Test started 2019-07-01 10:50:22 UTC .
Show server to server result | Permalink to this report |
F
PLAIN |
PLAIN |
Priority | Weight | Port | Server |
---|---|---|---|
0 | 0 | 5222 | openfire01.tdis.sk |
3F:00:C5:52:56:45:36:0A:D1:C1:2C:11:D3:CB:5B:C3:3C:6B:6F:C2
15:24:F9:D3:86:14:6A:6F:3F:A3:F8:91:98:91:D6:34:41:87:F9:18
SSLv2 | No |
SSLv3 | No |
TLSv1 | No |
TLSv1.1 | No |
TLSv1.2 | Yes |
Server does respect the client's cipher ordering.
Cipher suite | Bitsize | Forward secrecy | Info |
---|---|---|---|
ECDHE-RSA-AES256-GCM-SHA384 (0xc030) | 256 | Yes | Curve: sect571r1 |
ECDHE-RSA-AES256-SHA (0xc014) | 256 | Yes | Curve: sect571r1 |
DHE-RSA-AES256-GCM-SHA384 (0x9f) | 256 | Yes |
Diffie-Hellman: Group: RFC 2409 First Oakley Default Group Bitsize: 1024 |
DHE-RSA-AES256-SHA256 (0x6b) | 256 | Yes |
Diffie-Hellman: Group: RFC 2409 First Oakley Default Group Bitsize: 1024 |
DHE-RSA-AES256-SHA (0x39) | 256 | Yes |
Diffie-Hellman: Group: RFC 2409 First Oakley Default Group Bitsize: 1024 |
AES256-GCM-SHA384 (0x9d) | 256 | No | - |
AES256-SHA256 (0x3d) | 256 | No | - |
AES256-SHA (0x35) | 256 | No | - |
ECDHE-RSA-AES128-GCM-SHA256 (0xc02f) | 128 | Yes | Curve: sect571r1 |
ECDHE-RSA-AES128-SHA256 (0xc027) | 128 | Yes | Curve: sect571r1 |
ECDHE-RSA-AES128-SHA (0xc013) | 128 | Yes | Curve: sect571r1 |
DHE-RSA-AES128-GCM-SHA256 (0x9e) | 128 | Yes |
Diffie-Hellman: Group: RFC 2409 First Oakley Default Group Bitsize: 1024 |
DHE-RSA-AES128-SHA256 (0x67) | 128 | Yes |
Diffie-Hellman: Group: RFC 2409 First Oakley Default Group Bitsize: 1024 |
DHE-RSA-AES128-SHA (0x33) | 128 | Yes |
Diffie-Hellman: Group: RFC 2409 First Oakley Default Group Bitsize: 1024 |
AES128-GCM-SHA256 (0x9c) | 128 | No | - |
AES128-SHA256 (0x3c) | 128 | No | - |
AES128-SHA (0x2f) | 128 | No | - |
Want to show this result on your webpage? Add this:
<a href='https://xmpp.net/result.php?domain=tdis.sk&type=client'><img src='https://xmpp.net/badge.php?domain=tdis.sk' alt='xmpp.net score' /></a>