Warning! This site supports export-grade Diffie-Hellman key exchange and is vulnerable to the Logjam attack. You need to disable export cipher suites.
Warning! This site uses weak Diffie-Hellman parameters. Your site is vulnerable to attack and may stop working in Chrome, Firefox, Safari, and Internet Explorer with upcoming patches. You need to generate new, 2048-bit Diffie-Hellman parameters.
Warning! This site uses a commonly-shared 1024-bit Diffie-Hellman group, and might be in range of being broken by a nation-state. It might be a good idea to generate a unique, 2048-bit group for the site.
Good News! This site uses a unique or infrequently used 1024-bit Diffie-Hellman group. You are likely safe, but it's still a good idea to generate a unique, 2048-bit group for the site.
Good News! This site uses strong (2048-bit or better) key exchange parameters and is safe from the Logjam attack.
Good News! This site is safe from the Logjam attack. It supports ECDHE, and does not use DHE.
Warning! This site does not support perfect forward secrecy. While it is safe from the Logjam attack, you should deploy Elliptic-Curve Diffie-Hellman (ECDHE) in order to protect your users.

IP Connected TLS Insecure DHE_EXPORT DHE Chrome