int(0) string(0) "" string(1649) "{"given_cipher_suites":["TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256","TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA","TLS_DHE_RSA_WITH_AES_256_GCM_SHA384","TLS_DHE_RSA_WITH_AES_256_CBC_SHA","TLS_DHE_DSS_WITH_AES_256_CBC_SHA","TLS_DHE_RSA_WITH_AES_256_CBC_SHA256","TLS_DHE_RSA_WITH_AES_128_GCM_SHA256","TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256","TLS_DHE_RSA_WITH_AES_128_CBC_SHA","TLS_DHE_DSS_WITH_AES_128_CBC_SHA","TLS_DHE_RSA_WITH_AES_128_CBC_SHA256","TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA","TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA","TLS_RSA_WITH_AES_256_GCM_SHA384","TLS_RSA_WITH_AES_256_CBC_SHA","TLS_RSA_WITH_AES_256_CBC_SHA256","TLS_RSA_WITH_AES_128_GCM_SHA256","TLS_RSA_WITH_AES_128_CBC_SHA","TLS_RSA_WITH_AES_128_CBC_SHA256","TLS_RSA_WITH_3DES_EDE_CBC_SHA"],"ephemeral_keys_supported":true,"session_ticket_supported":false,"tls_compression_supported":false,"unknown_cipher_suite_supported":false,"beast_vuln":false,"able_to_detect_n_minus_one_splitting":false,"insecure_cipher_suites":{"TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA":["uses 3DES which is vulnerable to the Sweet32 attack but was not configured as a fallback in the ciphersuite order"],"TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA":["uses 3DES which is vulnerable to the Sweet32 attack but was not configured as a fallback in the ciphersuite order"]},"tls_version":"TLS 1.2","rating":"Bad"}" object(stdClass)#1 (10) { ["given_cipher_suites"]=> array(28) { [0]=> string(39) "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384" [1]=> string(36) "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA" [2]=> string(39) "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256" [3]=> string(45) "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256" [4]=> string(36) "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA" [5]=> string(37) "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384" [6]=> string(34) "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA" [7]=> string(37) "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" [8]=> string(43) "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" [9]=> string(34) "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA" [10]=> string(35) "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384" [11]=> string(32) "TLS_DHE_RSA_WITH_AES_256_CBC_SHA" [12]=> string(32) "TLS_DHE_DSS_WITH_AES_256_CBC_SHA" [13]=> string(35) "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256" [14]=> string(35) "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256" [15]=> string(41) "TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256" [16]=> string(32) "TLS_DHE_RSA_WITH_AES_128_CBC_SHA" [17]=> string(32) "TLS_DHE_DSS_WITH_AES_128_CBC_SHA" [18]=> string(35) "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256" [19]=> string(33) "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA" [20]=> string(33) "TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA" [21]=> string(31) "TLS_RSA_WITH_AES_256_GCM_SHA384" [22]=> string(28) "TLS_RSA_WITH_AES_256_CBC_SHA" [23]=> string(31) "TLS_RSA_WITH_AES_256_CBC_SHA256" [24]=> string(31) "TLS_RSA_WITH_AES_128_GCM_SHA256" [25]=> string(28) "TLS_RSA_WITH_AES_128_CBC_SHA" [26]=> string(31) "TLS_RSA_WITH_AES_128_CBC_SHA256" [27]=> string(29) "TLS_RSA_WITH_3DES_EDE_CBC_SHA" } ["ephemeral_keys_supported"]=> bool(true) ["session_ticket_supported"]=> bool(false) ["tls_compression_supported"]=> bool(false) ["unknown_cipher_suite_supported"]=> bool(false) ["beast_vuln"]=> bool(false) ["able_to_detect_n_minus_one_splitting"]=> bool(false) ["insecure_cipher_suites"]=> object(stdClass)#2 (2) { ["TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA"]=> array(1) { [0]=> string(113) "uses 3DES which is vulnerable to the Sweet32 attack but was not configured as a fallback in the ciphersuite order" } ["TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA"]=> array(1) { [0]=> string(113) "uses 3DES which is vulnerable to the Sweet32 attack but was not configured as a fallback in the ciphersuite order" } } ["tls_version"]=> string(7) "TLS 1.2" ["rating"]=> string(3) "Bad" }

Your TLS version is: TLS 1.2