All Activityhttp://testmy.net/ipb/discover/TestMy.net Forum - All ActivityenIs my upload speed the problem?So I'm on hold with Cox, at first after telling me to reset my modem (I already did that) she tried to tell me to clear my internet history (um what?), then she reset something on her end which made it worse. They wanted to send a tech out, I told them it shouldn't be the wiring since the upload speed is fine, but this supervisor told me the only thing they can do is send out a tech. So let's see what the tech says tomorrow.Wed, 26 Jul 2017 22:38:58 +0000Any 4x4 or Jeep Enthusiast here?Wed, 26 Jul 2017 22:03:39 +0000Auto test crashes all major browsersI have an Ubuntu Linux virtual server that I wanted to run tests on, but after a few tests, the browser tab crashes and the testing stops. Every browser I've tried is using the most up to date version and it's a clean install with no extensions and I've never used it for web browsing. I have tried: Chrome, Firefox, Opera, and Vivaldi, and all crash. The crash seems to happen when the largest pieces of random data are loaded into the browser.
Anyone have any fix ideas or work around? Is there a extremely stable browser out there I should try? Has anyone written a command line script that does testing without the need for a browser?
Thanks,
-whatistimeWed, 26 Jul 2017 14:48:47 +0000Auto test crashes all major browsersI have an Ubuntu Linux virtual server that I wanted to run tests on, but after a few tests, the browser tab crashes and the testing stops. Every browser I've tried is using the most up to date version and it's a clean install with no extensions and I've never used it for web browsing. I have tried: Chrome, Firefox, Opera, and Vivaldi, and all crash. The crash seems to happen when the largest pieces of random data are loaded into the browser.
Anyone have any fix ideas or work around? Is there a extremely stable browser out there I should try? Has anyone written a command line script that does testing without the need for a browser?
Thanks,
-whatistimeWed, 26 Jul 2017 14:47:59 +0000My net slowI need help on modem kind slow,need to speed up.Wed, 26 Jul 2017 09:57:23 +0000Make speed test results available as data downloadsAS a new user I like this service, but would appreciate it more if I were able to access the data for download so I can do some local processing on them and produce long-term statistics on my connection. It may be this feature is already available, but I couldn't find it. SWed, 26 Jul 2017 08:52:56 +0000Is my upload speed the problem?My provider is cox. I often have tabs that either freeze or are stuck refreshing for like 15 or 20 seconds. I did a speed test and my download speed is 76 Mbps but my upload is 1 or less.
I know I had a frustrating time waiting for steam to send my game saves to the cloud last night. Will complaining to my ISP even help?Tue, 25 Jul 2017 21:17:21 +0000User 'Find Content' link is brokenThanks for the info. I only just noticed it for the first time earlier today, so thought this was a new issue.
Something for IPB to fix then.Tue, 25 Jul 2017 15:14:01 +0000User 'Find Content' link is brokenWhen I hover my mouse over any user, it brings up a menu like the following:
When I click 'Find Content' as highlighted above, it gives me the following page:
I checked with a few other users, but get that same screen. It seems like this link is at fault. If I view their profile page and click 'See their activity' there, it loads up fine.Tue, 25 Jul 2017 11:11:14 +0000cleaning a pc with air compressorAs ridiculous as it sounds, most computer components such as the motherboard, PSU and certain expansion cards can survive a full dishwasher cycle. Obviously that's not how I recommend cleaning a PC.
The following 8-year old video is an example. The internals were covered in cigarette smoke residue, so he decided to dismantle the components and put them through the dish washer, with the exception of the case, battery and the hard disk.
I also enjoy watching videos on old hardware such as restoration videos. I have come ones where such hobbyists put components through a dishwasher cycle to clean extensive debris build-up from being left for 10+ years in storage such as a dusty shed.
As long as no moisture remains when the PC is powered up, it should be fine. I generally clean my PC with an air duster, which is basically an aerosol can filled with propellant gas. Here in Ireland, humidity is usually on the high side, e.g. I run a dehumidifier to keep the indoor level below 60%.
The only component I may wash is the keyboard. I have a Corsair Cherry Red Mechanical keyboard that I accidentally knocked a glass of cider on. I immediately unplugged it, tried wiping off what I could and let it dry. Once dry, many of the letters were sticking. When I started removing the keys to try cleaning below, I realised the mechanical switches were jamming.
With what appeared to be a ruined keyboard that I only purchased a few months before the incident, I figured I'll try giving it a bath as we don't have a dishwasher. I partially filled a wide container with water from our dehumidifier (since it's effectively distilled), soaked the keyboard and pushed each key multiples times to force water through the switches. I left it to dry for about a week. It's fully functional again, all keys work and no sticking or other issue since.Tue, 25 Jul 2017 10:34:02 +0000Dif Browsers VASTLY dif speeds?One other check - Do you use any privacy extension in Chome, such as a VPN or proxy?
Such extensions route traffic through a remote server to anonymise traffic, such as hide one's IP address. Depending on the server congestion, this can severely limit your throughput, particularly with free privacy add-ons.
Another reason I ask is that you recently mentioned you were getting RC4 errors in Chrome. Have you checked the responses in that thread?Tue, 25 Jul 2017 09:23:38 +0000You know you have a borked up connection when .....LOL, someone broke pfsense!Tue, 25 Jul 2017 04:45:07 +0000cleaning a pc with air compressorFor the past 15 years I have always used an air compressor... 60 gallons @ 175PSI set to 80 on the hose, never once has static been an issue. I also don't bother with a dryer on the line, and yeah, I see moisture come out on short bursts, never once has it been an issue for me though I don't have droplets of water come out either. You are more liable to see static issues on plastic hose attachments with a vacuum cleaner and the attachment being that close to the machine for it to suck any decent amounts of dust away. Chances of static jumping from the air in a compressor hose to your machine when you have the air tool ~24 inches away is pretty much non-existent.
What is bad is having the pressure too high when you are too close to the machine with the tool, and when you let the fans spin freely. Gonna blow SMD's off or cook a bearing real fast.Tue, 25 Jul 2017 04:43:30 +0000Dif Browsers VASTLY dif speeds?I believe @CA3LE mentioned something about this years ago, and for some browsers the culprit is poor hard-drive performance.
Some browsers (especially when downloading large files) will attempt to save them to disk (especially if they don't know how you plan to use the result). This is usually a mostly unbuffered operation, meaning that the browser writes to disk as it downloads the data. Firefox is very likely streaming to RAM and then dumping it when complete.
I would recommend looking into disk IOPS during testing, to determine if this is the case.
Thanks,
EBrownMon, 24 Jul 2017 16:14:08 +0000cleaning a pc with air compressorI would not recommend doing general PC cleaning with an air compressor for three reasons:
1. Air (especially dry) traveling at high speeds and pressures creates static electricity, which can short and damage or destroy components.
2. Forcing air into a case with that pressure and speed can embed particulate into undesirable locations.
3. It is impossible to control the debris leaving the PC in that manner, and dust particulate may create a hazard to persons nearby.
Instead, what I would recommend is two stage:
1. Remove all fans (including CPU heatsink and fan) from the computer, blow each fan out with compressed air individually. Make sure to blow air into the clean side of the fan/heatsink being cleaned (to force air out the same path it came in, which is usually where the dust cakes up).
2. With the fans removed, remove the CPU itself and RAM sticks, then ground the PC and a vaccum and use a small precision attachment on a vacuum cleaner to remove the remaining dust from the PC case. Make sure not to directly attack / suck against the motherboard itself (or hard drives, PSU, etc.), and do this in a room with about 40-60% relative humidity. (The humidity will help reduce static discharge in the air and help prevent ESD from damaging components in the PC.)
Been cleaning PC's this way for years, and currently zero failure incidents as a result of cleaning. (Knock on wood.)
Thanks,
EBrownMon, 24 Jul 2017 16:11:38 +0000cleaning a pc with air compressorI just bought a portable air compressor from 4WO truck parts It is for my car but I'm thinking of using it to clean my computer also since the pressure can be adjusted. Just wondering what everyone thinks of using a compressor? I'm planning to set the pressure at 30-40 and hold it fairly far away.Mon, 24 Jul 2017 07:05:51 +0000Dif Browsers VASTLY dif speeds?ODDLY Chrome tests my DnLd speed at 3.2 mps while FireFox in the 50+ mps.
Location tests are the same as are the test times within minutes.
No other programs are running to taint the results.
How is this possible?Sun, 23 Jul 2017 23:22:30 +0000Just stopping by to say howdy... :-)Great to hear from you MamaTSun, 23 Jul 2017 13:39:19 +0000Just stopping by to say howdy... :-)I've been busy busy busy...had a work accident in April...I'll be back to work in a week or so...been on light duty for 2 months. I can only imagine how much y'all have missed meSat, 22 Jul 2017 18:06:31 +0000New Router helped my speedsI'm on a Spectrum 100 Mbps down load, 10 Mbps upload plan. I replaced my 100 Mbps wired router with a used $57 5th gen Apple AirPort Extreme Base Station (gigabit Ethernet)
my speeds improved from 80 Mbps average upload to about 116 Mbps. The first pic shows the before and after plot. The second pic is the latest average.
the 3rd pic is one test plot with the old router. 4th pic is one test with plot the new router.
TestMy helped me identify the potential limitation of the 100 Mbps wired router (it was trying very hard), and testing here documents the improvement. Great site.Fri, 21 Jul 2017 02:48:00 +0000Any 4x4 or Jeep Enthusiast here?1985 F350 Dually 4x4 (with 77,000 miles). Runs 1 1/4 ton, flatbed (obviously), I dropped a plow on the front of it, and a light on the roof.
I'll try and remind myself to take a good picture of it with plow next time I visit my dad. (Moved into a city and apparently they don't like me parking a 24' monstrosity in the apartment parking lot.)Thu, 20 Jul 2017 23:41:40 +0000Any 4x4 or Jeep Enthusiast here?Haha, definitely. Is that an F250?Thu, 20 Jul 2017 23:36:10 +0000Any 4x4 or Jeep Enthusiast here?I don't off-road but my truck is bigger.Thu, 20 Jul 2017 23:33:45 +0000No longer detecting my provider?Thu, 20 Jul 2017 23:06:37 +0000RC4, error growingSo I started nmap up, ran some scans (I'm sure @CA3LE won't mind me running some penetration tests against his server) on the SSL ports, and I couldn't find RC4 on the list of ciphers, at all, but then I did on an SMTPS (465) port, but you shouldn't be affected by that.
So I got curious, and researched further, and you said it happens about every 10th website, so I have a few follow up questions:
1. Are you using Wireless?
a. If so, are you using WEP? Apparently RC4 was used in the WEP security standard (which has been an insecurity standard for years now).
2. Are you certain there is no MITM attack against you?
For those interested, here's the result of my nmap scan:
Elliotts-iMac:~ elliottbrown$ nmap --script ssl-cert,ssl-enum-ciphers -p 443,465,993,995 www.testmy.net
Starting Nmap 7.50 ( https://nmap.org ) at 2017-07-20 18:29 EDT
Nmap scan report for www.testmy.net (64.111.22.10)
Host is up (0.088s latency).
rDNS record for 64.111.22.10: testmy.net
PORT STATE SERVICE
443/tcp open https
| ssl-cert: Subject: commonName=testmy.net
| Subject Alternative Name: DNS:testmy.net
| Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2017-07-06T06:00:00
| Not valid after: 2017-10-04T06:00:00
| MD5: 415f 2e2b ee78 0642 6813 4e47 743b 9831
|_SHA-1: ecac a111 d818 d982 1039 acea 2fe4 9b6c c975 ca43
| ssl-enum-ciphers:
| TLSv1.0:
| ciphers:
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: server
| TLSv1.1:
| ciphers:
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: server
| TLSv1.2:
| ciphers:
| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: server
|_ least strength: A
465/tcp open smtps
| ssl-cert: Subject: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US
| Issuer: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2016-05-03T21:11:36
| Not valid after: 2017-05-03T21:11:36
| MD5: a6bd 9cdc 510e 115e 98b5 bca2 ff64 1af8
|_SHA-1: 47a4 68dd ce19 fa99 e4d2 b60e 94a5 0599 217d c1f9
| ssl-enum-ciphers:
| SSLv3:
| ciphers:
| TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
| TLS_DH_anon_WITH_3DES_EDE_CBC_SHA - F
| TLS_DH_anon_WITH_AES_128_CBC_SHA - F
| TLS_DH_anon_WITH_AES_256_CBC_SHA - F
| TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA - F
| TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA - F
| TLS_DH_anon_WITH_RC4_128_MD5 - F
| TLS_DH_anon_WITH_SEED_CBC_SHA - F
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
| TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA - F
| TLS_ECDH_anon_WITH_AES_128_CBC_SHA - F
| TLS_ECDH_anon_WITH_AES_256_CBC_SHA - F
| TLS_ECDH_anon_WITH_RC4_128_SHA - F
| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_IDEA_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
| TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
| TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: client
| warnings:
| 64-bit block cipher 3DES vulnerable to SWEET32 attack
| 64-bit block cipher IDEA vulnerable to SWEET32 attack
| Broken cipher RC4 is deprecated by RFC 7465
| CBC-mode cipher in SSLv3 (CVE-2014-3566)
| Ciphersuite uses MD5 for message integrity
| Key exchange (dh 1024) of lower strength than certificate key
| TLSv1.0:
| ciphers:
| TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
| TLS_DH_anon_WITH_3DES_EDE_CBC_SHA - F
| TLS_DH_anon_WITH_AES_128_CBC_SHA - F
| TLS_DH_anon_WITH_AES_256_CBC_SHA - F
| TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA - F
| TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA - F
| TLS_DH_anon_WITH_RC4_128_MD5 - F
| TLS_DH_anon_WITH_SEED_CBC_SHA - F
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
| TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA - F
| TLS_ECDH_anon_WITH_AES_128_CBC_SHA - F
| TLS_ECDH_anon_WITH_AES_256_CBC_SHA - F
| TLS_ECDH_anon_WITH_RC4_128_SHA - F
| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_IDEA_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
| TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
| TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: client
| warnings:
| 64-bit block cipher 3DES vulnerable to SWEET32 attack
| 64-bit block cipher IDEA vulnerable to SWEET32 attack
| Broken cipher RC4 is deprecated by RFC 7465
| Ciphersuite uses MD5 for message integrity
| Key exchange (dh 1024) of lower strength than certificate key
| TLSv1.1:
| ciphers:
| TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
| TLS_DH_anon_WITH_3DES_EDE_CBC_SHA - F
| TLS_DH_anon_WITH_AES_128_CBC_SHA - F
| TLS_DH_anon_WITH_AES_256_CBC_SHA - F
| TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA - F
| TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA - F
| TLS_DH_anon_WITH_RC4_128_MD5 - F
| TLS_DH_anon_WITH_SEED_CBC_SHA - F
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
| TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA - F
| TLS_ECDH_anon_WITH_AES_128_CBC_SHA - F
| TLS_ECDH_anon_WITH_AES_256_CBC_SHA - F
| TLS_ECDH_anon_WITH_RC4_128_SHA - F
| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_IDEA_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
| TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
| TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: client
| warnings:
| 64-bit block cipher 3DES vulnerable to SWEET32 attack
| 64-bit block cipher IDEA vulnerable to SWEET32 attack
| Broken cipher RC4 is deprecated by RFC 7465
| Ciphersuite uses MD5 for message integrity
| Key exchange (dh 1024) of lower strength than certificate key
| TLSv1.2:
| ciphers:
| TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
| TLS_DH_anon_WITH_3DES_EDE_CBC_SHA - F
| TLS_DH_anon_WITH_AES_128_CBC_SHA - F
| TLS_DH_anon_WITH_AES_128_CBC_SHA256 - F
| TLS_DH_anon_WITH_AES_128_GCM_SHA256 - F
| TLS_DH_anon_WITH_AES_256_CBC_SHA - F
| TLS_DH_anon_WITH_AES_256_CBC_SHA256 - F
| TLS_DH_anon_WITH_AES_256_GCM_SHA384 - F
| TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA - F
| TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA - F
| TLS_DH_anon_WITH_RC4_128_MD5 - F
| TLS_DH_anon_WITH_SEED_CBC_SHA - F
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
| TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA - F
| TLS_ECDH_anon_WITH_AES_128_CBC_SHA - F
| TLS_ECDH_anon_WITH_AES_256_CBC_SHA - F
| TLS_ECDH_anon_WITH_RC4_128_SHA - F
| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_IDEA_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
| TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
| TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: client
| warnings:
| 64-bit block cipher 3DES vulnerable to SWEET32 attack
| 64-bit block cipher IDEA vulnerable to SWEET32 attack
| Broken cipher RC4 is deprecated by RFC 7465
| Ciphersuite uses MD5 for message integrity
| Key exchange (dh 1024) of lower strength than certificate key
|_ least strength: F
993/tcp open imaps
| ssl-cert: Subject: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US
| Issuer: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2016-05-03T21:11:36
| Not valid after: 2017-05-03T21:11:36
| MD5: a6bd 9cdc 510e 115e 98b5 bca2 ff64 1af8
|_SHA-1: 47a4 68dd ce19 fa99 e4d2 b60e 94a5 0599 217d c1f9
| ssl-enum-ciphers:
| TLSv1.0:
| ciphers:
| TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: client
| warnings:
| 64-bit block cipher 3DES vulnerable to SWEET32 attack
| Key exchange (dh 1024) of lower strength than certificate key
| TLSv1.1:
| ciphers:
| TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: client
| warnings:
| 64-bit block cipher 3DES vulnerable to SWEET32 attack
| Key exchange (dh 1024) of lower strength than certificate key
| TLSv1.2:
| ciphers:
| TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: client
| warnings:
| 64-bit block cipher 3DES vulnerable to SWEET32 attack
| Key exchange (dh 1024) of lower strength than certificate key
|_ least strength: D
995/tcp open pop3s
| ssl-cert: Subject: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US
| Issuer: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2016-05-03T21:11:36
| Not valid after: 2017-05-03T21:11:36
| MD5: a6bd 9cdc 510e 115e 98b5 bca2 ff64 1af8
|_SHA-1: 47a4 68dd ce19 fa99 e4d2 b60e 94a5 0599 217d c1f9
| ssl-enum-ciphers:
| TLSv1.0:
| ciphers:
| TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: client
| warnings:
| 64-bit block cipher 3DES vulnerable to SWEET32 attack
| Key exchange (dh 1024) of lower strength than certificate key
| TLSv1.1:
| ciphers:
| TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: client
| warnings:
| 64-bit block cipher 3DES vulnerable to SWEET32 attack
| Key exchange (dh 1024) of lower strength than certificate key
| TLSv1.2:
| ciphers:
| TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
| TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
| compressors:
| NULL
| cipher preference: client
| warnings:
| 64-bit block cipher 3DES vulnerable to SWEET32 attack
| Key exchange (dh 1024) of lower strength than certificate key
|_ least strength: D
Nmap done: 1 IP address (1 host up) scanned in 27.86 seconds
Elliotts-iMac:~ elliottbrown$
The letter after the cipher is a letter from A-F, indicating grade of the cipher (A being best, F being worst), you'll notice there are a few RC4 ciphers under the 465, 993 and 995 ports (graded F appropriately), but all of the TLS ciphers are grade A.
The lowest cipher strength (according to nmap) on https://www.testmy.net/ is a grade A, so Chrome should definitely not be flagging this site. (In fact, based on this information, testmy.net would refuse an RC4 cipher connection, period.)
You definitely have a different issue going on, and I'm curious as to what that is.
Thanks,
EBrownThu, 20 Jul 2017 22:41:38 +0000