This is a test page used to test the correct operation of this domain name. If you can read this page, it means that both the Apache HTTP server installed at this site and your browser are working properly.
This test page is intentional.
Below are expert information about the SSL/TLS session negotiated between this server and your browser. If the outputs below are N/A or empty, you've found a bug and I would be thankful if you could report those to me (apache-admin at germancoding.com)
HTTP version in use:
HTTP/1.1 or HTTP/1.0
SSL/TLS version negotiated:
TLSv1.3
SSL/TLS cipher negotiated (OpenSSL name):
TLS_AES_256_GCM_SHA384
SSL/TLS ciphers offered by client (OpenSSL names):
0x7a7a TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-ECDSA-CHACHA20-POLY1305 ECDHE-RSA-CHACHA20-POLY1305 ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES128-SHA ECDHE-RSA-AES128-SHA ECDHE-ECDSA-AES256-SHA ECDHE-RSA-AES256-SHA AES128-GCM-SHA256 AES256-GCM-SHA384 AES128-SHA AES256-SHA 0x000a
SSL/TLS curves offered by client:
0x0a0a X25519 prime256v1 secp384r1
SSL/TLS server name (SNI) send by client:
backend.research.nocache.de
SSL/TLS negotiated Session ID:
a5778efc37afa910239d273bdbdd4d20bbc52be8fdcf707daa87cb2434232671
SSL/TLS session was reused?
no
Client IP address:
34.127.195.106
Client TCP (UDP for QUIC) port:
59056
This page is a heavily modified version of the Debian Apache Default Page.