See: -https://www.dns-oarc.net/oarc/services/porttest The domain could be vulnerable to the Heartbleed SSL bug says ChromeBleed exztension.
This being confirmed with this report: http://toolbar.netcraft.com/site_report?url=https://www.dns-oarc.net
DNS-OARC back to do your homework, guys!
Verdict: The site offered the Heartbeat TLS extension prior to the Heartbleed disclosure, and is still using the same certificate.
So I gonna wait a little to take a DNS Resolver(s) Test there
Moreover while the server is spreading excessive header information both to the world and potential attackers.
See: http://fetch.scritch.org/%2Bfetch/?url=https%3A%2F%2Fwww.dns-oarc.net&useragent=Fetch+useragent&accept_encoding=
polonus