Test started 2022-07-02 05:44:26 UTC .
Show server to server result | Permalink to this report |
T
None
PLAIN |
Priority | Weight | Port | Server |
---|---|---|---|
5 | 0 | 5222 | vogler.debian.org |
Verified | Usage | Selector | Match | Data |
---|---|---|---|---|
YES | domain-issued certificate | SPKI | SHA-256 | 95:74:56:7A:B1:95:7D:08:E4:B0:9C:FD:83:D2:92:72:8A:49:06:27:79:00:66:4D:FE:9F:34:E2:95:B6:F2:AD |
FF:3D:AB:D2:24:47:AC:6C:45:D4:C2:CA:BB:A1:B1:5B:F8:E2:F7:6D
A0:53:37:5B:FE:84:E8:B7:48:78:2C:7C:EE:15:82:7A:6A:F5:A4:05
93:3C:6D:DE:E9:5C:9C:41:A4:0F:9F:50:49:3D:82:BE:03:AD:87:BF
DA:C9:02:4F:54:D8:F6:DF:94:93:5F:B1:73:26:38:CA:6A:D7:7C:13
SSLv2 | No |
SSLv3 | No |
TLSv1 | Yes |
TLSv1.1 | Yes |
TLSv1.2 | Yes |
Server does not respect the client's cipher ordering.
Cipher suite | Bitsize | Forward secrecy | Info |
---|---|---|---|
ECDHE-RSA-AES256-GCM-SHA384 (0xc030) | 256 | Yes | Curve: secp384r1 |
ECDHE-RSA-AES128-GCM-SHA256 (0xc02f) | 128 | Yes | Curve: secp384r1 |
ECDHE-RSA-AES256-SHA384 (0xc028) | 256 | Yes | Curve: secp384r1 |
ECDHE-RSA-AES128-SHA256 (0xc027) | 128 | Yes | Curve: secp384r1 |
ECDHE-RSA-AES256-SHA (0xc014) | 256 | Yes | Curve: secp384r1 |
ECDHE-RSA-AES128-SHA (0xc013) | 128 | Yes | Curve: secp384r1 |
AES256-GCM-SHA384 (0x9d) | 256 | No | - |
AES128-GCM-SHA256 (0x9c) | 128 | No | - |
AES256-SHA256 (0x3d) | 256 | No | - |
AES128-SHA256 (0x3c) | 128 | No | - |
AES256-SHA (0x35) | 256 | No | - |
CAMELLIA256-SHA (0x84) | 256 | No | - |
AES128-SHA (0x2f) | 128 | No | - |
CAMELLIA128-SHA (0x41) | 128 | No | - |
Want to show this result on your webpage? Add this:
<a href='https://xmpp.net/result.php?domain=debian.org&type=client'><img src='https://xmpp.net/badge.php?domain=debian.org' alt='xmpp.net score' /></a>