https://f-droid.org/repo | ip | 2a00:c6c0:0:155:1::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmph53b5vn6
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791859 |
---|
duration | 2.2227861881256104 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.22.1 |
---|
Date | Thu, 02 Jan 2025 04:24:20 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9195422 |
---|
Connection | keep-alive |
---|
Strict-Transport-Security | max-age=63072000 |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
ETag | "8c4f9e-62a7a6ffd814f" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | f-droid.org |
---|
ip | 2a00:c6c0:0:155:1::1 |
---|
address | f-droid.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.376972242 |
---|
max | 0.378008349 |
---|
average | 0.3774455599 |
---|
stddev | 0.00028730530578061514 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.tetaneutral.net/fdroid/repo | ip | 2a03:7220:8083:e600::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp9rjwublu
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791014 |
---|
duration | 2.4858250617980957 |
---|
status | 200 |
---|
TLS | TLSv1.2 |
---|
headers | Server | nginx/1.14.2 |
---|
Date | Thu, 02 Jan 2025 04:10:15 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9195422 |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Connection | keep-alive |
---|
ETag | "6772788d-8c4f9e" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | fdroid.tetaneutral.net |
---|
ip | 2a03:7220:8083:e600::1 |
---|
address | fdroid.tetaneutral.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.499033983 |
---|
max | 0.50035035 |
---|
average | 0.4996926011999999 |
---|
stddev | 0.0003654553189356619 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://ftp.agdsn.de/fdroid/repo | ip | 2a13:dd85:b00:12::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpkprpvw3h
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735790615 |
---|
duration | 2.4903669357299805 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.22.1 |
---|
Date | Thu, 02 Jan 2025 04:03:36 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9195422 |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Connection | keep-alive |
---|
ETag | "6772788d-8c4f9e" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | ftp.agdsn.de |
---|
ip | 2a13:dd85:b00:12::1 |
---|
address | ftp.agdsn.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.374236715 |
---|
max | 0.375202087 |
---|
average | 0.3749050588999999 |
---|
stddev | 0.00031251946957571857 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://ftp.fau.de/fdroid/repo | ip | 2001:638:a000:1021:21::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmplcyye_qb
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791060 |
---|
duration | 2.574547052383423 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:11:00 GMT |
---|
Server | Apache/2.4.41 (Ubuntu) |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
ETag | "8c4f9e-62a7a6ff57d40" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 9195422 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | ftp.fau.de |
---|
ip | 2001:638:a000:1021:21::1 |
---|
address | ftp.fau.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.395735389 |
---|
max | 0.397623476 |
---|
average | 0.39632499070000005 |
---|
stddev | 0.0005621464135689214 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://ftp.gwdg.de/pub/android/fdroid/repo | ip | 2a06:93c7:f0::f79 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpas6o8r_g
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735790649 |
---|
duration | 2.850335121154785 |
---|
status | 200 |
---|
TLS | TLSv1.2 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:04:09 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9195422 |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Connection | keep-alive |
---|
ETag | "6772788d-8c4f9e" |
---|
Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
---|
X-Frame-Options | SAMEORIGIN |
---|
X-Content-Type-Options | nosniff |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | ftp.gwdg.de |
---|
ip | 2a06:93c7:f0::f79 |
---|
address | ftp.gwdg.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.588148064 |
---|
max | 0.74171538 |
---|
average | 0.6245347877 |
---|
stddev | 0.05794683737991301 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|
---|
compressors | |
---|
cipher preference | indeterminate |
---|
cipher preference error | Too few ciphers supported |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|
---|
compressors | |
---|
cipher preference | indeterminate |
---|
cipher preference error | Too few ciphers supported |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://ftp.lysator.liu.se/pub/fdroid/repo | ip | 2001:6b0:17:f0a0::fd |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpoa3hcx6t
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735790660 |
---|
duration | 3.3239259719848633 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | server | nginx |
---|
date | Thu, 02 Jan 2025 04:04:21 GMT |
---|
content-type | application/java-archive |
---|
content-length | 9195422 |
---|
last-modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
etag | "6772788d-8c4f9e" |
---|
accept-ranges | bytes |
---|
|
---|
tlsping | host | ftp.lysator.liu.se |
---|
ip | 2001:6b0:17:f0a0::fd |
---|
address | ftp.lysator.liu.se:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.397793305 |
---|
max | 0.399106218 |
---|
average | 0.3985003216 |
---|
stddev | 0.0004039163867894515 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.cyberbits.eu/fdroid/repo | ip | 2001:bc8:32d7:25e::42 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpb10b8bxc
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791039 |
---|
duration | 2.339311122894287 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:10:39 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9195422 |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Connection | keep-alive |
---|
ETag | "6772788d-8c4f9e" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | mirror.cyberbits.eu |
---|
ip | 2001:bc8:32d7:25e::42 |
---|
address | mirror.cyberbits.eu:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.354523253 |
---|
max | 0.356226753 |
---|
average | 0.3555205671 |
---|
stddev | 0.0005978228216755363 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.fcix.net/fdroid/repo | ip | 2620:13b:0:1000::16 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp3wdl9kxb
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735790692 |
---|
duration | 0.8118031024932861 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.18.0 |
---|
Date | Thu, 02 Jan 2025 04:04:52 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9195422 |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Connection | keep-alive |
---|
ETag | "6772788d-8c4f9e" |
---|
Expires | Thu, 02 Jan 2025 04:09:52 GMT |
---|
Cache-Control | max-age=300 |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | mirror.fcix.net |
---|
ip | 2620:13b:0:1000::16 |
---|
address | mirror.fcix.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.100680642 |
---|
max | 0.101606621 |
---|
average | 0.1012509458 |
---|
stddev | 0.000248169853840791 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.kumi.systems/fdroid/repo | ip | 2a0d:f302:136:5e6d::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp66zgm9y3
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735790695 |
---|
duration | 4.629465818405151 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Accept-Ranges | bytes |
---|
Alt-Svc | h3=":443"; ma=2592000 |
---|
Content-Length | 9195422 |
---|
Content-Type | application/java-archive |
---|
Etag | "d6oyz5ygir5s5h38e" |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Server | Caddy |
---|
Vary | Accept-Encoding |
---|
Date | Thu, 02 Jan 2025 04:04:55 GMT |
---|
|
---|
tlsping | host | mirror.kumi.systems |
---|
ip | 2a0d:f302:111:a54::1 |
---|
address | mirror.kumi.systems:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.542535037 |
---|
max | 0.543937234 |
---|
average | 0.5432125862999999 |
---|
stddev | 0.00037609741348486737 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.level66.network/fdroid/repo | ip | 2a09:11c0:1200:210:ffff:ffff:8d62:8843 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmptghuuvo2
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735790709 |
---|
duration | 3.069603204727173 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:05:10 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9195422 |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Connection | keep-alive |
---|
ETag | "6772788d-8c4f9e" |
---|
Strict-Transport-Security | max-age=31536000; includeSubDomains |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | mirror.level66.network |
---|
ip | 2a09:11c0:1200:210:ffff:ffff:8d62:8843 |
---|
address | mirror.level66.network:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.360530151 |
---|
max | 0.362114305 |
---|
average | 0.3615053656 |
---|
stddev | 0.0004985896353010541 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.ossplanet.net/fdroid/repo | ip | 2001:e10:6840:17::70 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp66qp0s0f
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735790724 |
---|
duration | 2.9470319747924805 |
---|
status | 200 |
---|
TLS | TLSv1.2 |
---|
headers | X-Frame-Options | SAMEORIGIN |
---|
X-Content-Type-Options | nosniff |
---|
Content-Type | application/java-archive |
---|
Accept-Ranges | bytes |
---|
ETag | "929869539" |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Content-Length | 9195422 |
---|
Date | Thu, 02 Jan 2025 04:05:25 GMT |
---|
Server | lighttpd/1.4.35 |
---|
|
---|
tlsping | host | mirror.ossplanet.net |
---|
ip | 2001:e10:6840:17::70 |
---|
address | mirror.ossplanet.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.565590021 |
---|
max | 0.583390465 |
---|
average | 0.5752040986 |
---|
stddev | 0.005760180147346871 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp384r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
---|
|
---|
least strength | C |
---|
|
---|
|
---|
https://mirrors.dotsrc.org/fdroid/repo | ip | 2001:878:346::116 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpy9tom0gt
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735790753 |
---|
duration | 3.109342098236084 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.18.0 (Ubuntu) |
---|
Date | Thu, 02 Jan 2025 04:05:54 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9195422 |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Connection | keep-alive |
---|
ETag | "6772788d-8c4f9e" |
---|
X-Frame-Options | SAMEORIGIN |
---|
Referrer-Policy | strict-origin |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | mirrors.dotsrc.org |
---|
ip | 2001:878:346::116 |
---|
address | mirrors.dotsrc.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.675109503 |
---|
max | 0.692057289 |
---|
average | 0.6838563017000001 |
---|
stddev | 0.006946577723748245 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://opencolo.mm.fcix.net/fdroid/repo | ip | 2607:f358:1a:15::50 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpqa_00l54
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735790776 |
---|
duration | 0.8547530174255371 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.20.1 |
---|
Date | Thu, 02 Jan 2025 04:06:16 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9195422 |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Connection | keep-alive |
---|
ETag | "6772788d-8c4f9e" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | opencolo.mm.fcix.net |
---|
ip | 2607:f358:1a:15::50 |
---|
address | opencolo.mm.fcix.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.108245012 |
---|
max | 0.109581003 |
---|
average | 0.1087201145 |
---|
stddev | 0.00038027049337313807 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://plug-mirror.rcac.purdue.edu/fdroid/repo | ip | 2001:18e8:804:35::1337 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpfmyklenm
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791107 |
---|
duration | 1.3738970756530762 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.22.1 |
---|
Date | Thu, 02 Jan 2025 04:11:47 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9195422 |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Connection | keep-alive |
---|
ETag | "6772788d-8c4f9e" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | plug-mirror.rcac.purdue.edu |
---|
ip | 2001:18e8:804:35::1337 |
---|
address | plug-mirror.rcac.purdue.edu:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.198997003 |
---|
max | 0.201472312 |
---|
average | 0.20038587570000002 |
---|
stddev | 0.0008793049063384127 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.init7.net/fdroid/repo | ip | 2001:1620::1620 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpot_j5lnn
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735790782 |
---|
duration | 2.5537941455841064 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.22.1 |
---|
Date | Thu, 02 Jan 2025 04:06:23 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9195422 |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Connection | keep-alive |
---|
ETag | "6772788d-8c4f9e" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | mirror.init7.net |
---|
ip | 2001:1620::1620 |
---|
address | mirror.init7.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.380918878 |
---|
max | 0.381827486 |
---|
average | 0.3813103795 |
---|
stddev | 0.00029493608951914674 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.freedif.org/fdroid/repo | ConnectTimeout | HTTPSConnectionPool(host='mirror.freedif.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by ConnectTimeoutError(<urllib3.connection.HTTPSConnection object at 0x7fb843312e90>, 'Connection to mirror.freedif.org timed out. (connect timeout=60)')) |
---|
starttime | 1735790823 |
---|
duration | 60.65243911743164 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.22.1 |
---|
Date | Thu, 02 Jan 2025 04:06:23 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9195422 |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Connection | keep-alive |
---|
ETag | "6772788d-8c4f9e" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://de.freedif.org/fdroid/repo | ConnectTimeout | HTTPSConnectionPool(host='de.freedif.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by ConnectTimeoutError(<urllib3.connection.HTTPSConnection object at 0x7fb84331cd10>, 'Connection to de.freedif.org timed out. (connect timeout=60)')) |
---|
starttime | 1735790918 |
---|
duration | 60.21829581260681 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.22.1 |
---|
Date | Thu, 02 Jan 2025 04:06:23 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9195422 |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
Connection | keep-alive |
---|
ETag | "6772788d-8c4f9e" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | de.freedif.org |
---|
ip | 66.96.199.63 |
---|
address | de.freedif.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.466833835 |
---|
max | 0.765471276 |
---|
average | 0.49705361230000006 |
---|
stddev | 0.08947287647888277 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://bubu1.eu/fdroid/repo | ip | 176.9.145.28 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp5ryaalem
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791047 |
---|
duration | 2.925534963607788 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.27.2 |
---|
Date | Thu, 02 Jan 2025 04:10:48 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9206418 |
---|
Last-Modified | Fri, 22 Nov 2024 07:31:28 GMT |
---|
Connection | keep-alive |
---|
ETag | "67403350-8c7a92" |
---|
Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
---|
Referrer-Policy | strict-origin |
---|
X-Content-Type-Options | nosniff |
---|
X-XSS-Protection | 1; mode=block |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | bubu1.eu |
---|
ip | 176.9.145.28 |
---|
address | bubu1.eu:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.421294351 |
---|
max | 0.42257279 |
---|
average | 0.4219847938 |
---|
stddev | 0.0003889182933596113 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.swedneck.xyz/fdroid/repo | ConnectionError | HTTPSConnectionPool(host='fdroid.swedneck.xyz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7fb84331d290>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
---|
starttime | 1735791058 |
---|
duration | 0.19612908363342285 |
---|
status | 200 |
---|
TLS | [Errno -2] Name or service not known |
---|
headers | Server | nginx/1.27.2 |
---|
Date | Thu, 02 Jan 2025 04:10:48 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9206418 |
---|
Last-Modified | Fri, 22 Nov 2024 07:31:28 GMT |
---|
Connection | keep-alive |
---|
ETag | "67403350-8c7a92" |
---|
Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
---|
Referrer-Policy | strict-origin |
---|
X-Content-Type-Options | nosniff |
---|
X-XSS-Protection | 1; mode=block |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.jarsilio.com/fdroid/repo | ConnectionError | HTTPSConnectionPool(host='mirror.jarsilio.com', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7fb8433308d0>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
---|
starttime | 1735791082 |
---|
duration | 0.5987589359283447 |
---|
status | 200 |
---|
TLS | [Errno -2] Name or service not known |
---|
headers | Date | Thu, 02 Jan 2025 04:11:00 GMT |
---|
Server | Apache/2.4.41 (Ubuntu) |
---|
Last-Modified | Mon, 30 Dec 2024 10:40:13 GMT |
---|
ETag | "8c4f9e-62a7a6ff57d40" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 9195422 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://ftp.osuosl.org/pub/fdroid/repo | ip | 2600:3402:200:227::2 |
---|
starttime | 1735791084 |
---|
duration | 0.26603007316589355 |
---|
status | 404 |
---|
TLS | TLSv1.2 |
---|
headers | Date | Thu, 02 Jan 2025 04:11:24 GMT |
---|
Server | Apache |
---|
Content-Length | 261 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | text/html; charset=iso-8859-1 |
---|
|
---|
tlsping | host | ftp.osuosl.org |
---|
ip | 2600:3402:200:227::2 |
---|
address | ftp.osuosl.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.221518788 |
---|
max | 0.225087304 |
---|
average | 0.22354749710000005 |
---|
stddev | 0.0012597287256859273 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mirror.scd31.com/fdroid/repo | ip | 156.57.37.134 |
---|
starttime | 1735791092 |
---|
duration | 0.506803035736084 |
---|
status | 404 |
---|
TLS | TLSv1.2 |
---|
headers | Server | nginx/1.22.1 |
---|
Date | Thu, 02 Jan 2025 04:10:15 GMT |
---|
Content-Type | text/html |
---|
Transfer-Encoding | chunked |
---|
Connection | keep-alive |
---|
Content-Encoding | gzip |
---|
|
---|
tlsping | host | mirror.scd31.com |
---|
ip | 156.57.37.134 |
---|
address | mirror.scd31.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.332218306 |
---|
max | 0.334381609 |
---|
average | 0.33286272200000006 |
---|
stddev | 0.0006027513647649429 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.fi-do.io/fdroid/repo | ConnectionError | HTTPSConnectionPool(host='fdroid.fi-do.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7fb843331f50>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
---|
starttime | 1735791106 |
---|
duration | 0.06423687934875488 |
---|
status | 404 |
---|
TLS | [Errno -2] Name or service not known |
---|
headers | Server | nginx/1.22.1 |
---|
Date | Thu, 02 Jan 2025 04:10:15 GMT |
---|
Content-Type | text/html |
---|
Transfer-Encoding | chunked |
---|
Connection | keep-alive |
---|
Content-Encoding | gzip |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://android.izzysoft.de/repo | ip | 144.76.109.58 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpa9ggojck
jarsigner: java.util.zip.ZipException: zip END header not found
|
---|
starttime | 1735791111 |
---|
duration | 1.462519884109497 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:11:52 GMT |
---|
Server | Apache |
---|
Referrer-Policy | strict-origin-when-cross-origin |
---|
X-Content-Type-Options | nosniff |
---|
X-XSS-Protection | 1; mode=block |
---|
X-Frame-Options | SAMEORIGIN |
---|
Permissions-Policy | interest-cohort=() |
---|
Content-Security-Policy | base-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self'; |
---|
Strict-Transport-Security | max-age=15552000; includeSubDomains |
---|
Cache-Control | max-age=2592000 |
---|
Expires | Sat, 01 Feb 2025 04:11:52 GMT |
---|
Vary | Accept-Encoding |
---|
Content-Encoding | gzip |
---|
Content-Length | 1942 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | text/html; charset=UTF-8 |
---|
|
---|
tlsping | host | android.izzysoft.de |
---|
ip | 144.76.109.58 |
---|
address | android.izzysoft.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.4445751 |
---|
max | 0.637463416 |
---|
average | 0.48991455530000005 |
---|
stddev | 0.07393939781686483 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://anonymousmessenger.ly/fdroid/repo | ip | 185.176.41.167 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpw6uxhil2
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791120 |
---|
duration | 1.20772385597229 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.27.0 |
---|
Date | Thu, 02 Jan 2025 04:12:00 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 5581 |
---|
Last-Modified | Thu, 21 Jul 2022 14:06:02 GMT |
---|
Connection | keep-alive |
---|
ETag | "62d95d4a-15cd" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | anonymousmessenger.ly |
---|
ip | 185.176.41.167 |
---|
address | anonymousmessenger.ly:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.666591255 |
---|
max | 0.948457 |
---|
average | 0.8481252653 |
---|
stddev | 0.08699091524670152 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://app.futo.org/fdroid/repo | ip | 159.65.228.96 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp17r4vquy
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791134 |
---|
duration | 0.6915369033813477 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.22.1 |
---|
Date | Thu, 02 Jan 2025 04:12:15 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 6481 |
---|
Last-Modified | Sat, 14 Dec 2024 13:44:40 GMT |
---|
Connection | keep-alive |
---|
ETag | "675d8bc8-1951" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | app.futo.org |
---|
ip | 159.65.228.96 |
---|
address | app.futo.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.270118131 |
---|
max | 0.271085814 |
---|
average | 0.2707369187 |
---|
stddev | 0.0002496406427187097 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://app.usb0.net/repo | ip | 2606:4700:3032::ac43:9a9a |
---|
starttime | 1735791142 |
---|
duration | 0.21880006790161133 |
---|
status | 404 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:12:22 GMT |
---|
Content-Type | text/html |
---|
Transfer-Encoding | chunked |
---|
Connection | keep-alive |
---|
Cache-Control | max-age=14400 |
---|
CF-Cache-Status | MISS |
---|
Report-To | {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MNbBjfZT9uhJ1B88Q87aNEj%2BZQkAg5kej4c4vhACwy03xoOt0L2RnsgfZmTXKqChK1sN5zwFePHcNv1K2yKZLb0B%2FUR2Zl9fkYDW6h4pMTef3yWZ0BrHWplxRV5BRJL7ObJ9ddVsH%2FOJR5U%3D"}],"group":"cf-nel","max_age":604800} |
---|
NEL | {"success_fraction":0,"report_to":"cf-nel","max_age":604800} |
---|
Vary | Accept-Encoding |
---|
Server | cloudflare |
---|
CF-RAY | 8fb7e912eb613087-SEA |
---|
Content-Encoding | br |
---|
alt-svc | h3=":443"; ma=86400 |
---|
server-timing | cfL4;desc="?proto=TCP&rtt=6042&min_rtt=6005&rtt_var=2326&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2830&recv_bytes=768&delivery_rate=641802&cwnd=253&unsent_bytes=0&cid=08a7760b77b4aa02&ts=131&x=0" |
---|
|
---|
tlsping | host | app.usb0.net |
---|
ip | 2606:4700:3032::ac43:9a9a |
---|
address | app.usb0.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.170313767 |
---|
max | 0.176298584 |
---|
average | 0.1732790067 |
---|
stddev | 0.0019350455293700975 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://apt.izzysoft.de/fdroid/repo | ip | 144.76.109.58 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmppb7r9fn6
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791144 |
---|
duration | 3.428791046142578 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:12:25 GMT |
---|
Server | Apache |
---|
Referrer-Policy | strict-origin-when-cross-origin |
---|
X-Content-Type-Options | nosniff |
---|
X-XSS-Protection | 1; mode=block |
---|
X-Frame-Options | SAMEORIGIN |
---|
Permissions-Policy | interest-cohort=() |
---|
Content-Security-Policy | base-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self'; |
---|
Strict-Transport-Security | max-age=15552000; includeSubDomains |
---|
Last-Modified | Wed, 01 Jan 2025 18:38:37 GMT |
---|
ETag | "1c92f8-62aa95a93ae9a" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 1872632 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | apt.izzysoft.de |
---|
ip | 144.76.109.58 |
---|
address | apt.izzysoft.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.425390992 |
---|
max | 0.426946968 |
---|
average | 0.4260710338 |
---|
stddev | 0.00045454921230352833 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://archive.newpipe.net/fdroid/repo | ip | 2a01:4f8:231:1ec7::60:1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpswly7jzm
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791154 |
---|
duration | 1.5163929462432861 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:12:35 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 23200 |
---|
Last-Modified | Sun, 01 Dec 2024 10:15:22 GMT |
---|
Connection | keep-alive |
---|
ETag | "674c373a-5aa0" |
---|
X-Frame-Options | SAMEORIGIN |
---|
Strict-Transport-Security | max-age=31536000; includeSubDomains |
---|
X-Content-Type-Options | nosniff |
---|
X-XSS-Protection | 1; mode=block |
---|
Referrer-Policy | strict-origin |
---|
Permissions-Policy | interest-cohort=() |
---|
Content-Security-Policy | default-src 'self'; object-src 'none'; block-all-mixed-content |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | archive.newpipe.net |
---|
ip | 2a01:4f8:231:1ec7::60:1 |
---|
address | archive.newpipe.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.435767031 |
---|
max | 0.44619061 |
---|
average | 0.4408553827 |
---|
stddev | 0.004157067643554931 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://briarproject.org/fdroid/repo | ip | 157.90.23.135 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpb88o3gjo
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791194 |
---|
duration | 1.1284818649291992 |
---|
status | 200 |
---|
TLS | TLSv1.2 |
---|
headers | Server | nginx/1.14.2 |
---|
Date | Thu, 02 Jan 2025 04:13:14 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 4183 |
---|
Last-Modified | Sat, 31 Aug 2024 21:10:57 GMT |
---|
Connection | keep-alive |
---|
ETag | "66d386e1-1057" |
---|
Strict-Transport-Security | max-age=31536000; includeSubDomains |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | briarproject.org |
---|
ip | 157.90.23.135 |
---|
address | briarproject.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.572786526 |
---|
max | 0.578239047 |
---|
average | 0.5764866329 |
---|
stddev | 0.0018347190327842146 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://bubu1.eu/fdroidclassic/fdroid/repo | ip | 176.9.145.28 |
---|
VerificationException | The repository's fingerprint does not match. |
---|
starttime | 1735791214 |
---|
duration | 1.175347089767456 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.27.2 |
---|
Date | Thu, 02 Jan 2025 04:13:34 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 9793 |
---|
Last-Modified | Wed, 08 Mar 2023 23:22:24 GMT |
---|
Connection | keep-alive |
---|
ETag | "640918b0-2641" |
---|
Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
---|
Referrer-Policy | strict-origin |
---|
X-Content-Type-Options | nosniff |
---|
X-XSS-Protection | 1; mode=block |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | bubu1.eu |
---|
ip | 176.9.145.28 |
---|
address | bubu1.eu:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.420786796 |
---|
max | 0.422268802 |
---|
average | 0.42151384329999997 |
---|
stddev | 0.00045221590426587876 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://calyxos.gitlab.io/calyx-fdroid-repo/fdroid/repo | ip | 2600:1901:0:7b8a:: |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp7lr_96m2
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791222 |
---|
duration | 0.5314939022064209 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Cache-Control | max-age=600 |
---|
Content-Length | 6860 |
---|
Content-Type | application/java-archive |
---|
Etag | "f22eb27e6e77846e56622c2b1e1cf690d12ed1d2e1325592df050e9857d5f818" |
---|
Expires | Thu, 02 Jan 2025 04:23:43 UTC |
---|
Last-Modified | Thu, 02 Jan 2025 04:01:30 GMT |
---|
Permissions-Policy | interest-cohort=() |
---|
Vary | Origin |
---|
X-Request-Id | 01JGJKG8C9QGNNDGVZBWXM3MFV |
---|
Date | Thu, 02 Jan 2025 04:13:43 GMT |
---|
|
---|
tlsping | host | calyxos.gitlab.io |
---|
ip | 2600:1901:0:7b8a:: |
---|
address | calyxos.gitlab.io:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.139011242 |
---|
max | 0.140288445 |
---|
average | 0.1396722018 |
---|
stddev | 0.0003771345270308199 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://cdn.kde.org/android/fdroid/repo | ip | 2a02:6ea0:d800::6 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpne1htac2
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791226 |
---|
duration | 1.0043771266937256 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:13:47 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 153239 |
---|
Connection | keep-alive |
---|
Last-Modified | Wed, 01 Jan 2025 17:28:38 GMT |
---|
Cache-Control | max-age=0 |
---|
Expires | Thu, 02 Jan 2025 04:13:46 GMT |
---|
Strict-Transport-Security | max-age=15768000 |
---|
Referrer-Policy | strict-origin-when-cross-origin |
---|
X-XSS-Protection | 1; mode=block |
---|
X-Content-Type-Options | nosniff |
---|
X-Frame-Options | sameorigin |
---|
Permissions-Policy | interest-cohort=() |
---|
X-77-NZT | EwgB1GYuAwEhCAG5tA0IASEIAVm7sRgBIQ |
---|
X-77-NZT-Ray | c4d6692f333938197a127667eb996228 |
---|
X-77-Cache | MISS |
---|
Server | CDN77-Turbo |
---|
X-77-POP | seattleUSWA |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | cdn.kde.org |
---|
ip | 2a02:6ea0:d800::6 |
---|
address | cdn.kde.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.119283741 |
---|
max | 0.119961361 |
---|
average | 0.11957430120000001 |
---|
stddev | 0.00019828683453310846 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://cdn.kde.org/android/stable-releases/fdroid/repo | ip | 2a02:6ea0:c600::25 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpm6vhd6yt
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791229 |
---|
duration | 1.28531813621521 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:13:49 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 76390 |
---|
Connection | keep-alive |
---|
Last-Modified | Wed, 01 Jan 2025 13:35:04 GMT |
---|
Cache-Control | max-age=0 |
---|
Expires | Thu, 02 Jan 2025 04:13:49 GMT |
---|
Strict-Transport-Security | max-age=15768000 |
---|
Referrer-Policy | strict-origin-when-cross-origin |
---|
X-XSS-Protection | 1; mode=block |
---|
X-Content-Type-Options | nosniff |
---|
X-Frame-Options | sameorigin |
---|
Permissions-Policy | interest-cohort=() |
---|
X-77-NZT | EwgBWbu0WwEhCAFZu7cRASEIAZySO+IBIQ |
---|
X-77-NZT-Ray | c029d6294f3706dfa21276677c49751c |
---|
X-77-Cache | MISS |
---|
Server | CDN77-Turbo |
---|
X-77-POP | chicagoUSIL |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | cdn.kde.org |
---|
ip | 2a02:6ea0:d800::6 |
---|
address | cdn.kde.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.108414284 |
---|
max | 0.109240611 |
---|
average | 0.10869227659999998 |
---|
stddev | 0.0002482487027519786 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://codeberg.org/florian-obernberger/fdroid-repo/raw/branch/main/repo | ip | 2001:67c:1401:20f0::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp9jxn2_4b
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791234 |
---|
duration | 0.8205142021179199 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | access-control-expose-headers | Content-Disposition |
---|
cache-control | private, max-age=300 |
---|
content-disposition | inline; filename="index-v1.jar"; filename*=UTF-8''index-v1.jar |
---|
content-length | 6625 |
---|
content-type | application/octet-stream |
---|
etag | "ab1dd48e83fa124702d9c8f6801ee6a9ec2060cb" |
---|
last-modified | Sun, 20 Oct 2024 13:08:07 GMT |
---|
no-gzip-compression | 1 |
---|
set-cookie | i_like_gitea=f0b219f2fec37716; Path=/; HttpOnly; Secure; SameSite=Lax; Secure; SameSite=Lax, _csrf=zIQX2dJ_2lEwvmR16RStNsiK_X46MTczNTc5MTIzNTEwNzgyNTc0Ng; Path=/; Max-Age=86400; HttpOnly; Secure; SameSite=Lax; Secure; SameSite=Lax |
---|
date | Thu, 02 Jan 2025 04:13:55 GMT |
---|
strict-transport-security | max-age=63072000; includeSubDomains; preload |
---|
permissions-policy | interest-cohort=() |
---|
x-frame-options | sameorigin |
---|
x-content-type-options | nosniff |
---|
|
---|
tlsping | host | codeberg.org |
---|
ip | 2001:67c:1401:20f0::1 |
---|
address | codeberg.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.398455558 |
---|
max | 0.399980144 |
---|
average | 0.39949146720000006 |
---|
stddev | 0.0004373933203618491 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://divestos.org/apks/official/fdroid/repo | ip | 2605:4840:3:83f7:: |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpna5vkqpc
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791241 |
---|
duration | 0.5691168308258057 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:14:01 GMT |
---|
Server | Apache |
---|
Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
---|
Upgrade | h2 |
---|
Connection | Upgrade, Keep-Alive |
---|
Last-Modified | Wed, 25 Dec 2024 19:38:10 GMT |
---|
ETag | "2c26-62a1d5eab1c51" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 11302 |
---|
Onion-Location | http://2ceyag7ppvhliszes2v25n5lmpwhzqrc7sv72apqka6hwggfi42y2uid.onion/apks/official/fdroid/repo/index-v1.jar |
---|
Cache-Control | max-age=10800 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | divestos.org |
---|
ip | 2605:4840:3:83f7:: |
---|
address | divestos.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.201010215 |
---|
max | 0.201932461 |
---|
average | 0.20146776160000002 |
---|
stddev | 0.0003072619773965576 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://divestos.org/apks/unofficial/fdroid/repo | ip | 2605:4840:3:83f7:: |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp866x1uib
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791245 |
---|
duration | 0.5821571350097656 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:14:06 GMT |
---|
Server | Apache |
---|
Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
---|
Upgrade | h2 |
---|
Connection | Upgrade, Keep-Alive |
---|
Last-Modified | Wed, 25 Dec 2024 19:38:13 GMT |
---|
ETag | "1c83-62a1d5ecfa00c" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 7299 |
---|
Onion-Location | http://2ceyag7ppvhliszes2v25n5lmpwhzqrc7sv72apqka6hwggfi42y2uid.onion/apks/unofficial/fdroid/repo/index-v1.jar |
---|
Cache-Control | max-age=10800 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | divestos.org |
---|
ip | 2605:4840:3:83f7:: |
---|
address | divestos.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.20721983 |
---|
max | 0.207979899 |
---|
average | 0.2077265015 |
---|
stddev | 0.00023429552648749008 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://eutopia.cz/experimental/fdroid/repo | SSLError | HTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /experimental/fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'"))) |
---|
starttime | 1735791250 |
---|
duration | 60.66376805305481 |
---|
status | 200 |
---|
TLS | [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992) |
---|
headers | Date | Thu, 02 Jan 2025 04:14:06 GMT |
---|
Server | Apache |
---|
Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
---|
Upgrade | h2 |
---|
Connection | Upgrade, Keep-Alive |
---|
Last-Modified | Wed, 25 Dec 2024 19:38:13 GMT |
---|
ETag | "1c83-62a1d5ecfa00c" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 7299 |
---|
Onion-Location | http://2ceyag7ppvhliszes2v25n5lmpwhzqrc7sv72apqka6hwggfi42y2uid.onion/apks/unofficial/fdroid/repo/index-v1.jar |
---|
Cache-Control | max-age=10800 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://eutopia.cz/fdroid/repo | SSLError | HTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'"))) |
---|
starttime | 1735791453 |
---|
duration | 60.58397102355957 |
---|
status | 200 |
---|
TLS | [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992) |
---|
headers | Date | Thu, 02 Jan 2025 04:14:06 GMT |
---|
Server | Apache |
---|
Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
---|
Upgrade | h2 |
---|
Connection | Upgrade, Keep-Alive |
---|
Last-Modified | Wed, 25 Dec 2024 19:38:13 GMT |
---|
ETag | "1c83-62a1d5ecfa00c" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 7299 |
---|
Onion-Location | http://2ceyag7ppvhliszes2v25n5lmpwhzqrc7sv72apqka6hwggfi42y2uid.onion/apks/unofficial/fdroid/repo/index-v1.jar |
---|
Cache-Control | max-age=10800 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://f-droid.i2p.io/repo | ConnectTimeout | HTTPSConnectionPool(host='f-droid.i2p.io', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by ConnectTimeoutError(<urllib3.connection.HTTPSConnection object at 0x7fb843362450>, 'Connection to f-droid.i2p.io timed out. (connect timeout=60)')) |
---|
starttime | 1735791654 |
---|
duration | 60.27726197242737 |
---|
status | 200 |
---|
TLS | [Errno 110] Connection timed out |
---|
headers | Date | Thu, 02 Jan 2025 04:14:06 GMT |
---|
Server | Apache |
---|
Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
---|
Upgrade | h2 |
---|
Connection | Upgrade, Keep-Alive |
---|
Last-Modified | Wed, 25 Dec 2024 19:38:13 GMT |
---|
ETag | "1c83-62a1d5ecfa00c" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 7299 |
---|
Onion-Location | http://2ceyag7ppvhliszes2v25n5lmpwhzqrc7sv72apqka6hwggfi42y2uid.onion/apks/unofficial/fdroid/repo/index-v1.jar |
---|
Cache-Control | max-age=10800 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://f-droid.monerujo.io/fdroid/repo | ip | 2600:1901:0:7b8a:: |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp1vh5d9_p
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791855 |
---|
duration | 0.6684820652008057 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Cache-Control | max-age=600 |
---|
Content-Length | 7468 |
---|
Content-Type | application/java-archive |
---|
Etag | "b991b2a56a8a848b7ec1b0eee379a752f9ac04c4e3a3042b5905db855a7d3dde" |
---|
Expires | Thu, 02 Jan 2025 04:34:16 UTC |
---|
Last-Modified | Fri, 08 Nov 2024 22:44:16 GMT |
---|
Permissions-Policy | interest-cohort=() |
---|
Vary | Origin |
---|
X-Request-Id | 01JGJM3JJD854PXP74GGED080C |
---|
Date | Thu, 02 Jan 2025 04:24:16 GMT |
---|
|
---|
tlsping | host | f-droid.monerujo.io |
---|
ip | 2600:1901:0:7b8a:: |
---|
address | f-droid.monerujo.io:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.145705344 |
---|
max | 0.14697157 |
---|
average | 0.146493392 |
---|
stddev | 0.00046446019970521095 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.a3.pm/seabear/repo | ip | 2606:4700:3031::6815:4e6b |
---|
starttime | 1735791875 |
---|
duration | 6.426132917404175 |
---|
status | 523 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:24:41 GMT |
---|
Content-Type | text/html; charset=UTF-8 |
---|
Content-Length | 7026 |
---|
Connection | keep-alive |
---|
Report-To | {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MPZBurAPVLYT3%2BcI5yi7FJzoYS0snoYaGowh1rKxtZdgbcz5EYxMGVUeBCr%2Bk997vn91w4D6vEkMPHOGbzeK99R3WnyUJJCTleC0%2Bnf5SJDRI6GaB5cge0r%2FMg59E%2FF%2F%2F%2F49CVrdvUDn%2FMg%3D"}],"group":"cf-nel","max_age":604800} |
---|
NEL | {"success_fraction":0,"report_to":"cf-nel","max_age":604800} |
---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
---|
X-Content-Type-Options | nosniff |
---|
X-Frame-Options | SAMEORIGIN |
---|
Referrer-Policy | same-origin |
---|
Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
---|
Expires | Thu, 01 Jan 1970 00:00:01 GMT |
---|
Server | cloudflare |
---|
CF-RAY | 8fb7faf4acba307e-SEA |
---|
alt-svc | h3=":443"; ma=86400 |
---|
server-timing | cfL4;desc="?proto=TCP&rtt=5962&min_rtt=5958&rtt_var=2244&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2820&recv_bytes=776&delivery_rate=674337&cwnd=253&unsent_bytes=0&cid=02e1a30432fde420&ts=6300&x=0" |
---|
|
---|
tlsping | host | fdroid.a3.pm |
---|
ip | 2606:4700:3031::ac43:dc60 |
---|
address | fdroid.a3.pm:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.137701282 |
---|
max | 0.141369425 |
---|
average | 0.139438003 |
---|
stddev | 0.0011095704909806323 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.1 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.beocode.eu/fdroid/repo | ip | 86.48.5.219 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp281x2_z_
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791882 |
---|
duration | 1.0076148509979248 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:24:43 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 10560 |
---|
Last-Modified | Wed, 12 Apr 2023 20:00:57 GMT |
---|
Connection | keep-alive |
---|
ETag | "64370df9-2940" |
---|
Strict-Transport-Security | max-age=63072000; includeSubdomains; preload |
---|
X-Content-Type-Options | nosniff |
---|
X-XSS-Protection | 1; mode=block |
---|
X-Robots-Tag | none |
---|
X-Download-Options | noopen |
---|
X-Permitted-Cross-Domain-Policies | none |
---|
Referrer-Policy | no-referrer |
---|
X-Frame-Options | SAMEORIGIN |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | fdroid.beocode.eu |
---|
ip | 86.48.5.219 |
---|
address | fdroid.beocode.eu:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.59243164 |
---|
max | 0.593154648 |
---|
average | 0.5928154541999999 |
---|
stddev | 0.0001932758716714499 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp521r1) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp521r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp521r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.bromite.org/fdroid/repo | ip | 2001:4b98:dc0:43:216:3eff:fe76:45d2 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpb2akjqfz
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791891 |
---|
duration | 0.9400138854980469 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:24:51 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 14302 |
---|
Last-Modified | Mon, 19 Dec 2022 21:09:36 GMT |
---|
Connection | keep-alive |
---|
ETag | "63a0d310-37de" |
---|
Server | Apache/2.4.9 (Unix) |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | fdroid.bromite.org |
---|
ip | 2001:4b98:dc0:43:216:3eff:fe76:45d2 |
---|
address | fdroid.bromite.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.337378218 |
---|
max | 0.338468695 |
---|
average | 0.3377395907 |
---|
stddev | 0.0003691299528532015 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.cgeo.org/fdroid/repo | ip | 2a01:4f8:c012:6483::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpqetz6a3s
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791897 |
---|
duration | 1.2236120700836182 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | accept-ranges | bytes |
---|
content-type | application/java-archive |
---|
date | Thu, 02 Jan 2025 04:24:58 GMT |
---|
etag | "674cb421-14f3" |
---|
last-modified | Sun, 01 Dec 2024 19:08:17 GMT |
---|
server | nginx/1.25.3 |
---|
content-length | 5363 |
---|
|
---|
tlsping | host | fdroid.cgeo.org |
---|
ip | 2a01:4f8:c012:6483::1 |
---|
address | fdroid.cgeo.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.38855066 |
---|
max | 0.448927517 |
---|
average | 0.4028315645999999 |
---|
stddev | 0.022148863849024265 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - Key exchange (dh 2048) of lower strength than certificate key
- Key exchange (ecdh_x25519) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.coperhead.co/repo | ConnectionError | HTTPSConnectionPool(host='fdroid.coperhead.co', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7fb843369410>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
---|
starttime | 1735791908 |
---|
duration | 0.0760190486907959 |
---|
status | 200 |
---|
TLS | [Errno -2] Name or service not known |
---|
headers | accept-ranges | bytes |
---|
content-type | application/java-archive |
---|
date | Thu, 02 Jan 2025 04:24:58 GMT |
---|
etag | "674cb421-14f3" |
---|
last-modified | Sun, 01 Dec 2024 19:08:17 GMT |
---|
server | nginx/1.25.3 |
---|
content-length | 5363 |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - Key exchange (dh 2048) of lower strength than certificate key
- Key exchange (ecdh_x25519) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.fedilab.app/repo | ip | 2001:41d0:1:7554::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpjay0in8q
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791909 |
---|
duration | 1.0021049976348877 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:25:09 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 34373 |
---|
Last-Modified | Thu, 21 Mar 2024 17:09:43 GMT |
---|
Connection | keep-alive |
---|
ETag | "65fc69d7-8645" |
---|
Referrer-Policy | no-referrer |
---|
X-Frame-Options | deny |
---|
X-Content-Type-Options | nosniff |
---|
Permissions-Policy | interest-cohort=() |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | fdroid.fedilab.app |
---|
ip | 2001:41d0:1:7554::1 |
---|
address | fdroid.fedilab.app:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.340650374 |
---|
max | 0.341879839 |
---|
average | 0.3412857530000001 |
---|
stddev | 0.0004183326291409841 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.frostnerd.com/fdroid/repo | ip | 2a0a:4cc0:80:23a4:643f:2dff:fe65:f9ef |
---|
starttime | 1735791917 |
---|
duration | 0.6901140213012695 |
---|
status | 404 |
---|
TLS | TLSv1.3 |
---|
headers | Alt-Svc | h3=":443"; ma=2592000 |
---|
Expect-Ct | max-age=86400, enforce |
---|
Feature-Policy | microphone 'none'; camera 'none' |
---|
Permissions-Policy | camera=(), geolocation=(), microphone=(), interest-cohort=() |
---|
Referrer-Policy | same-origin |
---|
Server | Caddy |
---|
Strict-Transport-Security | max-age=31536000 |
---|
X-Content-Type-Options | nosniff |
---|
X-Frame-Options | sameorigin |
---|
X-Xss-Protection | 0 |
---|
Date | Thu, 02 Jan 2025 04:25:17 GMT |
---|
Content-Length | 0 |
---|
|
---|
tlsping | host | fdroid.frostnerd.com |
---|
ip | 2a0a:4cc0:80:23a4:643f:2dff:fe65:f9ef |
---|
address | fdroid.frostnerd.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.418159664 |
---|
max | 0.419037294 |
---|
average | 0.4185773436 |
---|
stddev | 0.00027795337043943987 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.i2pd.xyz/fdroid/repo | ip | 2001:470:1f13:e56::4 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpmszksiik
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791924 |
---|
duration | 1.110548973083496 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:25:25 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 36107 |
---|
Last-Modified | Tue, 31 Dec 2024 22:19:06 GMT |
---|
Connection | keep-alive |
---|
ETag | "67746dda-8d0b" |
---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
---|
X-Frame-Options | SAMEORIGIN |
---|
X-Xss-Protection | 1; mode=block |
---|
X-Content-Type-Options | nosniff |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | fdroid.i2pd.xyz |
---|
ip | 2001:470:1f13:e56::4 |
---|
address | fdroid.i2pd.xyz:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.338571613 |
---|
max | 0.339874906 |
---|
average | 0.3390747575 |
---|
stddev | 0.00035630748001922233 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp521r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp521r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.koyu.space/fdroid/repo | SSLError | HTTPSConnectionPool(host='fdroid.koyu.space', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLError(1, '[SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992)'))) |
---|
starttime | 1735791938 |
---|
duration | 0.5889029502868652 |
---|
status | 200 |
---|
TLS | [SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992) |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:25:25 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 36107 |
---|
Last-Modified | Tue, 31 Dec 2024 22:19:06 GMT |
---|
Connection | keep-alive |
---|
ETag | "67746dda-8d0b" |
---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
---|
X-Frame-Options | SAMEORIGIN |
---|
X-Xss-Protection | 1; mode=block |
---|
X-Content-Type-Options | nosniff |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.3 | ciphers | - TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.krombel.de/riot-dev-fdroid/fdroid/repo | ip | 2a02:c207:3004:2744::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpt5ij5kiy
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791944 |
---|
duration | 1.0890491008758545 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:25:44 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 4315 |
---|
Last-Modified | Thu, 01 Aug 2019 17:05:29 GMT |
---|
Connection | keep-alive |
---|
ETag | "5d431bd9-10db" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | fdroid.krombel.de |
---|
ip | 2a02:c207:3004:2744::1 |
---|
address | fdroid.krombel.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.574904309 |
---|
max | 0.597441346 |
---|
average | 0.5785408319 |
---|
stddev | 0.006811154235727703 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.krombel.de/riot-stable/fdroid/repo | ip | 2a02:c207:3004:2744::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpbkx0etku
jarsigner: java.util.zip.ZipException: zip END header not found
|
---|
starttime | 1735791953 |
---|
duration | 1.03397798538208 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:25:53 GMT |
---|
Content-Type | text/html |
---|
Content-Length | 45 |
---|
Last-Modified | Wed, 17 Apr 2019 21:22:15 GMT |
---|
Connection | keep-alive |
---|
ETag | "5cb79907-2d" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | fdroid.krombel.de |
---|
ip | 2a02:c207:3004:2744::1 |
---|
address | fdroid.krombel.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.583805343 |
---|
max | 0.584802164 |
---|
average | 0.5842135417 |
---|
stddev | 0.00029571808323099245 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.libretro.com/repo | ip | 5.9.202.202 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp1keb0hiq
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791961 |
---|
duration | 1.0293951034545898 |
---|
status | 200 |
---|
TLS | TLSv1.2 |
---|
headers | Content-Type | application/java-archive |
---|
Accept-Ranges | bytes |
---|
ETag | "1711916461" |
---|
Last-Modified | Wed, 18 Nov 2020 10:48:50 GMT |
---|
Content-Length | 5595 |
---|
Date | Thu, 02 Jan 2025 04:26:01 GMT |
---|
Server | lighttpd/1.4.35 |
---|
|
---|
tlsping | host | fdroid.libretro.com |
---|
ip | 5.9.202.202 |
---|
address | fdroid.libretro.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.588658615 |
---|
max | 0.591393851 |
---|
average | 0.5902255801000001 |
---|
stddev | 0.0007879940939285465 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
- Key exchange (dh 1024) of lower strength than certificate key
|
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
- Key exchange (dh 1024) of lower strength than certificate key
|
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
- Key exchange (dh 1024) of lower strength than certificate key
|
---|
|
---|
least strength | D |
---|
|
---|
|
---|
https://fdroid.metatransapps.com/fdroid/repo | ip | 49.12.195.92 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpbmsspr9b
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735791987 |
---|
duration | 1.5600390434265137 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:26:28 GMT |
---|
Server | Apache/2.4.48 (Debian) |
---|
Permissions-Policy | interest-cohort=() |
---|
X-XSS-Protection | 1; mode=block |
---|
X-Frame-Options | SAMEORIGIN |
---|
X-Content-Type-Options | nosniff |
---|
Referrer-Policy | strict-origin-when-cross-origin |
---|
Content-Security-Policy | base-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content; |
---|
Strict-Transport-Security | max-age=15552000 |
---|
Last-Modified | Sun, 13 Oct 2024 00:41:20 GMT |
---|
ETag | "d3f6-62450fa9042bf" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 54262 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | fdroid.metatransapps.com |
---|
ip | 49.12.195.92 |
---|
address | fdroid.metatransapps.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.415347229 |
---|
max | 0.416796409 |
---|
average | 0.4161638353 |
---|
stddev | 0.0004774935255829311 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.nordgedanken.dev/repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo | ConnectionError | HTTPSConnectionPool(host='fdroid.nordgedanken.dev', port=443): Max retries exceeded with url: /repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7fb8433609d0>: Failed to establish a new connection: [Errno -5] No address associated with hostname')) |
---|
starttime | 1735792000 |
---|
duration | 0.09462690353393555 |
---|
status | 200 |
---|
TLS | [Errno -5] No address associated with hostname |
---|
headers | Date | Thu, 02 Jan 2025 04:26:28 GMT |
---|
Server | Apache/2.4.48 (Debian) |
---|
Permissions-Policy | interest-cohort=() |
---|
X-XSS-Protection | 1; mode=block |
---|
X-Frame-Options | SAMEORIGIN |
---|
X-Content-Type-Options | nosniff |
---|
Referrer-Policy | strict-origin-when-cross-origin |
---|
Content-Security-Policy | base-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content; |
---|
Strict-Transport-Security | max-age=15552000 |
---|
Last-Modified | Sun, 13 Oct 2024 00:41:20 GMT |
---|
ETag | "d3f6-62450fa9042bf" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 54262 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.partidopirata.com.ar/fdroid/repo | ip | 151.236.30.90 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpslntp8wk
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792001 |
---|
duration | 0.9557559490203857 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.26.1 |
---|
Date | Thu, 02 Jan 2025 04:26:45 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 5211 |
---|
Last-Modified | Tue, 07 Jun 2022 01:05:55 GMT |
---|
Connection | keep-alive |
---|
ETag | "629ea473-145b" |
---|
Cache-Control | no-cache |
---|
Access-Control-Allow-Origin | *.partidopirata.com.ar |
---|
Strict-Transport-Security | max-age=15552000; includeSubDomains; preload |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | fdroid.partidopirata.com.ar |
---|
ip | 151.236.30.90 |
---|
address | fdroid.partidopirata.com.ar:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.40053425 |
---|
max | 0.409660582 |
---|
average | 0.40207601400000004 |
---|
stddev | 0.00274947878212919 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.pixelfed.net/fdroid/repo | ip | 165.227.195.166 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp2d8wec3z
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792017 |
---|
duration | 0.5498929023742676 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:26:57 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 3920 |
---|
Last-Modified | Wed, 02 Oct 2024 10:17:12 GMT |
---|
Connection | keep-alive |
---|
ETag | "66fd1da8-f50" |
---|
X-Frame-Options | SAMEORIGIN |
---|
X-XSS-Protection | 1; mode=block |
---|
X-Content-Type-Options | nosniff |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | fdroid.pixelfed.net |
---|
ip | 165.227.195.166 |
---|
address | fdroid.pixelfed.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.24917142 |
---|
max | 0.259960242 |
---|
average | 0.25574700289999996 |
---|
stddev | 0.003203742877192844 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.rakshazi.me/repo | ConnectionError | HTTPSConnectionPool(host='fdroid.rakshazi.me', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7fb8464f0650>: Failed to establish a new connection: [Errno -5] No address associated with hostname')) |
---|
starttime | 1735792021 |
---|
duration | 0.6405889987945557 |
---|
status | 200 |
---|
TLS | [Errno -5] No address associated with hostname |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:26:57 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 3920 |
---|
Last-Modified | Wed, 02 Oct 2024 10:17:12 GMT |
---|
Connection | keep-alive |
---|
ETag | "66fd1da8-f50" |
---|
X-Frame-Options | SAMEORIGIN |
---|
X-XSS-Protection | 1; mode=block |
---|
X-Content-Type-Options | nosniff |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.rami.io/fdroid/repo | ConnectionError | HTTPSConnectionPool(host='fdroid.rami.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7fb8465059d0>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
---|
starttime | 1735792023 |
---|
duration | 0.07231998443603516 |
---|
status | 200 |
---|
TLS | [Errno -2] Name or service not known |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:26:57 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 3920 |
---|
Last-Modified | Wed, 02 Oct 2024 10:17:12 GMT |
---|
Connection | keep-alive |
---|
ETag | "66fd1da8-f50" |
---|
X-Frame-Options | SAMEORIGIN |
---|
X-XSS-Protection | 1; mode=block |
---|
X-Content-Type-Options | nosniff |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroid.tagesschau.de/repo | ip | 34.160.251.4 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpxo_rj5g1
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792023 |
---|
duration | 0.844027042388916 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | X-GUploader-UploadID | AFiumC4oJYezAdIkkJ8lYScn9TyTd5w0YZ2GVK_fD_rH3cn3WFeWlF1thOV5wUu8xc3gYOLxcjbD4E8 |
---|
Expires | Thu, 02 Jan 2025 05:27:04 GMT |
---|
Date | Thu, 02 Jan 2025 04:27:04 GMT |
---|
Cache-Control | public, max-age=3600 |
---|
Last-Modified | Thu, 21 Nov 2024 12:56:56 GMT |
---|
ETag | "ebad3d73f0a25ae59ae4d1d262185a20" |
---|
x-goog-generation | 1732193816386935 |
---|
x-goog-metageneration | 1 |
---|
x-goog-stored-content-encoding | identity |
---|
x-goog-stored-content-length | 5405 |
---|
x-goog-meta-goog-reserved-file-mtime | 1732193788 |
---|
Content-Type | application/octet-stream |
---|
x-goog-hash | crc32c=8WpG5w==, md5=6609c/CiWuWa5NHSYhhaIA== |
---|
x-goog-storage-class | STANDARD |
---|
Accept-Ranges | bytes |
---|
Content-Length | 5405 |
---|
Server | UploadServer |
---|
Alt-Svc | h3=":443"; ma=2592000,h3-29=":443"; ma=2592000 |
---|
|
---|
tlsping | host | fdroid.tagesschau.de |
---|
ip | 34.160.251.4 |
---|
address | fdroid.tagesschau.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.064364953 |
---|
max | 0.065561489 |
---|
average | 0.0651490328 |
---|
stddev | 0.00038246100865808386 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - 64-bit block cipher 3DES vulnerable to SWEET32 attack
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | C |
---|
|
---|
|
---|
https://fdroid.videlibri.de/repo | ip | 95.143.172.218 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp45xmbhej
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792025 |
---|
duration | 4.396749019622803 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:27:09 GMT |
---|
Content-Type | application/x-java-archive |
---|
Content-Length | 6640 |
---|
Connection | keep-alive |
---|
Server | nginx |
---|
Last-Modified | Mon, 23 Dec 2024 19:31:02 GMT |
---|
ETag | "19f0-629f50972f1f4" |
---|
Accept-Ranges | bytes |
---|
X-Xss-Protection | 1; mode=block |
---|
X-Frame-Options | SAMEORIGIN |
---|
Strict-Transport-Security | max-age=31536000 |
---|
X-Content-Type-Options | nosniff |
---|
Referrer-Policy | strict-origin-when-cross-origin |
---|
|
---|
tlsping | host | fdroid.videlibri.de |
---|
ip | 95.143.172.218 |
---|
address | fdroid.videlibri.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.566035343 |
---|
max | 0.567034425 |
---|
average | 0.5665000777 |
---|
stddev | 0.00030895782648931796 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://fdroidfamily.codeberg.page/repo | ip | 2001:67c:1401:20f0::1 |
---|
starttime | 1735792041 |
---|
duration | 1.1062970161437988 |
---|
status | 404 |
---|
TLS | TLSv1.3 |
---|
headers | Allow | GET, HEAD, OPTIONS |
---|
Cache-Control | public, max-age=600 |
---|
Content-Type | text/html; charset=utf-8 |
---|
Referrer-Policy | strict-origin-when-cross-origin |
---|
Server | pages-server |
---|
Strict-Transport-Security | max-age=63072000; includeSubdomains; preload |
---|
Date | Thu, 02 Jan 2025 04:27:22 GMT |
---|
Transfer-Encoding | chunked |
---|
|
---|
tlsping | host | fdroidfamily.codeberg.page |
---|
ip | 2001:67c:1401:20f0::1 |
---|
address | fdroidfamily.codeberg.page:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.355092839 |
---|
max | 0.355545831 |
---|
average | 0.3552369717 |
---|
stddev | 0.00015246556378149605 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://freeyourgadget.codeberg.page/fdroid/repo | ip | 2001:67c:1401:20f0::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpump43i4_
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792049 |
---|
duration | 0.8178651332855225 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Allow | GET, HEAD, OPTIONS |
---|
Cache-Control | public, max-age=600 |
---|
Content-Length | 5394 |
---|
Content-Type | application/x-java-archive |
---|
Etag | "8741c091345bb733eed6f0663a30a74027944743" |
---|
Last-Modified | Wed, 01 Jan 2025 22:11:35 GMT |
---|
Referrer-Policy | strict-origin-when-cross-origin |
---|
Server | pages-server |
---|
Strict-Transport-Security | max-age=63072000; includeSubdomains; preload |
---|
X-Pages-Cache | true |
---|
Date | Thu, 02 Jan 2025 04:27:29 GMT |
---|
|
---|
tlsping | host | freeyourgadget.codeberg.page |
---|
ip | 2001:67c:1401:20f0::1 |
---|
address | freeyourgadget.codeberg.page:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.361175041 |
---|
max | 0.366279608 |
---|
average | 0.3641572712 |
---|
stddev | 0.0017048879121448906 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://github.com/onionshare/onionshare-android-nightly/raw/master/fdroid/repo | ip | 2606:50c0:8003::154 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpz5oyxipa
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792055 |
---|
duration | 0.8201649188995361 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Connection | keep-alive |
---|
Content-Length | 3658 |
---|
Cache-Control | max-age=300 |
---|
Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
---|
Content-Type | application/octet-stream |
---|
ETag | W/"625338d4adeafd16c42bfe19d44f2e72c7513ebbd0a32f307c3182fcffdc650c" |
---|
Strict-Transport-Security | max-age=31536000 |
---|
X-Content-Type-Options | nosniff |
---|
X-Frame-Options | deny |
---|
X-XSS-Protection | 1; mode=block |
---|
X-GitHub-Request-Id | 649F:EA936:3C2E0D0:414800E:677615B7 |
---|
Accept-Ranges | bytes |
---|
Date | Thu, 02 Jan 2025 04:27:36 GMT |
---|
Via | 1.1 varnish |
---|
X-Served-By | cache-pdx12332-PDX |
---|
X-Cache | MISS |
---|
X-Cache-Hits | 0 |
---|
X-Timer | S1735792056.319245,VS0,VE117 |
---|
Vary | Authorization,Accept-Encoding,Origin |
---|
Access-Control-Allow-Origin | * |
---|
Cross-Origin-Resource-Policy | cross-origin |
---|
X-Fastly-Request-ID | 32b5e73ca7d5bb26da7fd5e9c4fa927ebe3eaa86 |
---|
Expires | Thu, 02 Jan 2025 04:32:36 GMT |
---|
Source-Age | 0 |
---|
|
---|
tlsping | host | github.com |
---|
ip | 140.82.116.3 |
---|
address | github.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.1300245 |
---|
max | 0.138187275 |
---|
average | 0.1344345044 |
---|
stddev | 0.002908369057693342 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (ecdh_x25519) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://gitlab.com/fdroid/fdroidclient-nightly/raw/master/fdroid/repo | ip | 2606:4700:90:0:f22e:fbec:5bed:a9b9 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmppwstj76n
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792061 |
---|
duration | 0.582258939743042 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:27:41 GMT |
---|
Content-Type | application/octet-stream |
---|
Content-Length | 5889 |
---|
Connection | keep-alive |
---|
CF-Ray | 8fb7ff801bdd2f2b-PDX |
---|
CF-Cache-Status | REVALIDATED |
---|
Accept-Ranges | bytes |
---|
Cache-Control | max-age=60, public, must-revalidate, stale-while-revalidate=60, stale-if-error=300, s-maxage=60 |
---|
Content-Disposition | attachment |
---|
ETag | "0b63e31d88043a8936e97a995cd57640" |
---|
Strict-Transport-Security | max-age=31536000 |
---|
Vary | Accept, Accept-Encoding |
---|
content-security-policy | base-uri 'self'; child-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ 'self' https://gitlab.com/assets/ blob: data:; connect-src 'self' https://gitlab.com wss://gitlab.com https://sentry.gitlab.net https://new-sentry.gitlab.net https://customers.gitlab.com https://snowplow.trx.gitlab.net https://sourcegraph.com https://collector.prd-278964.gl-product-analytics.com snowplowprd.trx.gitlab.net; default-src 'self'; font-src 'self'; form-action 'self' https: http:; frame-ancestors 'self'; frame-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/; img-src 'self' data: blob: http: https:; manifest-src 'self'; media-src 'self' data: blob: http: https:; object-src 'none'; report-uri https://new-sentry.gitlab.net/api/4/security/?sentry_key=f5573e26de8f4293b285e556c35dfd6e&sentry_environment=gprd; script-src 'strict-dynamic' 'self' 'unsafe-inline' 'unsafe-eval' https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.recaptcha.net/ https://apis.google.com https://*.zuora.com/apps/PublicHostedPageLite.do 'nonce-IUhRtp7hzVSo5bAsTwfBVA=='; style-src 'self' 'unsafe-inline'; worker-src 'self' https://gitlab.com/assets/ blob: data: |
---|
gitlab-lb | haproxy-main-59-lb-gprd |
---|
gitlab-sv | web-gke-us-east1-d |
---|
permissions-policy | interest-cohort=() |
---|
referrer-policy | strict-origin-when-cross-origin |
---|
x-content-type-options | nosniff |
---|
x-download-options | noopen |
---|
x-frame-options | SAMEORIGIN |
---|
x-gitlab-meta | {"correlation_id":"01JFD8MD32F8ZVFXFT8BDQG2PN","version":"1"} |
---|
x-permitted-cross-domain-policies | none |
---|
x-request-id | 01JFD8MD32F8ZVFXFT8BDQG2PN |
---|
x-runtime | 0.105455 |
---|
x-ua-compatible | IE=edge |
---|
x-xss-protection | 1; mode=block |
---|
Report-To | {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CB02xfarmfhNg1lg2vjeqLpKAdapdAz5h036eWu%2BLjhA5mMkxlyfBjEuOLA3%2Bb8zwyqgXWCurmD26x08%2Fk6GHYqKOMitzqmB1JIt56Z0lXk5IyFn8DvUPshhDMdTDPjFRhCzYeoekLI%3D"}],"group":"cf-nel","max_age":604800} |
---|
NEL | {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800} |
---|
Set-Cookie | _cfuvid=yCTqYcb4AakQpwZPSwklJe5adWNuxMWsOzSRxYbEYic-1735792061664-0.0.1.1-604800000; path=/; domain=.gitlab.com; HttpOnly; Secure; SameSite=None |
---|
Server | cloudflare |
---|
|
---|
tlsping | host | gitlab.com |
---|
ip | 2606:4700:90:0:f22e:fbec:5bed:a9b9 |
---|
address | gitlab.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.059646386 |
---|
max | 0.060268043 |
---|
average | 0.059917540199999994 |
---|
stddev | 0.00018459673689900328 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://grobox.de/fdroid/repo | ip | 2001:67c:1401:2051::1:10 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp11f4noym
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792062 |
---|
duration | 0.9900600910186768 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:27:43 GMT |
---|
Server | Apache |
---|
Upgrade | h2,h2c |
---|
Connection | Upgrade, Keep-Alive |
---|
Last-Modified | Sat, 07 Dec 2024 19:36:15 GMT |
---|
ETag | "297a-628b33e9d4e0c" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 10618 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | grobox.de |
---|
ip | 2001:67c:1401:2051::1:10 |
---|
address | grobox.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.385711406 |
---|
max | 0.387019387 |
---|
average | 0.386173764 |
---|
stddev | 0.0003742284472866806 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 3072) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - Key exchange (dh 3072) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://guardianproject-wind.s3.amazonaws.com/fdroid/repo | ip | 54.231.224.17 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmptvx146yq
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792079 |
---|
duration | 1.0010690689086914 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | x-amz-id-2 | SO/ceT7U2S2JCjZKXKANxsv/7VEQQN78d4Bl4d7zCvowhURmZszo//we8ed+WvZQG76VOw9ZhT8= |
---|
x-amz-request-id | 7W2TR0TZE9SAWDY9 |
---|
Date | Thu, 02 Jan 2025 04:28:01 GMT |
---|
Last-Modified | Wed, 01 Jan 2025 07:17:03 GMT |
---|
ETag | "6e3bbc8320eb73f2008ff0abe342829f" |
---|
x-amz-server-side-encryption | AES256 |
---|
x-amz-meta-s3cmd-attrs | atime:1735715709/ctime:1735715709/gid:1000/gname:geheimnis/md5:6e3bbc8320eb73f2008ff0abe342829f/mode:33188/mtime:1735715709/uid:1000/uname:geheimnis |
---|
Accept-Ranges | bytes |
---|
Content-Type | application/zip |
---|
Content-Length | 506490 |
---|
Server | AmazonS3 |
---|
|
---|
tlsping | host | guardianproject-wind.s3.amazonaws.com |
---|
ip | 52.217.9.228 |
---|
address | guardianproject-wind.s3.amazonaws.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.182671669 |
---|
max | 0.184049362 |
---|
average | 0.1836632374 |
---|
stddev | 0.0003797038726521448 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://guardianproject.info/fdroid/repo | ip | 162.247.75.177 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpwofzknov
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792087 |
---|
duration | 0.7524888515472412 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:28:07 GMT |
---|
Server | Apache/2.4.59 (Debian) |
---|
Permissions-Policy | interest-cohort=() |
---|
Feature-Policy | ambient-light-sensor 'none'; autoplay 'none'; accelerometer 'none'; camera 'none'; display-capture 'none'; document-domain 'none'; encrypted-media 'none'; fullscreen 'none'; geolocation 'none'; gyroscope 'none'; magnetometer 'none'; microphone 'none'; midi 'none'; payment 'none'; picture-in-picture 'none'; speaker 'none'; sync-xhr 'none'; usb 'none'; wake-lock 'none'; webauthn 'none'; vr 'none'; xr 'none'; |
---|
Content-Security-Policy | default-src 'none'; base-uri 'self'; block-all-mixed-content; connect-src 'self'; font-src 'self'; form-action 'self'; frame-ancestors 'self'; img-src 'self' https://*.static.flickr.com https://*.staticflickr.com; media-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; |
---|
Strict-Transport-Security | max-age=31536000 |
---|
Referrer-Policy | strict-origin |
---|
X-Content-Type-Options | nosniff |
---|
X-Frame-Options | sameorigin |
---|
X-Xss-Protection | 1; mode=block |
---|
Vary | User-Agent |
---|
Last-Modified | Wed, 01 Jan 2025 06:28:52 GMT |
---|
ETag | "3114e-62a9f28c6772c" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 201038 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | guardianproject.info |
---|
ip | 162.247.75.177 |
---|
address | guardianproject.info:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.180371227 |
---|
max | 0.181517236 |
---|
average | 0.1810564152 |
---|
stddev | 0.0003380449461375804 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://haagch.frickel.club/files/fdroid/repo | ip | 2a03:4000:49:4f7::dead:beef |
---|
VerificationException | JAR signature failed to verify: /tmp/tmprwcivwdp
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792094 |
---|
duration | 1.011202096939087 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.26.2 |
---|
Date | Thu, 02 Jan 2025 04:28:14 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 7603 |
---|
Last-Modified | Thu, 06 Jan 2022 03:00:10 GMT |
---|
Connection | keep-alive |
---|
ETag | "61d65b3a-1db3" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | haagch.frickel.club |
---|
ip | 2a03:4000:49:4f7::dead:beef |
---|
address | haagch.frickel.club:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.376695046 |
---|
max | 0.37742809 |
---|
average | 0.3770936598 |
---|
stddev | 0.0002584886614514487 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://jak-linux.org/fdroid/repo | ip | 2a01:4f8:1c1c:9761::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp08w7_and
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792104 |
---|
duration | 0.8620271682739258 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.24.0 (Ubuntu) |
---|
Date | Thu, 02 Jan 2025 04:28:25 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 4052 |
---|
Last-Modified | Tue, 23 Mar 2021 17:51:53 GMT |
---|
Connection | keep-alive |
---|
ETag | "605a2ab9-fd4" |
---|
Strict-Transport-Security | max-age=15768000 |
---|
X-Frame-Options | DENY |
---|
X-Content-Type-Options | nosniff |
---|
X-XSS-Protection | 1; mode=block |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | jak-linux.org |
---|
ip | 2a01:4f8:1c1c:9761::1 |
---|
address | jak-linux.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.394211347 |
---|
max | 0.395871725 |
---|
average | 0.3951826693 |
---|
stddev | 0.00045452573271864 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://jhass.github.io/insporation/fdroid/repo | ip | 2606:50c0:8001::153 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpsuw9fmbn
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792114 |
---|
duration | 0.4910569190979004 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Connection | keep-alive |
---|
Content-Length | 2948 |
---|
Server | GitHub.com |
---|
Content-Type | application/java-archive |
---|
permissions-policy | interest-cohort=() |
---|
Last-Modified | Thu, 22 Feb 2024 04:10:47 GMT |
---|
Access-Control-Allow-Origin | * |
---|
ETag | "65d6c947-b84" |
---|
expires | Thu, 02 Jan 2025 04:38:34 GMT |
---|
Cache-Control | max-age=600 |
---|
x-proxy-cache | MISS |
---|
X-GitHub-Request-Id | 7166:31DB30:46F00E6:494AF7F:677615F1 |
---|
Accept-Ranges | bytes |
---|
Age | 0 |
---|
Date | Thu, 02 Jan 2025 04:28:34 GMT |
---|
Via | 1.1 varnish |
---|
X-Served-By | cache-pdx12325-PDX |
---|
X-Cache | MISS |
---|
X-Cache-Hits | 0 |
---|
X-Timer | S1735792114.364201,VS0,VE75 |
---|
Vary | Accept-Encoding |
---|
X-Fastly-Request-ID | 1a191e42badd4c520fa7b31dd698b389ca7b117a |
---|
|
---|
tlsping | host | jhass.github.io |
---|
ip | 2606:50c0:8000::153 |
---|
address | jhass.github.io:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.055564737 |
---|
max | 0.057290542 |
---|
average | 0.056621701700000006 |
---|
stddev | 0.0005641632864467601 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://julianfairfax.gitlab.io/fdroid-repo/fdroid/repo | starttime | 1735792115 |
---|
duration | 0.9111948013305664 |
---|
status | 403 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:28:36 GMT |
---|
Content-Type | text/html; charset=UTF-8 |
---|
Transfer-Encoding | chunked |
---|
Connection | close |
---|
Accept-CH | Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA |
---|
Critical-CH | Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA |
---|
Cross-Origin-Embedder-Policy | require-corp |
---|
Cross-Origin-Opener-Policy | same-origin |
---|
Cross-Origin-Resource-Policy | same-origin |
---|
Origin-Agent-Cluster | ?1 |
---|
Permissions-Policy | accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=() |
---|
Referrer-Policy | same-origin |
---|
X-Content-Options | nosniff |
---|
X-Frame-Options | SAMEORIGIN |
---|
cf-mitigated | challenge |
---|
cf-chl-out | 1XINXO02UQb3P7ZWosFsFX6b38paVHZoh6zA8FDjKuWDoIVjqtGYTauN4n6mjVzEkqbNfdPDiTOxo51PtXbN6JCkHX5r+HiRiM3tweAYuFkeA4V1aKEqlYY7gNhzL33RG9UvfHKgeBM//iU5FTQuXQ==$bDqQDT2voWsBVkTLat7FYQ== |
---|
Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
---|
Expires | Thu, 01 Jan 1970 00:00:01 GMT |
---|
Report-To | {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aiTRVP8lqT8m28VxhPQpBr85771wMylYtMMc%2Fy9q6p5zYpCRL2zg58CNMzP1MkRj3CDpMasJ%2BK3H%2BQ9LjPGz4NbMKllsFePI4XWUR%2BK6PNFlQLHA9DXEpX2VMb9XTZzNW8I0r0zV4x4%3D"}],"group":"cf-nel","max_age":604800} |
---|
NEL | {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800} |
---|
Vary | Accept-Encoding |
---|
Strict-Transport-Security | max-age=31536000 |
---|
X-Content-Type-Options | nosniff |
---|
Server | cloudflare |
---|
CF-RAY | 8fb800d81cba8e69-PDX |
---|
Content-Encoding | br |
---|
|
---|
tlsping | host | julianfairfax.gitlab.io |
---|
ip | 2600:1901:0:7b8a:: |
---|
address | julianfairfax.gitlab.io:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.138834448 |
---|
max | 0.167422263 |
---|
average | 0.1422995108 |
---|
stddev | 0.008385109150900022 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://kaffeemitkoffein.de/fdroid/repo | ip | 95.119.52.108 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp5zyqbmum
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792119 |
---|
duration | 1.2067570686340332 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:28:40 GMT |
---|
Server | Apache/2.4.62 (Raspbian) |
---|
Last-Modified | Wed, 01 Jan 2025 13:25:19 GMT |
---|
ETag | "2177-62aa4fa1e7e0f" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 8567 |
---|
Strict-Transport-Security | max-age=15768000 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | kaffeemitkoffein.de |
---|
ip | 95.119.52.108 |
---|
address | kaffeemitkoffein.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.599848905 |
---|
max | 0.72054509 |
---|
average | 0.6597742312 |
---|
stddev | 0.04960790764092168 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 3072) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 3072) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 3072) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 3072) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
- TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
- TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - Key exchange (dh 3072) of lower strength than certificate key
- Key exchange (ecdh_x25519) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://microg.org/fdroid/repo | ip | 109.230.233.131 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpka_kyqqn
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792175 |
---|
duration | 1.3929510116577148 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:22:09 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 7626 |
---|
Last-Modified | Tue, 24 Dec 2024 13:49:10 GMT |
---|
Connection | keep-alive |
---|
ETag | "676abbd6-1dca" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | microg.org |
---|
ip | 109.230.233.131 |
---|
address | microg.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.357906168 |
---|
max | 0.42091352 |
---|
average | 0.3791824115 |
---|
stddev | 0.022527117423732982 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://mobileapp.bitwarden.com/fdroid/repo | ip | 199.232.145.91 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp28vh6bdc
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792187 |
---|
duration | 0.3238639831542969 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Connection | keep-alive |
---|
Content-Length | 6538 |
---|
Server | GitHub.com |
---|
Content-Type | application/java-archive |
---|
x-origin-cache | HIT |
---|
Last-Modified | Tue, 17 Dec 2024 14:03:14 GMT |
---|
Access-Control-Allow-Origin | * |
---|
ETag | "676184a2-198a" |
---|
expires | Thu, 02 Jan 2025 04:31:28 GMT |
---|
x-proxy-cache | HIT |
---|
X-GitHub-Request-Id | 1515:3EEE0D:4E50D61:50FA651:6776145B |
---|
Via | 1.1 varnish, 1.1 varnish |
---|
X-Fastly-Request-ID | 9693406fb14d6eba2ea8618a7dab95030dc59cac |
---|
Fastly-Debug-States | DELIVER |
---|
Cache-Control | public, max-age=0, must-revalidate |
---|
Accept-Ranges | bytes |
---|
Age | 480 |
---|
Date | Thu, 02 Jan 2025 04:29:47 GMT |
---|
X-Served-By | cache-pdx12334-PDX, cache-pdx12333-PDX |
---|
X-Cache | MISS, HIT |
---|
X-Cache-Hits | 0, 0 |
---|
X-Timer | S1735792188.609310,VS0,VE1 |
---|
Vary | Accept-Encoding |
---|
X-Content-Type-Options | nosniff |
---|
X-Service-Version | 31 |
---|
Strict-Transport-Security | max-age=31536000 |
---|
|
---|
tlsping | host | mobileapp.bitwarden.com |
---|
ip | 199.232.145.91 |
---|
address | mobileapp.bitwarden.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.055618756 |
---|
max | 0.057183071 |
---|
average | 0.0565121392 |
---|
stddev | 0.0005797672370504922 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://molly.im/fdroid/repo | ip | 2606:50c0:8003::153 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpdjt005gg
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792188 |
---|
duration | 0.4419081211090088 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Connection | keep-alive |
---|
Content-Length | 5747 |
---|
Server | GitHub.com |
---|
Content-Type | application/java-archive |
---|
Last-Modified | Mon, 02 Dec 2024 20:55:06 GMT |
---|
Access-Control-Allow-Origin | * |
---|
ETag | "674e1eaa-1673" |
---|
expires | Thu, 02 Jan 2025 04:39:48 GMT |
---|
Cache-Control | max-age=600 |
---|
x-proxy-cache | MISS |
---|
X-GitHub-Request-Id | D784:2E1EFB:4F798E9:5223FAD:6776163C |
---|
Accept-Ranges | bytes |
---|
Age | 0 |
---|
Date | Thu, 02 Jan 2025 04:29:48 GMT |
---|
Via | 1.1 varnish |
---|
X-Served-By | cache-pdx12320-PDX |
---|
X-Cache | MISS |
---|
X-Cache-Hits | 0 |
---|
X-Timer | S1735792189.681198,VS0,VE75 |
---|
Vary | Accept-Encoding |
---|
X-Fastly-Request-ID | c5a2c3518ac72592b788f3b2f74a0b8cdf3d63bb |
---|
|
---|
tlsping | host | molly.im |
---|
ip | 2606:50c0:8000::153 |
---|
address | molly.im:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.056267422 |
---|
max | 0.057945806 |
---|
average | 0.05711015949999999 |
---|
stddev | 0.0005522091957793266 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://nanolx.org/fdroid/repo | ip | 87.118.120.112 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp2e82b6az
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792190 |
---|
duration | 1.1201229095458984 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:29:50 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 4978 |
---|
Last-Modified | Fri, 21 May 2021 19:39:16 GMT |
---|
Connection | keep-alive |
---|
ETag | "60a80c64-1372" |
---|
Strict-Transport-Security | max-age=15768000; includeSubDomains |
---|
X-Powered-By | PleskLin |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | nanolx.org |
---|
ip | 87.118.120.112 |
---|
address | nanolx.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.394471611 |
---|
max | 0.395437343 |
---|
average | 0.3950038689 |
---|
stddev | 0.00033721815240981943 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://onosendai.herokuapp.com/repo | ip | 23.22.144.165 |
---|
starttime | 1735792199 |
---|
duration | 0.39193105697631836 |
---|
status | 404 |
---|
TLS | TLSv1.2 |
---|
headers | Content-Length | 563 |
---|
Cache-Control | no-cache, no-store |
---|
Content-Type | text/html; charset=utf-8 |
---|
Date | 2025-01-02 04:30:00.243854086 +0000 UTC |
---|
Server | heroku-router |
---|
|
---|
tlsping | host | onosendai.herokuapp.com |
---|
ip | 54.243.238.66 |
---|
address | onosendai.herokuapp.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.267742203 |
---|
max | 0.271890546 |
---|
average | 0.26986692469999995 |
---|
stddev | 0.0011268775540531546 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://pili.qi0.de/fdroid/repo | ip | 89.244.199.67 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp025ferwx
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792206 |
---|
duration | 2.157198905944824 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | nginx/1.26.2 |
---|
Date | Thu, 02 Jan 2025 04:30:08 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 24067 |
---|
Last-Modified | Fri, 01 Nov 2024 08:20:46 GMT |
---|
Connection | keep-alive |
---|
ETag | "67248f5e-5e03" |
---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | pili.qi0.de |
---|
ip | 89.244.199.67 |
---|
address | pili.qi0.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.583942425 |
---|
max | 0.585838465 |
---|
average | 0.5851097940000001 |
---|
stddev | 0.0005167997773062518 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://platschi.net/fdroid/repo | ConnectionError | HTTPSConnectionPool(host='platschi.net', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7fb843239b50>: Failed to establish a new connection: [Errno -2] Name or service not known')) |
---|
starttime | 1735792231 |
---|
duration | 0.06491804122924805 |
---|
status | 200 |
---|
TLS | [Errno -2] Name or service not known |
---|
headers | Server | nginx/1.26.2 |
---|
Date | Thu, 02 Jan 2025 04:30:08 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 24067 |
---|
Last-Modified | Fri, 01 Nov 2024 08:20:46 GMT |
---|
Connection | keep-alive |
---|
ETag | "67248f5e-5e03" |
---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
- TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://raw.githubusercontent.com/2br-2b/Fdroid-repo/master/fdroid/repo | ip | 2606:50c0:8002::154 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpz45a1fk4
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792232 |
---|
duration | 0.4427950382232666 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Connection | keep-alive |
---|
Content-Length | 4999 |
---|
Cache-Control | max-age=300 |
---|
Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
---|
Content-Type | application/octet-stream |
---|
ETag | W/"070addb24bc77e917a11a8ee6ea1f3c786744d1cb98cc339fb2c6b24d782c415" |
---|
Strict-Transport-Security | max-age=31536000 |
---|
X-Content-Type-Options | nosniff |
---|
X-Frame-Options | deny |
---|
X-XSS-Protection | 1; mode=block |
---|
X-GitHub-Request-Id | 94D5:2AB287:3C3DDE8:4156811:67761661 |
---|
Accept-Ranges | bytes |
---|
Date | Thu, 02 Jan 2025 04:30:32 GMT |
---|
Via | 1.1 varnish |
---|
X-Served-By | cache-pdx12325-PDX |
---|
X-Cache | MISS |
---|
X-Cache-Hits | 0 |
---|
X-Timer | S1735792233.510207,VS0,VE106 |
---|
Vary | Authorization,Accept-Encoding,Origin |
---|
Access-Control-Allow-Origin | * |
---|
Cross-Origin-Resource-Policy | cross-origin |
---|
X-Fastly-Request-ID | 4f46fe8b1ac659d0a7b697a2419981af923a6762 |
---|
Expires | Thu, 02 Jan 2025 04:35:32 GMT |
---|
Source-Age | 0 |
---|
|
---|
tlsping | host | raw.githubusercontent.com |
---|
ip | 2606:50c0:8003::154 |
---|
address | raw.githubusercontent.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.055947128 |
---|
max | 0.057130546 |
---|
average | 0.056543333900000006 |
---|
stddev | 0.000454134541382276 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://raw.githubusercontent.com/MM2-0/fdroid/main/fdroid/repo | ip | 2606:50c0:8003::154 |
---|
starttime | 1735792233 |
---|
duration | 0.23148417472839355 |
---|
status | 404 |
---|
TLS | TLSv1.3 |
---|
headers | Connection | keep-alive |
---|
Content-Length | 14 |
---|
Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
---|
Strict-Transport-Security | max-age=31536000 |
---|
X-Content-Type-Options | nosniff |
---|
X-Frame-Options | deny |
---|
X-XSS-Protection | 1; mode=block |
---|
Content-Type | text/plain; charset=utf-8 |
---|
X-GitHub-Request-Id | ED99:2E1FBA:3CE199B:41FA3B3:67761669 |
---|
Accept-Ranges | bytes |
---|
Date | Thu, 02 Jan 2025 04:30:33 GMT |
---|
Via | 1.1 varnish |
---|
X-Served-By | cache-pdx12320-PDX |
---|
X-Cache | MISS |
---|
X-Cache-Hits | 0 |
---|
X-Timer | S1735792234.755309,VS0,VE179 |
---|
Vary | Authorization,Accept-Encoding,Origin |
---|
Access-Control-Allow-Origin | * |
---|
Cross-Origin-Resource-Policy | cross-origin |
---|
X-Fastly-Request-ID | 70455615e04b73688183c2759c6cfba616ea1e99 |
---|
Expires | Thu, 02 Jan 2025 04:35:33 GMT |
---|
Source-Age | 0 |
---|
|
---|
tlsping | host | raw.githubusercontent.com |
---|
ip | 2606:50c0:8003::154 |
---|
address | raw.githubusercontent.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.06310868 |
---|
max | 0.063661435 |
---|
average | 0.0633813988 |
---|
stddev | 0.00020116285317960748 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://raw.githubusercontent.com/chrisgch/tca/master/fdroid/repo | ip | 2606:50c0:8002::154 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpvajht1qp
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792234 |
---|
duration | 0.5399148464202881 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Connection | keep-alive |
---|
Content-Length | 12161 |
---|
Cache-Control | max-age=300 |
---|
Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
---|
Content-Type | application/octet-stream |
---|
ETag | W/"fe45a221d0043a3ce7e6e721b40a72812eca92ebbb4a5fd02b253035c1740f9f" |
---|
Strict-Transport-Security | max-age=31536000 |
---|
X-Content-Type-Options | nosniff |
---|
X-Frame-Options | deny |
---|
X-XSS-Protection | 1; mode=block |
---|
X-GitHub-Request-Id | A439:2E1FBA:3CE19E9:41FA40A:6776166A |
---|
Accept-Ranges | bytes |
---|
Date | Thu, 02 Jan 2025 04:30:34 GMT |
---|
Via | 1.1 varnish |
---|
X-Served-By | cache-pdx12323-PDX |
---|
X-Cache | MISS |
---|
X-Cache-Hits | 0 |
---|
X-Timer | S1735792235.859664,VS0,VE138 |
---|
Vary | Authorization,Accept-Encoding,Origin |
---|
Access-Control-Allow-Origin | * |
---|
Cross-Origin-Resource-Policy | cross-origin |
---|
X-Fastly-Request-ID | 78e900eaae71f5074a53a96a3bd19dec30a0e6e8 |
---|
Expires | Thu, 02 Jan 2025 04:35:34 GMT |
---|
Source-Age | 0 |
---|
|
---|
tlsping | host | raw.githubusercontent.com |
---|
ip | 2606:50c0:8003::154 |
---|
address | raw.githubusercontent.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.061154329 |
---|
max | 0.062055833 |
---|
average | 0.061554339400000005 |
---|
stddev | 0.0003180634916944092 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://raw.githubusercontent.com/iodeOS/fdroid/master/fdroid/repo | ip | 2606:50c0:8002::154 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpku4mgp2w
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792235 |
---|
duration | 0.48916196823120117 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Connection | keep-alive |
---|
Content-Length | 10515 |
---|
Cache-Control | max-age=300 |
---|
Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
---|
Content-Type | application/octet-stream |
---|
ETag | W/"071a9a1cd02db91f5f06cd1294094f546877b98d61a8e2ab2b7f75f49f5bb0a0" |
---|
Strict-Transport-Security | max-age=31536000 |
---|
X-Content-Type-Options | nosniff |
---|
X-Frame-Options | deny |
---|
X-XSS-Protection | 1; mode=block |
---|
X-GitHub-Request-Id | CEA1:14C943:3BBE1FF:40D6C31:6776166B |
---|
Accept-Ranges | bytes |
---|
Date | Thu, 02 Jan 2025 04:30:36 GMT |
---|
Via | 1.1 varnish |
---|
X-Served-By | cache-pdx12329-PDX |
---|
X-Cache | MISS |
---|
X-Cache-Hits | 0 |
---|
X-Timer | S1735792236.064230,VS0,VE111 |
---|
Vary | Authorization,Accept-Encoding,Origin |
---|
Access-Control-Allow-Origin | * |
---|
Cross-Origin-Resource-Policy | cross-origin |
---|
X-Fastly-Request-ID | 366d9028b1252417685a35b80cb550310114ecd1 |
---|
Expires | Thu, 02 Jan 2025 04:35:36 GMT |
---|
Source-Age | 0 |
---|
|
---|
tlsping | host | raw.githubusercontent.com |
---|
ip | 2606:50c0:8003::154 |
---|
address | raw.githubusercontent.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.074121436 |
---|
max | 0.07586307 |
---|
average | 0.07504313840000001 |
---|
stddev | 0.0005869313817831185 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://raw.githubusercontent.com/xarantolus/fdroid/main/fdroid/repo | ip | 2606:50c0:8003::154 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp1cjgwhx9
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792237 |
---|
duration | 0.489224910736084 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Connection | keep-alive |
---|
Content-Length | 7275 |
---|
Cache-Control | max-age=300 |
---|
Content-Security-Policy | default-src 'none'; style-src 'unsafe-inline'; sandbox |
---|
Content-Type | application/octet-stream |
---|
ETag | W/"681c3564d81991be3efd23d09d525be906888a16a8606ea62128d8d9f22d8040" |
---|
Strict-Transport-Security | max-age=31536000 |
---|
X-Content-Type-Options | nosniff |
---|
X-Frame-Options | deny |
---|
X-XSS-Protection | 1; mode=block |
---|
X-GitHub-Request-Id | A439:2E1FBA:3CE1AAB:41FA4DE:6776166C |
---|
Accept-Ranges | bytes |
---|
Date | Thu, 02 Jan 2025 04:30:37 GMT |
---|
Via | 1.1 varnish |
---|
X-Served-By | cache-pdx12323-PDX |
---|
X-Cache | MISS |
---|
X-Cache-Hits | 0 |
---|
X-Timer | S1735792237.403961,VS0,VE120 |
---|
Vary | Authorization,Accept-Encoding,Origin |
---|
Access-Control-Allow-Origin | * |
---|
Cross-Origin-Resource-Policy | cross-origin |
---|
X-Fastly-Request-ID | f0b27b9a34e472c3cf6fbb18a47e52f9b0beadc9 |
---|
Expires | Thu, 02 Jan 2025 04:35:37 GMT |
---|
Source-Age | 0 |
---|
|
---|
tlsping | host | raw.githubusercontent.com |
---|
ip | 2606:50c0:8003::154 |
---|
address | raw.githubusercontent.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.06848232 |
---|
max | 0.06923351 |
---|
average | 0.0688537768 |
---|
stddev | 0.00024880356305639786 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://releases.nailyk.fr/repo | ip | 144.76.164.24 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpvvd03941
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792238 |
---|
duration | 0.943580150604248 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:30:39 GMT |
---|
Server | Apache |
---|
Last-Modified | Wed, 01 Jan 2025 09:27:59 GMT |
---|
ETag | "190e-62aa1a957ab59" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 6414 |
---|
Content-Type | application/java-archive |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
|
---|
tlsping | host | releases.nailyk.fr |
---|
ip | 144.76.164.24 |
---|
address | releases.nailyk.fr:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.458258065 |
---|
max | 0.464501615 |
---|
average | 0.46195611329999997 |
---|
stddev | 0.001965646184050883 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://repo.kuschku.de/repo | ip | 2a01:4f8:210:3186::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp73jibx9v
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792246 |
---|
duration | 1.5772299766540527 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:30:47 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 7672 |
---|
Connection | keep-alive |
---|
Last-Modified | Thu, 02 Jan 2025 04:16:41 GMT |
---|
ETag | "67761329-1df8" |
---|
Accept-Ranges | bytes |
---|
Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
---|
|
---|
tlsping | host | repo.kuschku.de |
---|
ip | 2a01:4f8:210:3186::1 |
---|
address | repo.kuschku.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.547491421 |
---|
max | 0.597849828 |
---|
average | 0.5709230566 |
---|
stddev | 0.019891433188702488 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://repo.mobilsicher.de/fdroid/repo | SSLError | HTTPSConnectionPool(host='repo.mobilsicher.de', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate (_ssl.c:992)'))) |
---|
starttime | 1735792256 |
---|
duration | 0.4164118766784668 |
---|
status | 200 |
---|
TLS | [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate (_ssl.c:992) |
---|
headers | Date | Thu, 02 Jan 2025 04:30:47 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 7672 |
---|
Connection | keep-alive |
---|
Last-Modified | Thu, 02 Jan 2025 04:16:41 GMT |
---|
ETag | "67761329-1df8" |
---|
Accept-Ranges | bytes |
---|
Strict-Transport-Security | max-age=63072000; includeSubDomains; preload |
---|
|
---|
tlsping | None |
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (dh 2048) of lower strength than certificate key
- Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://repo.netsyms.com/fdroid/repo | ip | 2606:4700:3037::6815:27cb |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpqwp9hiw2
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792263 |
---|
duration | 0.434934139251709 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:31:03 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 11099 |
---|
Connection | keep-alive |
---|
Vary | User-Agent, Accept-Encoding |
---|
Last-Modified | Sat, 18 Nov 2023 06:40:11 GMT |
---|
ETag | "2b5b-60a67864e3f1c" |
---|
Permissions-Policy | interest-cohort=() |
---|
X-Content-Type-Options | nosniff |
---|
Cache-Control | max-age=14400 |
---|
CF-Cache-Status | HIT |
---|
Age | 4168 |
---|
Accept-Ranges | bytes |
---|
Report-To | {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xnQk2Ca3TQY%2F8aelZV1yhvgKIumvCeX0E8h6WCG29g%2B7%2BLNonZ5xyGMZxAJ2Qh%2ByGHOuglTS8Ybf3Psxtg6bGfYg0ZNKbblpVeBn0CrtgBlq6gyvDE1rZEV9OwcqdqkorU620c%2BEl7YdXbqTfUYk"}],"group":"cf-nel","max_age":604800} |
---|
NEL | {"success_fraction":0,"report_to":"cf-nel","max_age":604800} |
---|
Server | cloudflare |
---|
CF-RAY | 8fb8046f9cec2844-SEA |
---|
alt-svc | h3=":443"; ma=86400 |
---|
server-timing | cfL4;desc="?proto=TCP&rtt=6218&min_rtt=6171&rtt_var=2348&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2841&recv_bytes=779&delivery_rate=655323&cwnd=98&unsent_bytes=0&cid=ae94f4471b279432&ts=27&x=0" |
---|
|
---|
tlsping | host | repo.netsyms.com |
---|
ip | 2606:4700:3037::ac43:9479 |
---|
address | repo.netsyms.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.129094715 |
---|
max | 0.133372571 |
---|
average | 0.13152058670000003 |
---|
stddev | 0.0014503818013886552 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo | ip | 2600:1901:0:7b8a:: |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpiku09f39
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792265 |
---|
duration | 0.622992992401123 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Cache-Control | max-age=600 |
---|
Content-Length | 5344 |
---|
Content-Type | application/java-archive |
---|
Etag | "3d92ff74ff4ff33631e6a34d932de6b84d461ebad7d0dcf9f99fd3005016a5f2" |
---|
Expires | Thu, 02 Jan 2025 04:41:05 UTC |
---|
Last-Modified | Thu, 30 Mar 2023 10:54:50 GMT |
---|
Permissions-Policy | interest-cohort=() |
---|
Vary | Origin |
---|
X-Request-Id | 01JGJMG2C9FA7GPXNPSHMXAB7N |
---|
Date | Thu, 02 Jan 2025 04:31:05 GMT |
---|
|
---|
tlsping | host | rfc2822.gitlab.io |
---|
ip | 2600:1901:0:7b8a:: |
---|
address | rfc2822.gitlab.io:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.138295162 |
---|
max | 0.139391761 |
---|
average | 0.1386567274 |
---|
stddev | 0.0003173178271232814 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://s2.spiritcroc.de/fdroid/repo | ip | 2a01:4f8:c2c:7b6b::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpvc608nnn
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792269 |
---|
duration | 1.1918959617614746 |
---|
status | 200 |
---|
TLS | TLSv1.2 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:31:10 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 13017 |
---|
Last-Modified | Mon, 23 Dec 2024 16:57:06 GMT |
---|
Connection | keep-alive |
---|
ETag | "67699662-32d9" |
---|
Strict-Transport-Security | max-age=15768000; includeSubDomains; preload |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | s2.spiritcroc.de |
---|
ip | 2a01:4f8:c2c:7b6b::1 |
---|
address | s2.spiritcroc.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.558362328 |
---|
max | 0.561278013 |
---|
average | 0.5597847389999999 |
---|
stddev | 0.0008915317218773731 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
warnings | - Key exchange (ecdh_x25519) of lower strength than certificate key
|
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://s3.amazonaws.com/storymaker/fdroid/repo | ip | 54.231.168.120 |
---|
starttime | 1735792280 |
---|
duration | 0.32213807106018066 |
---|
status | 403 |
---|
TLS | TLSv1.3 |
---|
headers | x-amz-request-id | XT1F4F0S074B8S9A |
---|
x-amz-id-2 | 4nR7Pjcyl2EPG+fkfc+bgTqVXUbZgIvfZK/rhdMRKURyxvy5lCb1xPrR7e6oFR2OqjAZ+RPGF+k= |
---|
Content-Type | application/xml |
---|
Transfer-Encoding | chunked |
---|
Date | Thu, 02 Jan 2025 04:31:20 GMT |
---|
Server | AmazonS3 |
---|
|
---|
tlsping | host | s3.amazonaws.com |
---|
ip | 16.15.192.50 |
---|
address | s3.amazonaws.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.191705384 |
---|
max | 0.192662603 |
---|
average | 0.19226641049999998 |
---|
stddev | 0.00033317052030341394 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://secfirst.org/fdroid/repo | ip | 52.50.17.13 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp8oqrw71z
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792292 |
---|
duration | 1.2917721271514893 |
---|
status | 200 |
---|
TLS | TLSv1.2 |
---|
headers | Server | nginx/1.12.2 |
---|
Date | Thu, 02 Jan 2025 04:32:53 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 4629 |
---|
Last-Modified | Mon, 04 May 2020 04:40:24 GMT |
---|
Connection | keep-alive |
---|
ETag | "5eaf9cb8-1215" |
---|
Strict-Transport-Security | max-age=15768000 |
---|
X-Frame-Options | DENY |
---|
X-Content-Type-Options | nosniff |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | secfirst.org |
---|
ip | 52.50.17.13 |
---|
address | secfirst.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.521585663 |
---|
max | 0.528137692 |
---|
average | 0.5237321222 |
---|
stddev | 0.0020349875060784012 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://static.cryptomator.org/android/fdroid/repo | ip | 2606:4700:3034::ac43:84db |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp4ag_v45i
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792313 |
---|
duration | 2.1339309215545654 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:31:55 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 6097 |
---|
Connection | keep-alive |
---|
etag | "63c1d76ecbbab98b388c2b70d3fc751e" |
---|
last-modified | Mon, 23 Dec 2024 18:02:35 GMT |
---|
x-amz-id-2 | txg4e8c749d63904e6382b9-00677616bb |
---|
x-amz-request-id | txg4e8c749d63904e6382b9-00677616bb |
---|
Cache-Control | max-age=28800 |
---|
CF-Cache-Status | MISS |
---|
Accept-Ranges | bytes |
---|
Report-To | {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SChx4HfYnhB0qrKRLnFMBfTiPAdxC3a%2BdHw7sGVnKjchVkI0xK6k112OlwahIffxpAQ83rysInfJkhIZWRrrmdYUYHB%2FzaYKlc0AHXuw35sajIOKE7QTRp7mytvKwaFMLKNkwr7h2nNGGEwUSSIbh%2Bnv5fwX"}],"group":"cf-nel","max_age":604800} |
---|
NEL | {"success_fraction":0,"report_to":"cf-nel","max_age":604800} |
---|
Vary | Accept-Encoding |
---|
Server | cloudflare |
---|
CF-RAY | 8fb805a6cf4da66c-PDX |
---|
alt-svc | h3=":443"; ma=86400 |
---|
server-timing | cfL4;desc="?proto=TCP&rtt=2785&min_rtt=2775&rtt_var=1060&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2852&recv_bytes=793&delivery_rate=1416462&cwnd=195&unsent_bytes=0&cid=5fdef74a021dffdc&ts=1715&x=0" |
---|
|
---|
tlsping | host | static.cryptomator.org |
---|
ip | 2606:4700:3034::ac43:84db |
---|
address | static.cryptomator.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.151424134 |
---|
max | 0.156390645 |
---|
average | 0.1534897909 |
---|
stddev | 0.0013923350408215304 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://store.nethunter.com/repo | ip | 45.33.83.228 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp5dm4uef1
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792316 |
---|
duration | 0.8877391815185547 |
---|
status | 200 |
---|
TLS | TLSv1.2 |
---|
headers | Server | nginx |
---|
Date | Thu, 02 Jan 2025 04:31:56 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 45515 |
---|
Last-Modified | Fri, 13 Dec 2024 07:31:25 GMT |
---|
Connection | keep-alive |
---|
ETag | "675be2cd-b1cb" |
---|
Accept-Ranges | bytes |
---|
|
---|
tlsping | host | store.nethunter.com |
---|
ip | 45.33.83.228 |
---|
address | store.nethunter.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.326645494 |
---|
max | 0.329116231 |
---|
average | 0.32780355759999996 |
---|
stddev | 0.0008143704036001304 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://submarine.strangled.net/fdroid/repo | ip | 178.68.39.8 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpu11lcuvl
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792320 |
---|
duration | 1.226694107055664 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:32:01 GMT |
---|
Server | Apache/2.4.29 (Ubuntu) |
---|
Last-Modified | Sun, 01 Dec 2024 22:35:25 GMT |
---|
ETag | "1087-6283d0c58d7a9" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 4231 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | submarine.strangled.net |
---|
ip | 178.68.39.8 |
---|
address | submarine.strangled.net:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.741439885 |
---|
max | 0.86423709 |
---|
average | 0.7576447011 |
---|
stddev | 0.03607823292913872 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
- TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
- TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
- TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | server |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://www.collaboraoffice.com/downloads/fdroid/repo | ip | 2a01:4f8:1c1e:efee::1 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpim_16cf7
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792350 |
---|
duration | 0.9599289894104004 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:32:30 GMT |
---|
Server | Apache/2.4.62 (Debian) |
---|
X-Content-Type-Options | nosniff |
---|
Strict-Transport-Security | max-age=31536000; includeSubdomains; preload |
---|
Referrer-Policy | strict-origin-when-cross-origin |
---|
Last-Modified | Sun, 15 Dec 2024 01:51:29 GMT |
---|
ETag | "11c3-629454d7569bb" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 4547 |
---|
x-robots-tag | noindex |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | www.collaboraoffice.com |
---|
ip | 2a01:4f8:1c1e:efee::1 |
---|
address | www.collaboraoffice.com:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.405536895 |
---|
max | 0.40670096 |
---|
average | 0.4061975823 |
---|
stddev | 0.00033701684383099974 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
warnings | - Key exchange (secp256r1) of lower strength than certificate key
|
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://www.cromite.org/fdroid/repo | ip | 89.46.108.70 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmp14p3_mw4
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792358 |
---|
duration | 1.2375149726867676 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Server | aruba-proxy |
---|
Date | Thu, 02 Jan 2025 04:32:39 GMT |
---|
Content-Type | application/java-archive |
---|
Content-Length | 4418 |
---|
Connection | keep-alive |
---|
Last-Modified | Fri, 20 Dec 2024 12:50:14 GMT |
---|
Accept-Ranges | bytes |
---|
X-ServerName | webx.aruba.it |
---|
Alt-Svc | h3=":443"; ma=86400 |
---|
|
---|
tlsping | host | www.cromite.org |
---|
ip | 89.46.108.70 |
---|
address | www.cromite.org:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.41829043 |
---|
max | 0.41895826 |
---|
average | 0.4186214232 |
---|
stddev | 0.00019852536593736267 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.2 | ciphers | - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://www.droidware.info/fdroid/repo | starttime | 1735792367 |
---|
duration | 0.5488028526306152 |
---|
status | 403 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:32:47 GMT |
---|
Content-Type | text/html; charset=UTF-8 |
---|
Transfer-Encoding | chunked |
---|
Connection | close |
---|
Accept-CH | Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA |
---|
Critical-CH | Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA |
---|
Cross-Origin-Embedder-Policy | require-corp |
---|
Cross-Origin-Opener-Policy | same-origin |
---|
Cross-Origin-Resource-Policy | same-origin |
---|
Origin-Agent-Cluster | ?1 |
---|
Permissions-Policy | accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=() |
---|
Referrer-Policy | same-origin |
---|
X-Content-Options | nosniff |
---|
X-Frame-Options | SAMEORIGIN |
---|
cf-mitigated | challenge |
---|
cf-chl-out | viUperBi6OxE8kXmh9Jx/bV7EXDkGgLMVdwaBoaujIejqYrqebqAw9NsXiqmOZY6oEBYGWbXXb1mFVdnOmtoKb+GW/vBrpu0fHMxRVi6WD+IJZ6Cucr39JtYmtUFTE822qiRHfcwqLje9wP3+dsuKw==$e0w7+i/QYGMZoVP7rIBddg== |
---|
Cache-Control | private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
---|
Expires | Thu, 01 Jan 1970 00:00:01 GMT |
---|
Vary | Accept-Encoding |
---|
Server | cloudflare |
---|
CF-RAY | 8fb806faaee52c12-PDX |
---|
Content-Encoding | gzip |
---|
|
---|
tlsping | host | www.droidware.info |
---|
ip | 2606:4700::6812:a40 |
---|
address | www.droidware.info:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.132194226 |
---|
max | 0.138129576 |
---|
average | 0.13459053599999998 |
---|
stddev | 0.001768609218794701 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|
https://www.ma-nic.de/fdroid/repo | ip | 109.250.137.111 |
---|
VerificationException | JAR signature failed to verify: /tmp/tmpw715pb0d
The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled.
Re-run jarsigner with the -verbose option for more details.
|
---|
starttime | 1735792368 |
---|
duration | 1.0426080226898193 |
---|
status | 200 |
---|
TLS | TLSv1.3 |
---|
headers | Date | Thu, 02 Jan 2025 04:32:49 GMT |
---|
Server | Apache/2.4.62 (Debian) |
---|
Last-Modified | Tue, 06 Jun 2023 16:06:08 GMT |
---|
ETag | "1094-5fd7832786fe5" |
---|
Accept-Ranges | bytes |
---|
Content-Length | 4244 |
---|
Keep-Alive | timeout=5, max=100 |
---|
Connection | Keep-Alive |
---|
Content-Type | application/java-archive |
---|
|
---|
tlsping | host | www.ma-nic.de |
---|
ip | 109.250.137.111 |
---|
address | www.ma-nic.de:443 |
---|
connection | TLS |
---|
count | 10 |
---|
min | 0.531360333 |
---|
max | 0.573084913 |
---|
average | 0.5581329553999999 |
---|
stddev | 0.013989169805110366 |
---|
error | |
---|
|
---|
ssl-enum-ciphers | TLSv1.0 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.1 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | server |
---|
|
---|
TLSv1.2 | ciphers | - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
compressors | |
---|
cipher preference | client |
---|
|
---|
TLSv1.3 | ciphers | - TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
- TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
- TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|
---|
cipher preference | client |
---|
|
---|
least strength | A |
---|
|
---|
|
---|