Warning! This site supports export-grade Diffie-Hellman key
exchange and is vulnerable to the Logjam attack. You need to disable
export cipher suites.
Warning! This site uses weak Diffie-Hellman parameters. Your
site is vulnerable to attack and may stop working in Chrome, Firefox,
Safari, and Internet Explorer with upcoming patches. You need to
generate new, 2048-bit Diffie-Hellman parameters.
Warning! This site uses a commonly-shared 1024-bit
Diffie-Hellman group, and might be in range of being broken by a
nation-state. It might be a good idea to generate a unique, 2048-bit
group for the site.
Good News! This site uses a unique or infrequently used
1024-bit Diffie-Hellman group. You are likely safe, but it's still a
good idea to generate a unique, 2048-bit group for the site.
Good News! This site uses strong (2048-bit or better) key
exchange parameters and is safe from the Logjam attack.
Good News! This site is safe from the Logjam attack. It
supports ECDHE, and does not use DHE.
Warning! This site does not support perfect forward secrecy.
While it is safe from the Logjam attack, you should deploy
Elliptic-Curve Diffie-Hellman (ECDHE) in order to protect