してみるテストロゴ
Apache 2.4系でHTTP/2サーバを構築してみるテスト。

Your browser's TLS/HTTP Connection info.


On this page you can check the cryptographic method that your browser presented when initiating a TLS connection and shared cryptographic method with the server.
If you are intentionally presented a vulnerable encryption method, try to update your browser software.

You can check the request history on this TLS session.
Please visit other page of this site and try to access this page again. Ex.Top page

Summary

Established time(JST)2019-08-23 04:58:34
Established time(UTC)2019-08-22 19:58:34
Timeout600 [sec]
Request Time(UTC)2019-08-22 20:07:21.236654 UTC
Number of requestsPlease visit other page of this site and try to access this page again. Ex.Top page
Client IP100.24.209.47
User-AgentCCBot/2.0 (https://commoncrawl.org/faq/)
TLS ProtocolTLSv1.2
compress methodUncompressed
Max fragment lengthDISABLED
HTTP VersionHTTP/1.1
TLS Ext statusthe client don't requested OCSP stapling
Secure renegotiationEnable
Session-id cyclereused
session resumeis resumable
Cipher suiteECDHE-ECDSA-AES128-GCM-SHA256 (Secret bits 128 [bits])

Key exchange

Server Supported ECDHE/DHE Groups
X448
P-521
P-384
P-256
X25519
ECDHE/DHE Groups from client
Shared ECDHE/DHE Groups

Signature

Because reuse session-id, no signature algorythm.

Cipher suite

Server supported cipher list
ECDHE-ECDSA-AES128-CCM8
ECDHE-ECDSA-AES128-CCM
ECDHE-ECDSA-AES128-GCM-SHA256
ECDHE-ECDSA-CHACHA20-POLY1305
ECDHE-RSA-AES128-GCM-SHA256
ECDHE-RSA-CHACHA20-POLY1305
ECDHE-ECDSA-AES128-SHA256
ECDHE-RSA-AES128-SHA256
Cipher list from client
ECDHE-RSA-AES256-SHA
AES256-SHA
ECDHE-RSA-AES128-SHA
AES128-SHA
ECDHE-ECDSA-AES256-GCM-SHA384
ECDHE-ECDSA-AES128-GCM-SHA256
ECDHE-RSA-AES256-GCM-SHA384
AES256-GCM-SHA384
ECDHE-RSA-AES128-GCM-SHA256
AES128-GCM-SHA256
Shared cipher list

HTTP Request

METHODGET
URI/tls_check
HTTP VersionHTTP/1.1

HTTP Request headers

Accepttext/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encodinggzip
Accept-Languageen-US,en;q=0.5
ConnectionKeep-Alive
Hosthttp2.try-and-test.net
If-Modified-SinceSun, 16 Jun 2019 16:51:28 GMT
User-AgentCCBot/2.0 (https://commoncrawl.org/faq/)

Request history on this TLS session.

The HTTP Request History does not work before HTTP/1.1. Please access by HTTP/2 with TLS.
NEXT >> トップページに戻る

(C)Copyrights 2015-2019, non-standard programmer

このサイトは、あくまでも私の個人的体験を、綴ったものです。 軽く参考程度にご利用ください。