net/fdroid/repo | | ip | 50.117.120.66 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp1h_kbe6n
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437151 |
|---|
| duration | 2.472989082336426 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.20.1 |
|---|
| Date | Sat, 07 Feb 2026 04:05:51 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11447991 |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69866ff1-aeaeb7" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | opencolo.mm.fcix.net |
|---|
| ip | 50.117.120.66 |
|---|
| address | opencolo.mm.fcix.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.202909356 |
|---|
| max | 0.244198856 |
|---|
| average | 0.225936638 |
|---|
| stddev | 0.015191023053071046 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_CCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://plug-mirror.rcac.purdue.edu/fdroid/repo | | ip | 128.211.151.251 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpz8eg906x
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437247 |
|---|
| duration | 1.3552849292755127 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:07:28 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11447991 |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69866ff1-aeaeb7" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | plug-mirror.rcac.purdue.edu |
|---|
| ip | 128.211.151.251 |
|---|
| address | plug-mirror.rcac.purdue.edu:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.14570424 |
|---|
| max | 0.16886598 |
|---|
| average | 0.15839882200000002 |
|---|
| stddev | 0.0093836907206054 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.init7.net/fdroid/repo | | ip | 109.202.202.202 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp9fvmj34u
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437159 |
|---|
| duration | 2.351979970932007 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.26.3 |
|---|
| Date | Sat, 07 Feb 2026 04:06:00 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11447991 |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69866ff1-aeaeb7" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | mirror.init7.net |
|---|
| ip | 109.202.202.202 |
|---|
| address | mirror.init7.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.249157559 |
|---|
| max | 0.251790478 |
|---|
| average | 0.2505281043 |
|---|
| stddev | 0.0008577306227590377 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.freedif.org/fdroid/repo | | ip | 132.147.107.5 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpait66k7k
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437184 |
|---|
| duration | 3.9753551483154297 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:06:25 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11447081 |
|---|
| Last-Modified | Fri, 06 Feb 2026 07:39:21 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69859aa9-aeab29" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | mirror.freedif.org |
|---|
| ip | 132.147.107.5 |
|---|
| address | mirror.freedif.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.53259061 |
|---|
| max | 0.5482658 |
|---|
| average | 0.5385088530000001 |
|---|
| stddev | 0.005857314921892197 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://bubu1.eu/fdroid/repo | | ip | 176.9.145.28 |
|---|
| starttime | 1770437220 |
|---|
| duration | 0.575275182723999 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.29.3 |
|---|
| Date | Sat, 07 Feb 2026 04:07:01 GMT |
|---|
| Content-Type | text/html; charset=utf-8 |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | keep-alive |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
|---|
| Referrer-Policy | strict-origin |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| Content-Encoding | gzip |
|---|
|
|---|
| tlsping | | host | bubu1.eu |
|---|
| ip | 176.9.145.28 |
|---|
| address | bubu1.eu:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.255391842 |
|---|
| max | 0.258599712 |
|---|
| average | 0.25701977400000003 |
|---|
| stddev | 0.0011170389801148342 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.swedneck.xyz/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='fdroid.swedneck.xyz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e919040d0>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1770437225 |
|---|
| duration | 0.14916396141052246 |
|---|
| status | 404 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Server | nginx/1.29.3 |
|---|
| Date | Sat, 07 Feb 2026 04:07:01 GMT |
|---|
| Content-Type | text/html; charset=utf-8 |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | keep-alive |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
|---|
| Referrer-Policy | strict-origin |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| Content-Encoding | gzip |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.jarsilio.com/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='mirror.jarsilio.com', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e91907110>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1770437235 |
|---|
| duration | 0.13779091835021973 |
|---|
| status | 200 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:07:06 GMT |
|---|
| Server | Apache/2.4.58 (Ubuntu) |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:49:21 GMT |
|---|
| ETag | "aeaeb7-64a2f99971e40" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 11447991 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://ftp.osuosl.org/pub/fdroid/repo | | ip | 64.50.236.52 |
|---|
| starttime | 1770437236 |
|---|
| duration | 0.1723940372467041 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:07:16 GMT |
|---|
| Server | Apache |
|---|
| Content-Length | 261 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | text/html; charset=iso-8859-1 |
|---|
|
|---|
| tlsping | | host | ftp.osuosl.org |
|---|
| ip | 64.50.236.52 |
|---|
| address | ftp.osuosl.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.119335038 |
|---|
| max | 0.124087648 |
|---|
| average | 0.12173882600000001 |
|---|
| stddev | 0.001632951529175314 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mirror.scd31.com/fdroid/repo | | ip | 205.209.125.10 |
|---|
| starttime | 1770437239 |
|---|
| duration | 0.1581881046295166 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Server | nginx/1.22.1 |
|---|
| Date | Sat, 07 Feb 2026 04:07:19 GMT |
|---|
| Content-Type | text/html |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | keep-alive |
|---|
| Content-Encoding | gzip |
|---|
|
|---|
| tlsping | | host | mirror.scd31.com |
|---|
| ip | 205.209.125.10 |
|---|
| address | mirror.scd31.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.092499381 |
|---|
| max | 0.101136781 |
|---|
| average | 0.09683041880000001 |
|---|
| stddev | 0.0037306040913735864 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.fi-do.io/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='fdroid.fi-do.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e91905b10>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1770437247 |
|---|
| duration | 0.16840410232543945 |
|---|
| status | 404 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Server | nginx/1.22.1 |
|---|
| Date | Sat, 07 Feb 2026 04:07:19 GMT |
|---|
| Content-Type | text/html |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | keep-alive |
|---|
| Content-Encoding | gzip |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://android.izzysoft.de/repo | | ip | 144.76.109.58 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp7k7pqk72
jarsigner: java.util.zip.ZipException: zip END header not found
|
|---|
| starttime | 1770437250 |
|---|
| duration | 0.8408839702606201 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:07:31 GMT |
|---|
| Server | Apache |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| Content-Security-Policy | base-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self'; |
|---|
| Strict-Transport-Security | max-age=15552000; includeSubDomains |
|---|
| Cache-Control | max-age=2592000 |
|---|
| Expires | Mon, 09 Mar 2026 04:07:31 GMT |
|---|
| Vary | Accept-Encoding |
|---|
| Content-Encoding | gzip |
|---|
| Content-Length | 1964 |
|---|
| Keep-Alive | timeout=3, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
|
|---|
| tlsping | | host | android.izzysoft.de |
|---|
| ip | 144.76.109.58 |
|---|
| address | android.izzysoft.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.2438475 |
|---|
| max | 0.246300111 |
|---|
| average | 0.24504828559999997 |
|---|
| stddev | 0.0008067719598952636 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://anonymousmessenger.ly/fdroid/repo | | ip | 185.176.41.167 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpyzomqhxy
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437255 |
|---|
| duration | 1.271122932434082 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.27.0 |
|---|
| Date | Sat, 07 Feb 2026 04:07:36 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 5581 |
|---|
| Last-Modified | Thu, 21 Jul 2022 14:06:02 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "62d95d4a-15cd" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | anonymousmessenger.ly |
|---|
| ip | 185.176.41.167 |
|---|
| address | anonymousmessenger.ly:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.328221151 |
|---|
| max | 0.361219831 |
|---|
| average | 0.349156428 |
|---|
| stddev | 0.009754403453444043 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://app.futo.org/fdroid/repo | | ip | 159.65.228.96 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpq4nniz3v
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437265 |
|---|
| duration | 0.4894571304321289 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.22.1 |
|---|
| Date | Sat, 07 Feb 2026 04:07:45 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 4750 |
|---|
| Last-Modified | Wed, 04 Feb 2026 20:09:29 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6983a779-128e" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | app.futo.org |
|---|
| ip | 159.65.228.96 |
|---|
| address | app.futo.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.112555879 |
|---|
| max | 0.159103978 |
|---|
| average | 0.13661986750000002 |
|---|
| stddev | 0.01609833144413844 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://app.usb0.net/repo | | ip | 172.67.154.154 |
|---|
| starttime | 1770437268 |
|---|
| duration | 0.2673218250274658 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:07:48 GMT |
|---|
| Content-Type | text/html |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | keep-alive |
|---|
| Server | cloudflare |
|---|
| Cache-Control | max-age=14400 |
|---|
| cf-cache-status | EXPIRED |
|---|
| Nel | {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800} |
|---|
| Report-To | {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=kxvyCY1pk34EOxzrvlzz4pxzKKqUfbEc0oCwz%2B8HvS5VfQAcnyFSm0fgzo0OYoS0wbfIyqFdYVNSj5vMnN6tNLkZsL%2F5uqxHSJWHQA%3D%3D"}]} |
|---|
| Content-Encoding | br |
|---|
| CF-RAY | 9ca005c008143881-ATL |
|---|
| alt-svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | | host | app.usb0.net |
|---|
| ip | 172.67.154.154 |
|---|
| address | app.usb0.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.151379249 |
|---|
| max | 0.206023708 |
|---|
| average | 0.1784787925 |
|---|
| stddev | 0.018928086531568276 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://apt.izzysoft.de/fdroid/repo | | ip | 144.76.109.58 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp18va2avk
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437269 |
|---|
| duration | 1.7865960597991943 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:07:50 GMT |
|---|
| Server | Apache |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| Content-Security-Policy | base-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self'; |
|---|
| Strict-Transport-Security | max-age=15552000; includeSubDomains |
|---|
| Last-Modified | Fri, 06 Feb 2026 18:58:20 GMT |
|---|
| ETag | "30ec57-64a2c5f6dc57a" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 3206231 |
|---|
| Cache-Control | max-age=86400 |
|---|
| Expires | Sun, 08 Feb 2026 04:07:50 GMT |
|---|
| Keep-Alive | timeout=3, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | apt.izzysoft.de |
|---|
| ip | 144.76.109.58 |
|---|
| address | apt.izzysoft.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.243522279 |
|---|
| max | 0.246038919 |
|---|
| average | 0.24464508100000004 |
|---|
| stddev | 0.0008311192052744269 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://archive.newpipe.net/fdroid/repo | | ip | 159.69.138.33 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp8930il34
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437275 |
|---|
| duration | 0.7891290187835693 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:07:56 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 24433 |
|---|
| Last-Modified | Thu, 05 Feb 2026 22:34:30 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69851af6-5f71" |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| Referrer-Policy | strict-origin |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| Content-Security-Policy | default-src 'self'; object-src 'none'; block-all-mixed-content |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | archive.newpipe.net |
|---|
| ip | 159.69.138.33 |
|---|
| address | archive.newpipe.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.245362651 |
|---|
| max | 0.248018221 |
|---|
| average | 0.24662102800000002 |
|---|
| stddev | 0.0008227674395605393 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://brave-browser-apk-nightly.s3.brave.com/fdroid/repo | | ip | 3.166.160.76 |
|---|
| VerificationException | The repository's fingerprint does not match. |
|---|
| starttime | 1770437298 |
|---|
| duration | 1.0940649509429932 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Content-Type | application/java-archive |
|---|
| Content-Length | 147262 |
|---|
| Connection | keep-alive |
|---|
| Date | Sat, 07 Feb 2026 04:08:19 GMT |
|---|
| Last-Modified | Thu, 05 Feb 2026 14:47:56 GMT |
|---|
| ETag | "a06f4ac41bccd0b9a1380472e59de942" |
|---|
| x-amz-server-side-encryption | AES256 |
|---|
| x-amz-version-id | 4TiYYCQtLqeLuhIZIuA6ngnmWP1uXZ4z |
|---|
| Accept-Ranges | bytes |
|---|
| Server | AmazonS3 |
|---|
| X-Cache | Miss from cloudfront |
|---|
| Via | 1.1 1b18517cf1d6db052e5c43a787c0c5a8.cloudfront.net (CloudFront) |
|---|
| X-Amz-Cf-Pop | MIA50-P3 |
|---|
| Alt-Svc | h3=":443"; ma=86400 |
|---|
| X-Amz-Cf-Id | xGQDV8r49VdIO2butT9K0kt0qr6iaQEVNVUh83tpZk9L-ytOV0R3SQ== |
|---|
|
|---|
| tlsping | | host | brave-browser-apk-nightly.s3.brave.com |
|---|
| ip | 3.166.160.76 |
|---|
| address | brave-browser-apk-nightly.s3.brave.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.063391249 |
|---|
| max | 0.065898719 |
|---|
| average | 0.06467192499999999 |
|---|
| stddev | 0.0008677874198350651 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://brave-browser-apk-release.s3.brave.com/fdroid/repo | | ip | 54.230.79.11 |
|---|
| VerificationException | The repository's fingerprint does not match. |
|---|
| starttime | 1770437300 |
|---|
| duration | 0.9557688236236572 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Content-Type | application/java-archive |
|---|
| Content-Length | 41674 |
|---|
| Connection | keep-alive |
|---|
| Date | Sat, 07 Feb 2026 04:08:22 GMT |
|---|
| Last-Modified | Thu, 05 Feb 2026 23:22:57 GMT |
|---|
| ETag | "5ca1ee7ca21f482d340e204d24c353f3" |
|---|
| x-amz-server-side-encryption | AES256 |
|---|
| x-amz-version-id | Yvfj7RfXQIJe.P5jnynygS0EX1LQHZ92 |
|---|
| Accept-Ranges | bytes |
|---|
| Server | AmazonS3 |
|---|
| X-Cache | Miss from cloudfront |
|---|
| Via | 1.1 a00b4d9996b86af2fc0235a1e5eb9162.cloudfront.net (CloudFront) |
|---|
| X-Amz-Cf-Pop | ATL59-P18 |
|---|
| Alt-Svc | h3=":443"; ma=86400 |
|---|
| X-Amz-Cf-Id | YjpbStlciYOSjxp7Yxqpzs3SQMaPRzHuROF3FXdSy8wx2P1-aObgGQ== |
|---|
|
|---|
| tlsping | | host | brave-browser-apk-release.s3.brave.com |
|---|
| ip | 54.230.79.11 |
|---|
| address | brave-browser-apk-release.s3.brave.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.062629829 |
|---|
| max | 0.065623429 |
|---|
| average | 0.0643086252 |
|---|
| stddev | 0.0009615988331688847 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://breezy-weather.github.io/fdroid-repo/fdroid/repo | | ip | 185.199.108.153 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpbizjt4ck
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437302 |
|---|
| duration | 0.4069337844848633 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 18979 |
|---|
| Server | GitHub.com |
|---|
| Content-Type | application/java-archive |
|---|
| x-origin-cache | HIT |
|---|
| Last-Modified | Sat, 07 Feb 2026 02:24:59 GMT |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Strict-Transport-Security | max-age=31556952 |
|---|
| ETag | "6986a27b-4a23" |
|---|
| expires | Sat, 07 Feb 2026 02:42:31 GMT |
|---|
| Cache-Control | max-age=600 |
|---|
| x-proxy-cache | MISS |
|---|
| X-GitHub-Request-Id | 95FC:81C25:3924C9:4123E3:6986A43F |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Sat, 07 Feb 2026 04:08:22 GMT |
|---|
| Via | 1.1 varnish |
|---|
| Age | 37 |
|---|
| X-Served-By | cache-pdk-kfty8610040-PDK |
|---|
| X-Cache | HIT |
|---|
| X-Cache-Hits | 1 |
|---|
| X-Timer | S1770437303.978393,VS0,VE2 |
|---|
| Vary | Accept-Encoding |
|---|
| X-Fastly-Request-ID | 07e4900e772fa10cb7d5d264c53d8423f6efd290 |
|---|
|
|---|
| tlsping | | host | breezy-weather.github.io |
|---|
| ip | 185.199.108.153 |
|---|
| address | breezy-weather.github.io:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.061148059 |
|---|
| max | 0.064955029 |
|---|
| average | 0.0630717577 |
|---|
| stddev | 0.0013015549596251444 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://briarproject.org/fdroid/repo | | ip | 157.90.23.135 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpn11a_ia9
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437304 |
|---|
| duration | 0.703822135925293 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.22.1 |
|---|
| Date | Sat, 07 Feb 2026 04:06:27 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 4274 |
|---|
| Last-Modified | Thu, 11 Dec 2025 10:35:57 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "693a9e8d-10b2" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | briarproject.org |
|---|
| ip | 157.90.23.135 |
|---|
| address | briarproject.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.240326319 |
|---|
| max | 0.242926889 |
|---|
| average | 0.24165069300000003 |
|---|
| stddev | 0.0008747052272302918 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://bubu1.eu/fdroidclassic/fdroid/repo | | ip | 176.9.145.28 |
|---|
| VerificationException | The repository's fingerprint does not match. |
|---|
| starttime | 1770437309 |
|---|
| duration | 0.9025468826293945 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.29.3 |
|---|
| Date | Sat, 07 Feb 2026 04:08:29 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 9793 |
|---|
| Last-Modified | Wed, 08 Mar 2023 23:22:24 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "640918b0-2641" |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
|---|
| Referrer-Policy | strict-origin |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | bubu1.eu |
|---|
| ip | 176.9.145.28 |
|---|
| address | bubu1.eu:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.252537684 |
|---|
| max | 0.261002334 |
|---|
| average | 0.254547837 |
|---|
| stddev | 0.002324724843395668 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://calyxos.gitlab.io/calyx-fdroid-repo/fdroid/repo | | ip | 35.185.44.232 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmprcqv59_5
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437314 |
|---|
| duration | 0.4115169048309326 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Cache-Control | max-age=600 |
|---|
| Content-Length | 6899 |
|---|
| Content-Type | application/java-archive |
|---|
| Etag | "8c2cb86acd942981c0fcf0af8db77539cde88c052fa75b0d8e5b5597eceba246" |
|---|
| Expires | Sat, 07 Feb 2026 04:18:34 UTC |
|---|
| Last-Modified | Sat, 07 Feb 2026 04:01:29 GMT |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| Vary | Origin |
|---|
| X-Request-Id | 01KGV4K2A0BA7MP538ZZ2AE55E |
|---|
| Date | Sat, 07 Feb 2026 04:08:34 GMT |
|---|
|
|---|
| tlsping | | host | calyxos.gitlab.io |
|---|
| ip | 35.185.44.232 |
|---|
| address | calyxos.gitlab.io:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.04172619 |
|---|
| max | 0.108075759 |
|---|
| average | 0.05555147380000001 |
|---|
| stddev | 0.024807635003557104 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://cdn.kde.org/android/fdroid/repo | | ip | 109.61.91.198 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpgsae4ofg
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437315 |
|---|
| duration | 0.9833660125732422 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:08:36 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 169009 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Fri, 06 Feb 2026 16:40:48 GMT |
|---|
| Cache-Control | max-age=0 |
|---|
| Expires | Sat, 07 Feb 2026 04:08:36 GMT |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-77-NZT | krydxFv2Er/MIMDbV0Z9T6hScMAoMoxf1L9Mn4wbUInJ |
|---|
| X-77-NZT-Ray | bff7651dd8d39fddc3ba86694a0a4731 |
|---|
| X-77-Cache | MISS |
|---|
| Server | CDN77-Turbo |
|---|
| X-77-POP | ashburnUSVA |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | cdn.kde.org |
|---|
| ip | 109.61.91.198 |
|---|
| address | cdn.kde.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.107829706 |
|---|
| max | 0.135739565 |
|---|
| average | 0.12169825139999998 |
|---|
| stddev | 0.010288842076108152 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://cdn.kde.org/android/stable-releases/fdroid/repo | | ip | 109.61.91.198 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpaudhqrm8
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437318 |
|---|
| duration | 0.8578531742095947 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:08:38 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 79128 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Wed, 04 Feb 2026 17:33:06 GMT |
|---|
| Cache-Control | max-age=0 |
|---|
| Expires | Sat, 07 Feb 2026 04:08:38 GMT |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-77-NZT | ku15Uut/ZMMb5ajP/IvDLtDa2AIEuXhxd1urxk5syFDg |
|---|
| X-77-NZT-Ray | bff7651d5104cd8fc6ba8669443f5604 |
|---|
| X-77-Cache | MISS |
|---|
| Server | CDN77-Turbo |
|---|
| X-77-POP | ashburnUSVA |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | cdn.kde.org |
|---|
| ip | 109.61.91.198 |
|---|
| address | cdn.kde.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.117330089 |
|---|
| max | 0.134789219 |
|---|
| average | 0.127608513 |
|---|
| stddev | 0.006113326669750603 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://eutopia.cz/experimental/fdroid/repo | | SSLError | HTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /experimental/fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'"))) |
|---|
| starttime | 1770437320 |
|---|
| duration | 0.35599398612976074 |
|---|
| status | 200 |
|---|
| TLS | [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992) |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:08:38 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 79128 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Wed, 04 Feb 2026 17:33:06 GMT |
|---|
| Cache-Control | max-age=0 |
|---|
| Expires | Sat, 07 Feb 2026 04:08:38 GMT |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-77-NZT | ku15Uut/ZMMb5ajP/IvDLtDa2AIEuXhxd1urxk5syFDg |
|---|
| X-77-NZT-Ray | bff7651d5104cd8fc6ba8669443f5604 |
|---|
| X-77-Cache | MISS |
|---|
| Server | CDN77-Turbo |
|---|
| X-77-POP | ashburnUSVA |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://eutopia.cz/fdroid/repo | | SSLError | HTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'"))) |
|---|
| starttime | 1770437325 |
|---|
| duration | 0.2492969036102295 |
|---|
| status | 200 |
|---|
| TLS | [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992) |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:08:38 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 79128 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Wed, 04 Feb 2026 17:33:06 GMT |
|---|
| Cache-Control | max-age=0 |
|---|
| Expires | Sat, 07 Feb 2026 04:08:38 GMT |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-77-NZT | ku15Uut/ZMMb5ajP/IvDLtDa2AIEuXhxd1urxk5syFDg |
|---|
| X-77-NZT-Ray | bff7651d5104cd8fc6ba8669443f5604 |
|---|
| X-77-Cache | MISS |
|---|
| Server | CDN77-Turbo |
|---|
| X-77-POP | ashburnUSVA |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://f-droid.i2p.io/repo | | ConnectTimeout | HTTPSConnectionPool(host='f-droid.i2p.io', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by ConnectTimeoutError(<urllib3.connection.HTTPSConnection object at 0x7f7e91938d50>, 'Connection to f-droid.i2p.io timed out. (connect timeout=60)')) |
|---|
| starttime | 1770437329 |
|---|
| duration | 60.22611999511719 |
|---|
| status | 200 |
|---|
| TLS | [Errno 110] Connection timed out |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:08:38 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 79128 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Wed, 04 Feb 2026 17:33:06 GMT |
|---|
| Cache-Control | max-age=0 |
|---|
| Expires | Sat, 07 Feb 2026 04:08:38 GMT |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-77-NZT | ku15Uut/ZMMb5ajP/IvDLtDa2AIEuXhxd1urxk5syFDg |
|---|
| X-77-NZT-Ray | bff7651d5104cd8fc6ba8669443f5604 |
|---|
| X-77-Cache | MISS |
|---|
| Server | CDN77-Turbo |
|---|
| X-77-POP | ashburnUSVA |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://f-droid.monerujo.io/fdroid/repo | | ip | 35.185.44.232 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpqhjbyotp
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437530 |
|---|
| duration | 0.525148868560791 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Cache-Control | max-age=600 |
|---|
| Content-Length | 7600 |
|---|
| Content-Type | application/java-archive |
|---|
| Etag | "affdb5c6a9b95f4decc4c67a141ea146e5e87e303f64dbea67d8404c48779732" |
|---|
| Expires | Sat, 07 Feb 2026 04:22:11 UTC |
|---|
| Last-Modified | Tue, 17 Jun 2025 17:27:43 GMT |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| Vary | Origin |
|---|
| X-Request-Id | 01KGV4SNB86C6W9J7F22MJACFY |
|---|
| Date | Sat, 07 Feb 2026 04:12:11 GMT |
|---|
|
|---|
| tlsping | | host | f-droid.monerujo.io |
|---|
| ip | 35.185.44.232 |
|---|
| address | f-droid.monerujo.io:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.045567918 |
|---|
| max | 0.048876278 |
|---|
| average | 0.047157095 |
|---|
| stddev | 0.001079810626286388 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.a3.pm/seabear/repo | | ip | 172.67.220.96 |
|---|
| starttime | 1770437542 |
|---|
| duration | 3.5823309421539307 |
|---|
| status | 523 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:12:26 GMT |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
| Content-Length | 7168 |
|---|
| Connection | keep-alive |
|---|
| Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
|---|
| Expires | Thu, 01 Jan 1970 00:00:01 GMT |
|---|
| Referrer-Policy | same-origin |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9ca00c70ffbd157d-ATL |
|---|
| alt-svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | | host | fdroid.a3.pm |
|---|
| ip | 172.67.220.96 |
|---|
| address | fdroid.a3.pm:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.123370338 |
|---|
| max | 0.208994688 |
|---|
| average | 0.1801887678 |
|---|
| stddev | 0.024325958558793492 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.1 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.beocode.eu/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='fdroid.beocode.eu', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e9194bd10>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1770437547 |
|---|
| duration | 0.14364385604858398 |
|---|
| status | 523 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:12:26 GMT |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
| Content-Length | 7168 |
|---|
| Connection | keep-alive |
|---|
| Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
|---|
| Expires | Thu, 01 Jan 1970 00:00:01 GMT |
|---|
| Referrer-Policy | same-origin |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9ca00c70ffbd157d-ATL |
|---|
| alt-svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.1 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.bromite.org/fdroid/repo | | SSLError | HTTPSConnectionPool(host='fdroid.bromite.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)'))) |
|---|
| starttime | 1770437547 |
|---|
| duration | 0.32668495178222656 |
|---|
| status | 523 |
|---|
| TLS | [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992) |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:12:26 GMT |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
| Content-Length | 7168 |
|---|
| Connection | keep-alive |
|---|
| Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
|---|
| Expires | Thu, 01 Jan 1970 00:00:01 GMT |
|---|
| Referrer-Policy | same-origin |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9ca00c70ffbd157d-ATL |
|---|
| alt-svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.cgeo.org/fdroid/repo | | ip | 23.88.115.170 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp5cg6dggg
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437551 |
|---|
| duration | 0.9981229305267334 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | accept-ranges | bytes |
|---|
| content-type | application/java-archive |
|---|
| date | Sat, 07 Feb 2026 04:12:32 GMT |
|---|
| etag | "6957af4b-17ff" |
|---|
| last-modified | Fri, 02 Jan 2026 11:43:07 GMT |
|---|
| server | nginx/1.27.5 |
|---|
| content-length | 6143 |
|---|
|
|---|
| tlsping | | host | fdroid.cgeo.org |
|---|
| ip | 23.88.115.170 |
|---|
| address | fdroid.cgeo.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.25351283 |
|---|
| max | 0.277572789 |
|---|
| average | 0.25833552930000003 |
|---|
| stddev | 0.007335404749084681 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - Key exchange (ecdh_x25519) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.cgeo.org/repo | | ip | 23.88.115.170 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpj7fzozcc
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437557 |
|---|
| duration | 0.7301571369171143 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | accept-ranges | bytes |
|---|
| content-type | application/java-archive |
|---|
| date | Sat, 07 Feb 2026 04:12:37 GMT |
|---|
| etag | "6957af4b-17ff" |
|---|
| last-modified | Fri, 02 Jan 2026 11:43:07 GMT |
|---|
| server | nginx/1.27.5 |
|---|
| content-length | 6143 |
|---|
|
|---|
| tlsping | | host | fdroid.cgeo.org |
|---|
| ip | 23.88.115.170 |
|---|
| address | fdroid.cgeo.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.25404244 |
|---|
| max | 0.25693332 |
|---|
| average | 0.255469029 |
|---|
| stddev | 0.0010245043912980591 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - Key exchange (ecdh_x25519) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.fedilab.app/repo | | ip | 54.38.93.15 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp7_0h7eqb
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437562 |
|---|
| duration | 1.0006020069122314 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | date | Sat, 07 Feb 2026 04:12:43 GMT |
|---|
| content-type | application/java-archive |
|---|
| content-length | 41522 |
|---|
| last-modified | Sat, 31 Jan 2026 17:27:52 GMT |
|---|
| etag | "697e3b98-a232" |
|---|
| accept-ranges | bytes |
|---|
| permissions-policy | microphone=(), camera=(), geolocation=(), interest-cohort=() |
|---|
| x-frame-options | deny |
|---|
| x-content-type-options | nosniff |
|---|
|
|---|
| tlsping | | host | fdroid.fedilab.app |
|---|
| ip | 54.38.93.15 |
|---|
| address | fdroid.fedilab.app:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.284104183 |
|---|
| max | 0.315730042 |
|---|
| average | 0.2957466446 |
|---|
| stddev | 0.011675296005378791 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.frostnerd.com/fdroid/repo | | ip | 152.53.101.189 |
|---|
| starttime | 1770437568 |
|---|
| duration | 0.4788050651550293 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Alt-Svc | h3=":443"; ma=2592000 |
|---|
| Expect-Ct | max-age=86400, enforce |
|---|
| Feature-Policy | microphone 'none'; camera 'none' |
|---|
| Permissions-Policy | camera=(), geolocation=(), microphone=(), interest-cohort=() |
|---|
| Referrer-Policy | same-origin |
|---|
| Server | Caddy |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| X-Xss-Protection | 0 |
|---|
| Date | Sat, 07 Feb 2026 04:12:48 GMT |
|---|
| Content-Length | 0 |
|---|
|
|---|
| tlsping | | host | fdroid.frostnerd.com |
|---|
| ip | 152.53.101.189 |
|---|
| address | fdroid.frostnerd.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.308228194 |
|---|
| max | 0.333916503 |
|---|
| average | 0.3159403524999999 |
|---|
| stddev | 0.008912027266252513 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.i2pd.xyz/fdroid/repo | | ip | 62.210.85.80 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp40y7m_u2
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437573 |
|---|
| duration | 0.9300699234008789 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:12:53 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 37848 |
|---|
| Last-Modified | Tue, 09 Sep 2025 13:55:17 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "68c031c5-93d8" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-Xss-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | fdroid.i2pd.xyz |
|---|
| ip | 62.210.85.80 |
|---|
| address | fdroid.i2pd.xyz:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.374979148 |
|---|
| max | 0.397611568 |
|---|
| average | 0.382270658 |
|---|
| stddev | 0.008288368659380456 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp521r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp521r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.koyu.space/fdroid/repo | | SSLError | HTTPSConnectionPool(host='fdroid.koyu.space', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLError(1, '[SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992)'))) |
|---|
| starttime | 1770437582 |
|---|
| duration | 0.26867103576660156 |
|---|
| status | 200 |
|---|
| TLS | [SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992) |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:12:53 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 37848 |
|---|
| Last-Modified | Tue, 09 Sep 2025 13:55:17 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "68c031c5-93d8" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-Xss-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.krombel.de/riot-dev-fdroid/fdroid/repo | | SSLError | HTTPSConnectionPool(host='fdroid.krombel.de', port=443): Max retries exceeded with url: /riot-dev-fdroid/fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)'))) |
|---|
| starttime | 1770437585 |
|---|
| duration | 0.3299248218536377 |
|---|
| status | 200 |
|---|
| TLS | [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992) |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:12:53 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 37848 |
|---|
| Last-Modified | Tue, 09 Sep 2025 13:55:17 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "68c031c5-93d8" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-Xss-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.krombel.de/riot-stable/fdroid/repo | | SSLError | HTTPSConnectionPool(host='fdroid.krombel.de', port=443): Max retries exceeded with url: /riot-stable/fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)'))) |
|---|
| starttime | 1770437590 |
|---|
| duration | 0.2404038906097412 |
|---|
| status | 200 |
|---|
| TLS | [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992) |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:12:53 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 37848 |
|---|
| Last-Modified | Tue, 09 Sep 2025 13:55:17 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "68c031c5-93d8" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-Xss-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.libretro.com/repo | | ip | 5.9.202.202 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpzku4rmhd
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437595 |
|---|
| duration | 0.8528339862823486 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Content-Type | application/java-archive |
|---|
| Accept-Ranges | bytes |
|---|
| ETag | "1711916461" |
|---|
| Last-Modified | Wed, 18 Nov 2020 10:48:50 GMT |
|---|
| Content-Length | 5595 |
|---|
| Date | Sat, 07 Feb 2026 04:13:15 GMT |
|---|
| Server | lighttpd/1.4.35 |
|---|
|
|---|
| tlsping | | host | fdroid.libretro.com |
|---|
| ip | 5.9.202.202 |
|---|
| address | fdroid.libretro.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.354464349 |
|---|
| max | 0.356504929 |
|---|
| average | 0.355491718 |
|---|
| stddev | 0.0007099916373373758 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
- Key exchange (dh 1024) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
- Key exchange (dh 1024) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
- Key exchange (dh 1024) of lower strength than certificate key
|
|---|
|
|---|
| least strength | D |
|---|
|
|---|
|
|---|
| https://fdroid.metatransapps.com/fdroid/repo | | ip | 49.12.195.92 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpsivyza8o
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437610 |
|---|
| duration | 1.1509709358215332 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:13:30 GMT |
|---|
| Server | Apache/2.4.48 (Debian) |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| Content-Security-Policy | base-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content; |
|---|
| Strict-Transport-Security | max-age=15552000 |
|---|
| Last-Modified | Fri, 12 Sep 2025 00:41:19 GMT |
|---|
| ETag | "d3aa-63e8fe98d2964" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 54186 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | fdroid.metatransapps.com |
|---|
| ip | 49.12.195.92 |
|---|
| address | fdroid.metatransapps.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.252175547 |
|---|
| max | 0.254651417 |
|---|
| average | 0.253478945 |
|---|
| stddev | 0.0008521582528004981 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.nordgedanken.dev/repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo | | ConnectionError | HTTPSConnectionPool(host='fdroid.nordgedanken.dev', port=443): Max retries exceeded with url: /repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e91967d90>: Failed to establish a new connection: [Errno -5] No address associated with hostname')) |
|---|
| starttime | 1770437618 |
|---|
| duration | 0.2166128158569336 |
|---|
| status | 200 |
|---|
| TLS | [Errno -5] No address associated with hostname |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:13:30 GMT |
|---|
| Server | Apache/2.4.48 (Debian) |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| Content-Security-Policy | base-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content; |
|---|
| Strict-Transport-Security | max-age=15552000 |
|---|
| Last-Modified | Fri, 12 Sep 2025 00:41:19 GMT |
|---|
| ETag | "d3aa-63e8fe98d2964" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 54186 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.partidopirata.com.ar/fdroid/repo | | ip | 151.236.30.90 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpzbfflygk
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437618 |
|---|
| duration | 0.7377219200134277 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.26.1 |
|---|
| Date | Sat, 07 Feb 2026 04:13:38 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 5211 |
|---|
| Last-Modified | Tue, 07 Jun 2022 01:05:55 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "629ea473-145b" |
|---|
| Cache-Control | no-cache |
|---|
| Access-Control-Allow-Origin | *.partidopirata.com.ar |
|---|
| Strict-Transport-Security | max-age=15552000; includeSubDomains; preload |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | fdroid.partidopirata.com.ar |
|---|
| ip | 151.236.30.90 |
|---|
| address | fdroid.partidopirata.com.ar:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.269963811 |
|---|
| max | 0.281068009 |
|---|
| average | 0.2728009697 |
|---|
| stddev | 0.00354958877672257 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.pixelfed.net/fdroid/repo | | ip | 165.227.195.166 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp9mbcm8uf
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437628 |
|---|
| duration | 0.4614408016204834 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:13:48 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 3920 |
|---|
| Last-Modified | Wed, 03 Sep 2025 11:12:20 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "68b82294-f50" |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | fdroid.pixelfed.net |
|---|
| ip | 165.227.195.166 |
|---|
| address | fdroid.pixelfed.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.129832138 |
|---|
| max | 0.214469843 |
|---|
| average | 0.1846277365 |
|---|
| stddev | 0.025600687850613563 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.rakshazi.me/repo | | ConnectionError | HTTPSConnectionPool(host='fdroid.rakshazi.me', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e919659d0>: Failed to establish a new connection: [Errno -5] No address associated with hostname')) |
|---|
| starttime | 1770437630 |
|---|
| duration | 0.034691810607910156 |
|---|
| status | 200 |
|---|
| TLS | [Errno -5] No address associated with hostname |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:13:48 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 3920 |
|---|
| Last-Modified | Wed, 03 Sep 2025 11:12:20 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "68b82294-f50" |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.rami.io/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='fdroid.rami.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e91964610>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1770437631 |
|---|
| duration | 0.21741795539855957 |
|---|
| status | 200 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:13:48 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 3920 |
|---|
| Last-Modified | Wed, 03 Sep 2025 11:12:20 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "68b82294-f50" |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroid.tagesschau.de/repo | | ip | 34.160.251.4 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmphgmcwbxc
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437631 |
|---|
| duration | 0.6185429096221924 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | X-GUploader-UploadID | AJRbA5Uk5Ew8TRpBxbsbuhDTdjSzrJbM6vbvgVj4yC28rYzY11QD8QuEB0k0I4gRJehcVIJ4GtbQ-5A |
|---|
| x-goog-generation | 1769608056089937 |
|---|
| x-goog-metageneration | 1 |
|---|
| x-goog-stored-content-encoding | identity |
|---|
| x-goog-stored-content-length | 5407 |
|---|
| x-goog-meta-goog-reserved-file-mtime | 1769608024 |
|---|
| x-goog-hash | crc32c=eBN6hw==, md5=THew2eEYstxgofs+dnkW1w== |
|---|
| x-goog-storage-class | STANDARD |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 5407 |
|---|
| Server | UploadServer |
|---|
| Date | Sat, 07 Feb 2026 04:13:51 GMT |
|---|
| Expires | Sat, 07 Feb 2026 05:13:51 GMT |
|---|
| Cache-Control | public, max-age=3600 |
|---|
| Last-Modified | Wed, 28 Jan 2026 13:47:36 GMT |
|---|
| ETag | "4c77b0d9e118b2dc60a1fb3e767916d7" |
|---|
| Content-Type | application/octet-stream |
|---|
| Age | 0 |
|---|
| Alt-Svc | h3=":443"; ma=2592000,h3-29=":443"; ma=2592000 |
|---|
|
|---|
| tlsping | | host | fdroid.tagesschau.de |
|---|
| ip | 34.160.251.4 |
|---|
| address | fdroid.tagesschau.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.041395183 |
|---|
| max | 0.045550272 |
|---|
| average | 0.043187020300000004 |
|---|
| stddev | 0.0014087959766983327 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | C |
|---|
|
|---|
|
|---|
| https://fdroid.videlibri.de/repo | | ip | 95.143.172.218 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp0mjkfx21
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437632 |
|---|
| duration | 0.9248709678649902 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:13:53 GMT |
|---|
| Content-Type | application/x-java-archive |
|---|
| Content-Length | 6633 |
|---|
| Connection | keep-alive |
|---|
| Server | nginx |
|---|
| Last-Modified | Sat, 29 Nov 2025 17:10:00 GMT |
|---|
| ETag | "19e9-644bed0f37273" |
|---|
| Accept-Ranges | bytes |
|---|
| X-Xss-Protection | 1; mode=block |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
|
|---|
| tlsping | | host | fdroid.videlibri.de |
|---|
| ip | 95.143.172.218 |
|---|
| address | fdroid.videlibri.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.383320563 |
|---|
| max | 0.427818634 |
|---|
| average | 0.39175911839999994 |
|---|
| stddev | 0.013590445923494471 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://fdroidfamily.codeberg.page/repo | | ip | 217.197.84.141 |
|---|
| starttime | 1770437638 |
|---|
| duration | 0.818976879119873 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Allow | GET, HEAD, OPTIONS |
|---|
| Alt-Svc | h3=":443"; ma=2592000,h3=":443"; ma=2592000 |
|---|
| Cache-Control | public, max-age=600 |
|---|
| Content-Type | text/html; charset=utf-8 |
|---|
| Date | Sat, 07 Feb 2026 04:13:59 GMT |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| Server | git-pages (git-pages), pages-server |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubdomains; preload |
|---|
| Via | 1.1 Caddy |
|---|
| Transfer-Encoding | chunked |
|---|
|
|---|
| tlsping | | host | fdroidfamily.codeberg.page |
|---|
| ip | 217.197.84.141 |
|---|
| address | fdroidfamily.codeberg.page:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.312603032 |
|---|
| max | 0.335684518 |
|---|
| average | 0.3220177024 |
|---|
| stddev | 0.008545103509125736 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://freeyourgadget.codeberg.page/fdroid/repo | | ip | 217.197.84.141 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpoz204w7m
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437644 |
|---|
| duration | 0.8947339057922363 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Allow | GET, HEAD, OPTIONS |
|---|
| Alt-Svc | h3=":443"; ma=2592000,h3=":443"; ma=2592000 |
|---|
| Cache-Control | public, max-age=600 |
|---|
| Content-Length | 5678 |
|---|
| Content-Type | application/java-archive |
|---|
| Date | Sat, 07 Feb 2026 04:14:04 GMT |
|---|
| Etag | "d495f45ff38b16fdca3b94d32a8b682a78712547" |
|---|
| Last-Modified | Fri, 06 Feb 2026 22:29:53 GMT |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| Server | git-pages (git-pages), pages-server |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubdomains; preload |
|---|
| Via | 1.1 Caddy |
|---|
|
|---|
| tlsping | | host | freeyourgadget.codeberg.page |
|---|
| ip | 217.197.84.141 |
|---|
| address | freeyourgadget.codeberg.page:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.299482408 |
|---|
| max | 0.332694182 |
|---|
| average | 0.31652644700000004 |
|---|
| stddev | 0.012241502133562069 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://github.com/onionshare/onionshare-android-nightly/raw/master/fdroid/repo | | ip | 185.199.108.133 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpyraxfon8
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437649 |
|---|
| duration | 0.5920658111572266 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 3658 |
|---|
| Cache-Control | max-age=300 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Content-Type | application/octet-stream |
|---|
| ETag | W/"625338d4adeafd16c42bfe19d44f2e72c7513ebbd0a32f307c3182fcffdc650c" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-GitHub-Request-Id | 3070:1E7D07:2A99BA:354A6A:6986B7C9 |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Sat, 07 Feb 2026 04:14:09 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-pdk-kfty8610094-PDK |
|---|
| X-Cache | HIT |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1770437649.493768,VS0,VE39 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | 01cbd7eeb63e9951ca68bb296bc21d0821f6a266 |
|---|
| Expires | Sat, 07 Feb 2026 04:19:09 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | github.com |
|---|
| ip | 140.82.113.3 |
|---|
| address | github.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.171476906 |
|---|
| max | 0.269135734 |
|---|
| average | 0.22507900409999998 |
|---|
| stddev | 0.032923784943308165 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (ecdh_x25519) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://gitlab.com/fdroid/fdroidclient-nightly/raw/master/fdroid/repo | | ip | 172.65.251.78 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpzjmtielw
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437651 |
|---|
| duration | 0.5192160606384277 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:14:11 GMT |
|---|
| Content-Type | application/octet-stream |
|---|
| Content-Length | 6602 |
|---|
| Connection | keep-alive |
|---|
| Server | cloudflare |
|---|
| CF-Ray | 9ca00f191a44dffe-ATL |
|---|
| CF-Cache-Status | REVALIDATED |
|---|
| Accept-Ranges | bytes |
|---|
| Cache-Control | max-age=60, public, must-revalidate, stale-while-revalidate=60, stale-if-error=300, s-maxage=60 |
|---|
| Content-Disposition | attachment |
|---|
| ETag | "c60145727bc345438f413d578f7e5688" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| Vary | Accept-Encoding |
|---|
| content-security-policy | base-uri 'self'; child-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ 'self' blob: data: https://embed.figma.com https://www.figma.com https://www.youtube.com; connect-src 'self' https://gitlab.com wss://gitlab.com https://sentry.gitlab.net https://new-sentry.gitlab.net https://customers.gitlab.com https://snowplow.trx.gitlab.net https://sourcegraph.com https://collector.prd-278964.gl-product-analytics.com https://analytics.gitlab.com snowplowprd.trx.gitlab.net; default-src 'self'; font-src 'self'; form-action 'self' https: http:; frame-ancestors 'self'; frame-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ https://embed.figma.com https://www.figma.com https://www.youtube.com; img-src 'self' data: blob: http: https:; manifest-src 'self'; media-src 'self' data: blob: http: https:; object-src 'none'; report-uri https://new-sentry.gitlab.net/api/4/security/?sentry_key=f5573e26de8f4293b285e556c35dfd6e&sentry_environment=gprd; script-src 'strict-dynamic' 'self' 'unsafe-inline' 'unsafe-eval' https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.recaptcha.net/ https://apis.google.com https://*.zuora.com/apps/PublicHostedPageLite.do 'nonce-Z9NT9q9lcLRxz+SotRtc7g=='; style-src 'self' 'unsafe-inline'; worker-src 'self' https://gitlab.com/assets/ blob: data: |
|---|
| gitlab-lb | haproxy-main-56-lb-gprd |
|---|
| gitlab-sv | web-gke-us-east1-c |
|---|
| nel | {"max_age": 0} |
|---|
| permissions-policy | interest-cohort=() |
|---|
| ratelimit-limit | 500 |
|---|
| ratelimit-name | throttle_unauthenticated_web |
|---|
| ratelimit-observed | 1 |
|---|
| ratelimit-remaining | 499 |
|---|
| ratelimit-reset | 1769520840 |
|---|
| referrer-policy | strict-origin-when-cross-origin |
|---|
| x-content-type-options | nosniff |
|---|
| x-download-options | noopen |
|---|
| x-frame-options | SAMEORIGIN |
|---|
| x-gitlab-meta | {"correlation_id":"9c489f8275b492b3-ATL","version":"1"} |
|---|
| x-permitted-cross-domain-policies | none |
|---|
| x-request-id | 9c489f8275b492b3-ATL |
|---|
| x-runtime | 0.144457 |
|---|
| x-ua-compatible | IE=edge |
|---|
| x-xss-protection | 1; mode=block |
|---|
| Set-Cookie | __cf_bm=IduvpUZHGggmLBkEjd9vIQkxNi6k7d2H8YXIjVdVuRc-1770437651-1.0.1.1-84qwltkL2Zsd5TJqYflk4qQzuIJsj8rvGNpRiCXhN.7JZZTpQdfAXcAe5jQpA1kQaBakoz1lgfvuPOeDScQPL1ba2i4Yb.H0_HVOaeMh7hQ; path=/; expires=Sat, 07-Feb-26 04:44:11 GMT; domain=.gitlab.com; HttpOnly; Secure; SameSite=None, _cfuvid=S.YfXX4D6WUS6YZGVXtd7YuyadkzDfizn4Dtans14Zk-1770437651523-0.0.1.1-604800000; path=/; domain=.gitlab.com; HttpOnly; Secure; SameSite=None |
|---|
|
|---|
| tlsping | | host | gitlab.com |
|---|
| ip | 172.65.251.78 |
|---|
| address | gitlab.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.060875968 |
|---|
| max | 0.064670208 |
|---|
| average | 0.06278539 |
|---|
| stddev | 0.0011716345192746762 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://grobox.de/fdroid/repo | | ip | 217.197.86.172 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpviywgv5f
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437653 |
|---|
| duration | 0.9542849063873291 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:14:13 GMT |
|---|
| Server | Apache |
|---|
| Upgrade | h2,h2c |
|---|
| Connection | Upgrade, Keep-Alive |
|---|
| Last-Modified | Fri, 12 Dec 2025 12:46:08 GMT |
|---|
| ETag | "2965-645c0a543a8d3" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 10597 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | grobox.de |
|---|
| ip | 217.197.86.172 |
|---|
| address | grobox.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.463390248 |
|---|
| max | 0.467476938 |
|---|
| average | 0.4655798717 |
|---|
| stddev | 0.001308642521347448 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 3072) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - Key exchange (dh 3072) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://guardianproject-wind.s3.amazonaws.com/fdroid/repo | | ip | 52.217.132.65 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmprd783wh5
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437665 |
|---|
| duration | 0.6455349922180176 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | x-amz-id-2 | 6GPjBrPzVUI5NrURFjW8LILCaylxkA1kTJzW6Vgc50A2n6/YtU9FQNMZD4PRcoCLxtKIwP2OX/g= |
|---|
| x-amz-request-id | SGHGQA4F0E0Z7G72 |
|---|
| Date | Sat, 07 Feb 2026 04:14:26 GMT |
|---|
| Last-Modified | Fri, 31 Jan 2025 07:13:53 GMT |
|---|
| ETag | "e3e79c0ad41eb80a8f3bd87727c953d5" |
|---|
| x-amz-server-side-encryption | AES256 |
|---|
| x-amz-meta-s3cmd-attrs | atime:1738307518/ctime:1738307518/gid:1000/gname:geheimnis/md5:e3e79c0ad41eb80a8f3bd87727c953d5/mode:33188/mtime:1738307518/uid:1000/uname:geheimnis |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Type | application/zip |
|---|
| Content-Length | 507773 |
|---|
| Server | AmazonS3 |
|---|
|
|---|
| tlsping | | host | guardianproject-wind.s3.amazonaws.com |
|---|
| ip | 52.217.132.65 |
|---|
| address | guardianproject-wind.s3.amazonaws.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.074817628 |
|---|
| max | 0.077618348 |
|---|
| average | 0.07617463270000001 |
|---|
| stddev | 0.0009833890608341178 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://guardianproject.info/fdroid/repo | | ip | 204.19.241.151 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmphp0_in0b
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437668 |
|---|
| duration | 0.7194111347198486 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:14:28 GMT |
|---|
| Server | Apache/2.4.59 (Debian) |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| Feature-Policy | ambient-light-sensor 'none'; autoplay 'none'; accelerometer 'none'; camera 'none'; display-capture 'none'; document-domain 'none'; encrypted-media 'none'; fullscreen 'none'; geolocation 'none'; gyroscope 'none'; magnetometer 'none'; microphone 'none'; midi 'none'; payment 'none'; picture-in-picture 'none'; speaker 'none'; sync-xhr 'none'; usb 'none'; wake-lock 'none'; webauthn 'none'; vr 'none'; xr 'none'; |
|---|
| Content-Security-Policy | default-src 'none'; base-uri 'self'; block-all-mixed-content; connect-src 'self'; font-src 'self'; form-action 'self'; frame-ancestors 'self'; img-src 'self' https://*.static.flickr.com https://*.staticflickr.com; media-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| Referrer-Policy | strict-origin |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | sameorigin |
|---|
| X-Xss-Protection | 1; mode=block |
|---|
| Vary | User-Agent |
|---|
| Last-Modified | Fri, 06 Feb 2026 06:47:59 GMT |
|---|
| ETag | "31849-64a222b84fe3b" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 202825 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | guardianproject.info |
|---|
| ip | 204.19.241.151 |
|---|
| address | guardianproject.info:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.078084017 |
|---|
| max | 0.081035487 |
|---|
| average | 0.0795897011 |
|---|
| stddev | 0.0009359262733033454 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://haagch.frickel.club/files/fdroid/repo | | ip | 159.195.50.59 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpcfob6w0k
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437671 |
|---|
| duration | 0.9209151268005371 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.28.0 |
|---|
| Date | Sat, 07 Feb 2026 04:14:31 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 7603 |
|---|
| Last-Modified | Thu, 06 Jan 2022 03:00:10 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "61d65b3a-1db3" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | haagch.frickel.club |
|---|
| ip | 159.195.50.59 |
|---|
| address | haagch.frickel.club:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.246696587 |
|---|
| max | 0.248945386 |
|---|
| average | 0.24774311079999997 |
|---|
| stddev | 0.0007854849034753993 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://jak-linux.org/fdroid/repo | | ip | 195.201.138.240 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp1akkc5yw
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437677 |
|---|
| duration | 0.7394740581512451 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.24.0 (Ubuntu) |
|---|
| Date | Sat, 07 Feb 2026 04:14:38 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 4052 |
|---|
| Last-Modified | Tue, 23 Mar 2021 17:51:53 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "605a2ab9-fd4" |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| X-Frame-Options | DENY |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | jak-linux.org |
|---|
| ip | 195.201.138.240 |
|---|
| address | jak-linux.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.241231023 |
|---|
| max | 0.244039034 |
|---|
| average | 0.24257522250000002 |
|---|
| stddev | 0.0009062767533189026 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://jhass.github.io/insporation/fdroid/repo | | ip | 185.199.108.153 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpy6rlrbry
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437684 |
|---|
| duration | 0.44666409492492676 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 2948 |
|---|
| Server | GitHub.com |
|---|
| Content-Type | application/java-archive |
|---|
| Last-Modified | Thu, 22 Feb 2024 04:10:47 GMT |
|---|
| Access-Control-Allow-Origin | * |
|---|
| ETag | "65d6c947-b84" |
|---|
| expires | Sat, 07 Feb 2026 03:01:18 GMT |
|---|
| Cache-Control | max-age=600 |
|---|
| x-proxy-cache | MISS |
|---|
| X-GitHub-Request-Id | 575D:1ACE62:376A5A:3DDD9C:6986A8A6 |
|---|
| Accept-Ranges | bytes |
|---|
| Age | 0 |
|---|
| Date | Sat, 07 Feb 2026 04:14:44 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-pdk-kfty8610046-PDK |
|---|
| X-Cache | HIT |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1770437684.171371,VS0,VE26 |
|---|
| Vary | Accept-Encoding |
|---|
| X-Fastly-Request-ID | 37d0f075572af315510087c11b7cb3cb41125feb |
|---|
|
|---|
| tlsping | | host | jhass.github.io |
|---|
| ip | 185.199.108.153 |
|---|
| address | jhass.github.io:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.061564538 |
|---|
| max | 0.065351588 |
|---|
| average | 0.06349335599999999 |
|---|
| stddev | 0.0013041712134900078 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://julianfairfax.gitlab.io/fdroid-repo/fdroid/repo | | starttime | 1770437685 |
|---|
| duration | 0.42048001289367676 |
|---|
| status | 403 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:14:45 GMT |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | close |
|---|
| accept-ch | Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA |
|---|
| cf-mitigated | challenge |
|---|
| critical-ch | Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA |
|---|
| cross-origin-embedder-policy | require-corp |
|---|
| cross-origin-resource-policy | same-origin |
|---|
| origin-agent-cluster | ?1 |
|---|
| permissions-policy | accelerometer=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=() |
|---|
| referrer-policy | same-origin |
|---|
| server-timing | chlray;desc="9ca00ff0ca8ebd58" |
|---|
| x-content-type-options | nosniff |
|---|
| x-frame-options | SAMEORIGIN |
|---|
| Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
|---|
| Expires | Thu, 01 Jan 1970 00:00:01 GMT |
|---|
| Report-To | {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=r1G6OFD3tYgOEL4mNeXoAbspGadWmkgV3FOcbnmjQFh48h5mFSkWFbM%2FMvNN09NtJRryD%2BgYQTFoeIJRSIcgNx1xBSLlu2BebgalKdVLkTXnzJDlx4KreKPFkrc%3D"}],"group":"cf-nel","max_age":604800} |
|---|
| NEL | {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800} |
|---|
| Vary | Accept-Encoding |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9ca00ff0ca8ebd58-ATL |
|---|
| Content-Encoding | br |
|---|
|
|---|
| tlsping | | host | julianfairfax.gitlab.io |
|---|
| ip | 35.185.44.232 |
|---|
| address | julianfairfax.gitlab.io:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.096891077 |
|---|
| max | 0.100796937 |
|---|
| average | 0.09881725570000001 |
|---|
| stddev | 0.0013487249111907912 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://kaffeemitkoffein.de/fdroid/repo | | ip | 77.0.189.99 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmplliyvs15
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437686 |
|---|
| duration | 1.0056309700012207 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:14:47 GMT |
|---|
| Server | Apache/2.4.65 (Raspbian) |
|---|
| Last-Modified | Sun, 04 Jan 2026 14:34:12 GMT |
|---|
| ETag | "21d3-64790d60a3b6d" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 8659 |
|---|
| Strict-Transport-Security | max-age=15768000 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | kaffeemitkoffein.de |
|---|
| ip | 77.0.189.99 |
|---|
| address | kaffeemitkoffein.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.485039456 |
|---|
| max | 0.718399523 |
|---|
| average | 0.5509430494 |
|---|
| stddev | 0.06203439825889093 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 3072) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 3072) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 3072) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - Key exchange (dh 3072) of lower strength than certificate key
- Key exchange (ecdh_x25519) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://microg.org/fdroid/repo | | ip | 109.230.233.153 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmptxr9978n
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437725 |
|---|
| duration | 0.9139671325683594 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Accept-Ranges | bytes |
|---|
| Alt-Svc | h3=":443"; ma=2592000 |
|---|
| Content-Length | 8200 |
|---|
| Content-Type | application/java-archive |
|---|
| Etag | "dg7rpg9q1k246bs" |
|---|
| Last-Modified | Fri, 06 Feb 2026 09:22:49 GMT |
|---|
| Server | Caddy |
|---|
| Vary | Accept-Encoding |
|---|
| Date | Sat, 07 Feb 2026 04:15:26 GMT |
|---|
|
|---|
| tlsping | | host | microg.org |
|---|
| ip | 109.230.233.153 |
|---|
| address | microg.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.278224362 |
|---|
| max | 0.304743482 |
|---|
| average | 0.293428392 |
|---|
| stddev | 0.010459746700749499 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://mobileapp.bitwarden.com/fdroid/repo | | ip | 151.101.1.91 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp3h6_3zq_
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437731 |
|---|
| duration | 0.42000603675842285 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 6452 |
|---|
| Server | GitHub.com |
|---|
| Content-Type | application/java-archive |
|---|
| x-origin-cache | HIT |
|---|
| Last-Modified | Tue, 27 Jan 2026 14:01:08 GMT |
|---|
| Access-Control-Allow-Origin | * |
|---|
| ETag | "6978c524-1934" |
|---|
| expires | Sat, 07 Feb 2026 04:20:14 GMT |
|---|
| x-proxy-cache | MISS |
|---|
| X-GitHub-Request-Id | 9CBC:28AC9D:42361B:47BCDF:6986BB25 |
|---|
| Via | 1.1 varnish, 1.1 varnish |
|---|
| X-Fastly-Request-ID | 117fa9e304994548ee5a2110602a025574e55358 |
|---|
| Fastly-Debug-States | DELIVER |
|---|
| Cache-Control | public, max-age=0, must-revalidate |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Sat, 07 Feb 2026 04:15:31 GMT |
|---|
| Age | 317 |
|---|
| X-Served-By | cache-iad-kcgs7200116-IAD, cache-iad-kiad7000025-IAD |
|---|
| X-Cache | MISS, HIT |
|---|
| X-Cache-Hits | 0, 1 |
|---|
| X-Timer | S1770437731.410695,VS0,VE1 |
|---|
| Vary | Accept-Encoding |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Service-Version | 33 |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
|
|---|
| tlsping | | host | mobileapp.bitwarden.com |
|---|
| ip | 151.101.1.91 |
|---|
| address | mobileapp.bitwarden.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.063089208 |
|---|
| max | 0.065650908 |
|---|
| average | 0.06440339269999999 |
|---|
| stddev | 0.0009017889256052162 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://molly.im/fdroid/repo | | ip | 185.199.111.153 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpl0_oz3zp
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437732 |
|---|
| duration | 0.6302671432495117 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 5808 |
|---|
| Server | GitHub.com |
|---|
| Content-Type | application/java-archive |
|---|
| Last-Modified | Sat, 27 Dec 2025 13:09:33 GMT |
|---|
| Access-Control-Allow-Origin | * |
|---|
| ETag | "694fda8d-16b0" |
|---|
| expires | Sat, 07 Feb 2026 03:00:01 GMT |
|---|
| Cache-Control | max-age=600 |
|---|
| x-proxy-cache | MISS |
|---|
| X-GitHub-Request-Id | 442A:16AE7D:391298:3D668D:6986A858 |
|---|
| Accept-Ranges | bytes |
|---|
| Age | 0 |
|---|
| Date | Sat, 07 Feb 2026 04:15:32 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-pdk-kfty8610045-PDK |
|---|
| X-Cache | HIT |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1770437733.903584,VS0,VE23 |
|---|
| Vary | Accept-Encoding |
|---|
| X-Fastly-Request-ID | e5303fadb9f95167407991cb6ee3d5955d09f17b |
|---|
|
|---|
| tlsping | | host | molly.im |
|---|
| ip | 185.199.111.153 |
|---|
| address | molly.im:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.059148109 |
|---|
| max | 0.062204189 |
|---|
| average | 0.060784826 |
|---|
| stddev | 0.0009161343079816411 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://nanolx.org/fdroid/repo | | ip | 87.118.120.112 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp8rj69_tt
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437734 |
|---|
| duration | 0.9262030124664307 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:15:34 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 4978 |
|---|
| Last-Modified | Fri, 21 May 2021 19:39:16 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "60a80c64-1372" |
|---|
| Strict-Transport-Security | max-age=15768000; includeSubDomains |
|---|
| X-Powered-By | PleskLin |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | nanolx.org |
|---|
| ip | 87.118.120.112 |
|---|
| address | nanolx.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.269498379 |
|---|
| max | 0.271987619 |
|---|
| average | 0.270756021 |
|---|
| stddev | 0.0008225600152548132 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://onosendai.herokuapp.com/repo | | ip | 23.22.144.165 |
|---|
| starttime | 1770437740 |
|---|
| duration | 0.13802003860473633 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Content-Length | 548 |
|---|
| Cache-Control | no-cache, no-store |
|---|
| Content-Type | text/html; charset=utf-8 |
|---|
| Date | 2026-02-07 04:15:40.429716429 +0000 UTC |
|---|
| Server | heroku-router |
|---|
|
|---|
| tlsping | | host | onosendai.herokuapp.com |
|---|
| ip | 23.22.144.165 |
|---|
| address | onosendai.herokuapp.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.101516167 |
|---|
| max | 0.102987797 |
|---|
| average | 0.102209551 |
|---|
| stddev | 0.00048097024554955774 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://pili.qi0.de/fdroid/repo | | ip | 89.244.198.119 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp2di2gl6o
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437742 |
|---|
| duration | 1.1744041442871094 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.28.1 |
|---|
| Date | Sat, 07 Feb 2026 04:15:43 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 24904 |
|---|
| Last-Modified | Tue, 05 Aug 2025 08:01:40 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6891ba64-6148" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | pili.qi0.de |
|---|
| ip | 89.244.198.119 |
|---|
| address | pili.qi0.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.398849899 |
|---|
| max | 0.401373518 |
|---|
| average | 0.4001163313 |
|---|
| stddev | 0.0008686850300180232 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://platschi.net/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='platschi.net', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e91803fd0>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1770437756 |
|---|
| duration | 0.027837038040161133 |
|---|
| status | 200 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Server | nginx/1.28.1 |
|---|
| Date | Sat, 07 Feb 2026 04:15:43 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 24904 |
|---|
| Last-Modified | Tue, 05 Aug 2025 08:01:40 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "6891ba64-6148" |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://raw.githubusercontent.com/2br-2b/Fdroid-repo/master/fdroid/repo | | ip | 185.199.108.133 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp07ge8ywl
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437756 |
|---|
| duration | 0.44896697998046875 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 4999 |
|---|
| Cache-Control | max-age=300 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Content-Type | application/octet-stream |
|---|
| ETag | W/"070addb24bc77e917a11a8ee6ea1f3c786744d1cb98cc339fb2c6b24d782c415" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-GitHub-Request-Id | B42E:214597:3C2F3:4AC6F:6986BC7C |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Sat, 07 Feb 2026 04:15:56 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-pdk-kfty8610087-PDK |
|---|
| X-Cache | MISS |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1770437757.778233,VS0,VE53 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | f7f34ec72985e7337480ffe2ea6ebe797d21d3bf |
|---|
| Expires | Sat, 07 Feb 2026 04:20:56 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | raw.githubusercontent.com |
|---|
| ip | 185.199.109.133 |
|---|
| address | raw.githubusercontent.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.061761219 |
|---|
| max | 0.065725388 |
|---|
| average | 0.0637428135 |
|---|
| stddev | 0.0013513987925857607 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://raw.githubusercontent.com/MM2-0/fdroid/main/fdroid/repo | | ip | 185.199.108.133 |
|---|
| starttime | 1770437758 |
|---|
| duration | 0.09008312225341797 |
|---|
| status | 404 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 14 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| Content-Type | text/plain; charset=utf-8 |
|---|
| X-GitHub-Request-Id | 1310:1AFE32:31339:3F9DF:6986BC7C |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Sat, 07 Feb 2026 04:15:58 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-pdk-kfty8610022-PDK |
|---|
| X-Cache | MISS |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1770437758.181944,VS0,VE27 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | 9a923b742b6743772efc1a52981f6d8e6ad5dad5 |
|---|
| Expires | Sat, 07 Feb 2026 04:20:58 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | raw.githubusercontent.com |
|---|
| ip | 185.199.108.133 |
|---|
| address | raw.githubusercontent.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.060185088 |
|---|
| max | 0.064038437 |
|---|
| average | 0.0620877418 |
|---|
| stddev | 0.0012995760407878267 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://raw.githubusercontent.com/Tobi823/ffupdaterrepo/master/fdroid/repo | | ip | 185.199.108.133 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpufqnt3l8
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437759 |
|---|
| duration | 0.4701271057128906 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 8579 |
|---|
| Cache-Control | max-age=300 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Content-Type | application/octet-stream |
|---|
| ETag | W/"5ab32ffb61def9d7b2934061c2f42990c676a8d3547333d9097258bbf37ca087" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-GitHub-Request-Id | B3B5:163F53:81662:A3A47:6986B06F |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Sat, 07 Feb 2026 04:15:59 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-pdk-kfty8610051-PDK |
|---|
| X-Cache | HIT |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1770437759.179346,VS0,VE39 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | d2f53e66f31b0124fe145519fbd81c318a0a0f28 |
|---|
| Expires | Sat, 07 Feb 2026 04:20:59 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | raw.githubusercontent.com |
|---|
| ip | 185.199.108.133 |
|---|
| address | raw.githubusercontent.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.062949318 |
|---|
| max | 0.066344358 |
|---|
| average | 0.0646826035 |
|---|
| stddev | 0.0011802505923651345 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://raw.githubusercontent.com/chrisgch/tca/master/fdroid/repo | | ip | 185.199.108.133 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpbhrgsssa
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437760 |
|---|
| duration | 0.4174928665161133 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 12648 |
|---|
| Cache-Control | max-age=300 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Content-Type | application/octet-stream |
|---|
| ETag | W/"532beef6ea36bf714bd587f06d693b07c3aaf9ca72cb812e91b67df4cff4b1b7" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-GitHub-Request-Id | 7806:569DA:22EFBA:2C05A5:6986AB56 |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Sat, 07 Feb 2026 04:16:00 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-pdk-kfty8610023-PDK |
|---|
| X-Cache | HIT |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1770437761.572259,VS0,VE34 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | 7aa57997eb1feaa744b762a8a7bfb1a2cb5492ab |
|---|
| Expires | Sat, 07 Feb 2026 04:21:00 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | raw.githubusercontent.com |
|---|
| ip | 185.199.108.133 |
|---|
| address | raw.githubusercontent.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.061195899 |
|---|
| max | 0.064951039 |
|---|
| average | 0.062929863 |
|---|
| stddev | 0.0012878189761546456 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://raw.githubusercontent.com/oxcl/fdroid-repo-tasker/refs/heads/main/direct-purchase/fdroid/repo | | ip | 185.199.108.133 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpt9pp02hz
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437761 |
|---|
| duration | 0.4496798515319824 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 10072 |
|---|
| Cache-Control | max-age=300 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Content-Type | application/octet-stream |
|---|
| ETag | W/"24929d54f6bd34981d172429e273cbb35d3a0b4dce886939b481afba440f507e" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-GitHub-Request-Id | A430:11A698:2B89F1:36D4D4:6986BC7D |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Sat, 07 Feb 2026 04:16:01 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-pdk-kfty8610052-PDK |
|---|
| X-Cache | MISS |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1770437762.897340,VS0,VE47 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | 5239ec866c29142cec9192472e5ba525a95d13d3 |
|---|
| Expires | Sat, 07 Feb 2026 04:21:01 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | raw.githubusercontent.com |
|---|
| ip | 185.199.108.133 |
|---|
| address | raw.githubusercontent.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.061978529 |
|---|
| max | 0.065715049 |
|---|
| average | 0.06380725980000002 |
|---|
| stddev | 0.0012884285835371547 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://raw.githubusercontent.com/xarantolus/fdroid/main/fdroid/repo | | ip | 185.199.108.133 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp941_ic2p
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437763 |
|---|
| duration | 0.4693949222564697 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Connection | keep-alive |
|---|
| Content-Length | 7499 |
|---|
| Cache-Control | max-age=300 |
|---|
| Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
|---|
| Content-Type | application/octet-stream |
|---|
| ETag | W/"ef5e74f5e3b9034ea02adfc6bfc838591dd5eee4b09b8d4f296357a3e3e6bd16" |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| X-Content-Type-Options | nosniff |
|---|
| X-Frame-Options | deny |
|---|
| X-XSS-Protection | 1; mode=block |
|---|
| X-GitHub-Request-Id | B2DD:183E27:2B6EF4:36B769:6986BC82 |
|---|
| Accept-Ranges | bytes |
|---|
| Date | Sat, 07 Feb 2026 04:16:03 GMT |
|---|
| Via | 1.1 varnish |
|---|
| X-Served-By | cache-pdk-kfty8610039-PDK |
|---|
| X-Cache | MISS |
|---|
| X-Cache-Hits | 0 |
|---|
| X-Timer | S1770437763.246248,VS0,VE44 |
|---|
| Vary | Authorization,Accept-Encoding |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Cross-Origin-Resource-Policy | cross-origin |
|---|
| X-Fastly-Request-ID | 48aaa6fabd80c7eff37f49e9969e2193612953b1 |
|---|
| Expires | Sat, 07 Feb 2026 04:21:03 GMT |
|---|
| Source-Age | 0 |
|---|
|
|---|
| tlsping | | host | raw.githubusercontent.com |
|---|
| ip | 185.199.108.133 |
|---|
| address | raw.githubusercontent.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.062082509 |
|---|
| max | 0.066029428 |
|---|
| average | 0.0639304348 |
|---|
| stddev | 0.0013467982570365023 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://releases.nailyk.fr/repo | | ip | 144.76.164.24 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmplcbdkx1f
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437764 |
|---|
| duration | 0.8833279609680176 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:16:05 GMT |
|---|
| Server | Apache |
|---|
| Last-Modified | Sat, 07 Feb 2026 03:41:15 GMT |
|---|
| ETag | "1a03-64a33ad85b6b8" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 6659 |
|---|
| Content-Type | application/java-archive |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
|
|---|
| tlsping | | host | releases.nailyk.fr |
|---|
| ip | 144.76.164.24 |
|---|
| address | releases.nailyk.fr:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.27145379 |
|---|
| max | 0.378093936 |
|---|
| average | 0.3452534462 |
|---|
| stddev | 0.036616202994651695 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://releases.threema.ch/fdroid/repo | | ip | 203.56.112.72 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp1ogxltxk
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437769 |
|---|
| duration | 0.8115749359130859 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:16:09 GMT |
|---|
| Server | Apache |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Last-Modified | Tue, 09 Dec 2025 13:40:21 GMT |
|---|
| ETag | "18e2-645850d9f51a5" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 6370 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/x-java-archive |
|---|
|
|---|
| tlsping | | host | releases.threema.ch |
|---|
| ip | 203.56.112.72 |
|---|
| address | releases.threema.ch:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.422722416 |
|---|
| max | 0.527543964 |
|---|
| average | 0.49291441990000007 |
|---|
| stddev | 0.0335991969624961 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://repo.kuschku.de/repo | | ip | 148.251.132.182 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp0dhw5tbp
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437776 |
|---|
| duration | 0.8832440376281738 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:16:17 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 7678 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Wed, 03 Sep 2025 15:16:34 GMT |
|---|
| ETag | "68b85bd2-1dfe" |
|---|
| Accept-Ranges | bytes |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
|---|
|
|---|
| tlsping | | host | repo.kuschku.de |
|---|
| ip | 148.251.132.182 |
|---|
| address | repo.kuschku.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.399008454 |
|---|
| max | 0.401631465 |
|---|
| average | 0.40033370360000003 |
|---|
| stddev | 0.0008906062308138426 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://repo.mobilsicher.de/fdroid/repo | | ConnectionError | HTTPSConnectionPool(host='repo.mobilsicher.de', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e9182a150>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
|---|
| starttime | 1770437782 |
|---|
| duration | 0.2187209129333496 |
|---|
| status | 200 |
|---|
| TLS | [Errno -2] Name or service not known |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:16:17 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 7678 |
|---|
| Connection | keep-alive |
|---|
| Last-Modified | Wed, 03 Sep 2025 15:16:34 GMT |
|---|
| ETag | "68b85bd2-1dfe" |
|---|
| Accept-Ranges | bytes |
|---|
| Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://repo.netsyms.com/fdroid/repo | | ip | 104.21.39.203 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpcm10bdz9
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437782 |
|---|
| duration | 0.6790201663970947 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:16:23 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11099 |
|---|
| Connection | keep-alive |
|---|
| Server | cloudflare |
|---|
| Vary | User-Agent |
|---|
| cf-cache-status | REVALIDATED |
|---|
| Report-To | {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=b7V7NI5xyCUffPw7EPjDHl%2B2tCE%2Bkg%2BfbXb7JQynjWGZjK5g4Co2Sn65H7UgHGJvdnLTZQxdRMH9jlJ%2FfF48RtIRCh7maNEdG%2FNFLJjMU5c%3D"}]} |
|---|
| Last-Modified | Sat, 18 Nov 2023 06:40:11 GMT |
|---|
| etag | "2b5b-60a67864e3f1c" |
|---|
| Accept-Ranges | bytes |
|---|
| Nel | {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800} |
|---|
| Permissions-Policy | interest-cohort=() |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Cache-Control | max-age=14400 |
|---|
| CF-RAY | 9ca0124fdd704545-ATL |
|---|
| alt-svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | | host | repo.netsyms.com |
|---|
| ip | 104.21.39.203 |
|---|
| address | repo.netsyms.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.150406118 |
|---|
| max | 0.205907198 |
|---|
| average | 0.182545556 |
|---|
| stddev | 0.018703519367040955 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo | | starttime | 1770437784 |
|---|
| duration | 0.34667301177978516 |
|---|
| status | 403 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:16:24 GMT |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | close |
|---|
| accept-ch | Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA |
|---|
| cf-mitigated | challenge |
|---|
| critical-ch | Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA |
|---|
| cross-origin-embedder-policy | require-corp |
|---|
| cross-origin-resource-policy | same-origin |
|---|
| origin-agent-cluster | ?1 |
|---|
| permissions-policy | accelerometer=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=() |
|---|
| referrer-policy | same-origin |
|---|
| server-timing | chlray;desc="9ca0125c0b966732" |
|---|
| x-content-type-options | nosniff |
|---|
| x-frame-options | SAMEORIGIN |
|---|
| Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
|---|
| Expires | Thu, 01 Jan 1970 00:00:01 GMT |
|---|
| Report-To | {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MWxGdbkHhvkg5XJc0ez33SwDaawgx073OA5noULeHwUzE2f4i6TVoCfHglgjbAxhgfgLAtwPAcF8axg%2FAWEhq3qHHh77jg9Qql0A6RkO3E4fAS%2BAiGlJwxkyjMg%3D"}],"group":"cf-nel","max_age":604800} |
|---|
| NEL | {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800} |
|---|
| Vary | Accept-Encoding |
|---|
| Strict-Transport-Security | max-age=31536000 |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9ca0125c0b966732-ATL |
|---|
| Content-Encoding | br |
|---|
|
|---|
| tlsping | | host | rfc2822.gitlab.io |
|---|
| ip | 35.185.44.232 |
|---|
| address | rfc2822.gitlab.io:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.039386098 |
|---|
| max | 0.043652838 |
|---|
| average | 0.041471878 |
|---|
| stddev | 0.0014185458195560686 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://s2.spiritcroc.de/fdroid/repo | | ip | 23.88.107.207 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpu4fe0lpj
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437785 |
|---|
| duration | 0.935615062713623 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:16:26 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 11350 |
|---|
| Last-Modified | Mon, 22 Dec 2025 11:07:53 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "69492689-2c56" |
|---|
| Strict-Transport-Security | max-age=15768000; includeSubDomains; preload |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | s2.spiritcroc.de |
|---|
| ip | 23.88.107.207 |
|---|
| address | s2.spiritcroc.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.349472247 |
|---|
| max | 0.353500936 |
|---|
| average | 0.35179719360000006 |
|---|
| stddev | 0.0013224437111782244 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
| warnings | - Key exchange (ecdh_x25519) of lower strength than certificate key
|
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://s3.amazonaws.com/storymaker/fdroid/repo | | ip | 16.182.100.240 |
|---|
| starttime | 1770437792 |
|---|
| duration | 0.10567212104797363 |
|---|
| status | 403 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | x-amz-request-id | GA9PX9KF9ZQ48P1N |
|---|
| x-amz-id-2 | FwW14byKkJRQx79rEILLvw8sAjF9UZ8FeqlAbLLQwtsKTWClh3S0xeEGunidGsjyPKhh77VeLWE= |
|---|
| Content-Type | application/xml |
|---|
| Transfer-Encoding | chunked |
|---|
| Date | Sat, 07 Feb 2026 04:16:31 GMT |
|---|
| Server | AmazonS3 |
|---|
|
|---|
| tlsping | | host | s3.amazonaws.com |
|---|
| ip | 16.182.100.240 |
|---|
| address | s3.amazonaws.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.074654409 |
|---|
| max | 0.077663019 |
|---|
| average | 0.07614158 |
|---|
| stddev | 0.0010010714647960938 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://secfirst.org/fdroid/repo | | SSLError | HTTPSConnectionPool(host='secfirst.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)'))) |
|---|
| starttime | 1770437794 |
|---|
| duration | 0.3973088264465332 |
|---|
| status | 403 |
|---|
| TLS | [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992) |
|---|
| headers | | x-amz-request-id | GA9PX9KF9ZQ48P1N |
|---|
| x-amz-id-2 | FwW14byKkJRQx79rEILLvw8sAjF9UZ8FeqlAbLLQwtsKTWClh3S0xeEGunidGsjyPKhh77VeLWE= |
|---|
| Content-Type | application/xml |
|---|
| Transfer-Encoding | chunked |
|---|
| Date | Sat, 07 Feb 2026 04:16:31 GMT |
|---|
| Server | AmazonS3 |
|---|
|
|---|
| tlsping | None |
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://static.cryptomator.org/android/fdroid/repo | | ip | 172.67.132.219 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpl94y8jsu
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437806 |
|---|
| duration | 0.9746170043945312 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:16:47 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 6188 |
|---|
| Connection | keep-alive |
|---|
| Accept-Ranges | bytes |
|---|
| etag | "342f5a8ebdf8a77587b0b8f9095c2075" |
|---|
| last-modified | Mon, 06 Oct 2025 16:58:07 GMT |
|---|
| x-amz-id-2 | txg708a7c8c9eef4fe8ba0d-006986bcaf |
|---|
| x-amz-request-id | txg708a7c8c9eef4fe8ba0d-006986bcaf |
|---|
| Cache-Control | max-age=28800 |
|---|
| cf-cache-status | MISS |
|---|
| Nel | {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800} |
|---|
| Report-To | {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=8kGTWszmYesiAYuD%2F1LgwEr%2FnFpmQyyY0ebhrXNyvExiuGV8v5llSa35cLDDHMvsKvJLeHE7iCNx%2FK1dXZ24u9sCQ3FYKvCp9%2FBmEtCq3U5ikRQV1dQ%3D"}]} |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9ca012e469e4fc15-ATL |
|---|
| alt-svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | | host | static.cryptomator.org |
|---|
| ip | 172.67.132.219 |
|---|
| address | static.cryptomator.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.116822999 |
|---|
| max | 0.211686628 |
|---|
| average | 0.1804573111 |
|---|
| stddev | 0.027098844331432267 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://store.nethunter.com/repo | | ip | 45.33.83.228 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmprhwgmh7k
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437808 |
|---|
| duration | 0.514674186706543 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.2 |
|---|
| headers | | Server | nginx |
|---|
| Date | Sat, 07 Feb 2026 04:16:48 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 45628 |
|---|
| Last-Modified | Thu, 08 Jan 2026 12:23:24 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "695fa1bc-b23c" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | store.nethunter.com |
|---|
| ip | 45.33.83.228 |
|---|
| address | store.nethunter.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.136730209 |
|---|
| max | 0.165865378 |
|---|
| average | 0.1518010775 |
|---|
| stddev | 0.011351673320892323 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://submarine.strangled.net/fdroid/repo | | ip | 178.68.58.166 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpksq5a4fd
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437810 |
|---|
| duration | 0.8558349609375 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:16:50 GMT |
|---|
| Server | Apache/2.4.29 (Ubuntu) |
|---|
| Last-Modified | Sun, 01 Dec 2024 22:35:25 GMT |
|---|
| ETag | "1087-6283d0c58d7a9" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 4231 |
|---|
| Access-Control-Allow-Origin | * |
|---|
| Access-Control-Allow-Headers | origin, x-requested-with, content-type |
|---|
| Access-Control-Allow-Methods | PUT, GET, POST, DELETE, OPTIONS |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | submarine.strangled.net |
|---|
| ip | 178.68.58.166 |
|---|
| address | submarine.strangled.net:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.319371449 |
|---|
| max | 0.475805273 |
|---|
| average | 0.33601564279999996 |
|---|
| stddev | 0.046601891549078595 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | server |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://www.anonymousmessenger.ly/fdroid/repo | | ip | 185.176.41.167 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmptajt0blj
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437828 |
|---|
| duration | 1.2195558547973633 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | nginx/1.27.0 |
|---|
| Date | Sat, 07 Feb 2026 04:17:09 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 5581 |
|---|
| Last-Modified | Thu, 21 Jul 2022 14:06:02 GMT |
|---|
| Connection | keep-alive |
|---|
| ETag | "62d95d4a-15cd" |
|---|
| Accept-Ranges | bytes |
|---|
|
|---|
| tlsping | | host | www.anonymousmessenger.ly |
|---|
| ip | 185.176.41.167 |
|---|
| address | www.anonymousmessenger.ly:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.337833862 |
|---|
| max | 0.369365241 |
|---|
| average | 0.3555387516 |
|---|
| stddev | 0.009943051886377757 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://www.collaboraoffice.com/downloads/fdroid/repo | | ip | 157.90.115.48 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp4732eorz
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437837 |
|---|
| duration | 0.6897509098052979 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:17:17 GMT |
|---|
| Server | Apache/2.4.65 (Debian) |
|---|
| X-Content-Type-Options | nosniff |
|---|
| Strict-Transport-Security | max-age=31536000; includeSubdomains; preload |
|---|
| Referrer-Policy | strict-origin-when-cross-origin |
|---|
| Last-Modified | Sun, 01 Feb 2026 03:22:47 GMT |
|---|
| ETag | "1191-649bab8799b93" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 4497 |
|---|
| x-robots-tag | noindex |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | www.collaboraoffice.com |
|---|
| ip | 157.90.115.48 |
|---|
| address | www.collaboraoffice.com:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.266525527 |
|---|
| max | 0.269645637 |
|---|
| average | 0.268181666 |
|---|
| stddev | 0.0010400932373345203 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
| warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://www.cromite.org/fdroid/repo | | ip | 89.46.108.70 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmpl9tawgbg
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437842 |
|---|
| duration | 0.8397128582000732 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Server | aruba-proxy |
|---|
| Date | Sat, 07 Feb 2026 04:17:23 GMT |
|---|
| Content-Type | application/java-archive |
|---|
| Content-Length | 4529 |
|---|
| Connection | keep-alive |
|---|
| Cache-Control | max-age=60 |
|---|
| Last-Modified | Mon, 26 Jan 2026 07:32:08 GMT |
|---|
| Accept-Ranges | bytes |
|---|
| X-ServerName | webx.aruba.it |
|---|
| Alt-Svc | h3=":443"; ma=86400 |
|---|
|
|---|
| tlsping | | host | www.cromite.org |
|---|
| ip | 89.46.108.70 |
|---|
| address | www.cromite.org:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.266765158 |
|---|
| max | 0.270047338 |
|---|
| average | 0.268319027 |
|---|
| stddev | 0.0010911211879937978 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.2 | | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://www.droidware.info/fdroid/repo | | ip | 104.18.25.83 |
|---|
| starttime | 1770437848 |
|---|
| duration | 0.3651878833770752 |
|---|
| status | 403 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:17:28 GMT |
|---|
| Content-Type | text/html; charset=UTF-8 |
|---|
| Transfer-Encoding | chunked |
|---|
| Connection | keep-alive |
|---|
| X-Frame-Options | SAMEORIGIN |
|---|
| Referrer-Policy | same-origin |
|---|
| Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
|---|
| Expires | Thu, 01 Jan 1970 00:00:01 GMT |
|---|
| Vary | Accept-Encoding |
|---|
| Server | cloudflare |
|---|
| CF-RAY | 9ca013e8bbe39aff-ATL |
|---|
| Content-Encoding | gzip |
|---|
|
|---|
| tlsping | | host | www.droidware.info |
|---|
| ip | 104.21.89.103 |
|---|
| address | www.droidware.info:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.120880279 |
|---|
| max | 0.210746989 |
|---|
| average | 0.1897965887 |
|---|
| stddev | 0.026751509550811896 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|
| https://www.ma-nic.de/fdroid/repo | | ip | 109.250.136.217 |
|---|
| VerificationException | JAR signature failed to verify: /tmp/tmp8o95s7k2
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
|---|
| starttime | 1770437849 |
|---|
| duration | 0.7604269981384277 |
|---|
| status | 200 |
|---|
| TLS | TLSv1.3 |
|---|
| headers | | Date | Sat, 07 Feb 2026 04:17:29 GMT |
|---|
| Server | Apache/2.4.66 (Debian) |
|---|
| Last-Modified | Tue, 06 Jun 2023 16:06:08 GMT |
|---|
| ETag | "1094-5fd7832786fe5" |
|---|
| Accept-Ranges | bytes |
|---|
| Content-Length | 4244 |
|---|
| Keep-Alive | timeout=5, max=100 |
|---|
| Connection | Keep-Alive |
|---|
| Content-Type | application/java-archive |
|---|
|
|---|
| tlsping | | host | www.ma-nic.de |
|---|
| ip | 109.250.136.217 |
|---|
| address | www.ma-nic.de:443 |
|---|
| connection | TLS |
|---|
| count | 10 |
|---|
| min | 0.362222176 |
|---|
| max | 0.399504366 |
|---|
| average | 0.3790302242 |
|---|
| stddev | 0.013257870846783764 |
|---|
| error | |
|---|
|
|---|
| ssl-enum-ciphers | | TLSv1.0 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.1 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | server |
|---|
|
|---|
| TLSv1.2 | | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| compressors | |
|---|
| cipher preference | client |
|---|
|
|---|
| TLSv1.3 | | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
|---|
| cipher preference | client |
|---|
|
|---|
| least strength | A |
|---|
|
|---|
|
|---|