It works!

This is a test page used to test the correct operation of this domain name. If you can read this page, it means that both the Apache HTTP server installed at this site and your browser are working properly.

This test page is intentional.

SSL/TLS connection information (for experts)

Below are expert information about the SSL/TLS session negotiated between this server and your browser. If the outputs below are N/A or empty, you've found a bug and I would be thankful if you could report those to me (apache-admin at germancoding.com)

HTTP version in use: HTTP/1.1 or HTTP/1.0

SSL/TLS version negotiated: TLSv1.3

SSL/TLS cipher negotiated (OpenSSL name): TLS_AES_256_GCM_SHA384

SSL/TLS ciphers offered by client (OpenSSL names):

0xeaea
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256
ECDHE-ECDSA-AES128-GCM-SHA256
ECDHE-RSA-AES128-GCM-SHA256
ECDHE-ECDSA-CHACHA20-POLY1305
ECDHE-RSA-CHACHA20-POLY1305
ECDHE-ECDSA-AES256-GCM-SHA384
ECDHE-RSA-AES256-GCM-SHA384
ECDHE-ECDSA-AES128-SHA
ECDHE-RSA-AES128-SHA
ECDHE-ECDSA-AES256-SHA
ECDHE-RSA-AES256-SHA
AES128-GCM-SHA256
AES256-GCM-SHA384
AES128-SHA
AES256-SHA
0x000a				

SSL/TLS curves offered by client:

0xdada
X25519
prime256v1
secp384r1				

SSL/TLS server name (SNI) send by client: backend.research.nocache.de

SSL/TLS negotiated Session ID: 265dc39359f51977419630164530a647737d81d2509e258a0c1f8a0f467e9fff

SSL/TLS session was reused? no

Client IP address: 34.127.226.7

Client TCP (UDP for QUIC) port: 38788

This page is a heavily modified version of the Debian Apache Default Page.