The site is mostly OK. It just needs to properly test for the BEAST vulnerability (ideally it would check for a 1 byte record, but a whitelist of user agents known to implement 1/n-1 record splitting would suffice in the interim), instead of assuming anyone with TLSv1.0 is vulnerable. And it should rate TLSv1.0 (with record splitting) as "Improvable" rather than "Bad".
But yes, being faced with a huge "Your SSL client is Bad" banner when visiting from up-to-date Firefox is FUD.
http://security.stackexchange.com/questions/32817/why-dont-m...