Following outputs are useful but quite verbose in case of the PASS verdict:
PASS TLS handshake with 1024 bit Diffie-Hellman (DH) [accept dh1024.badtls.io:10005]
+ output: /usr/lib/python2.7/site-packages/requests/packages/urllib3/connection.py:303: SubjectAltNameWarning: Certificate for dh1024.badtls.io has no `subjectAltName`, falling back to check for a `commonName` for now. This feature is being removed by major browsers and deprecated by RFC 2818. (See https://github.com/shazow/urllib3/issues/497 for details.) SubjectAltNameWarning
PASS protect against the FREAK attack [reject www.ssllabs.com:10444]
+ output: javax.net.ssl.SSLProtocolException: Protocol violation: server sent a server key exchange message for key
Should we consider either verbose or terse modes to control the amount of additional information in case of the PASS verdicts?