SSL check results of andrespartner.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for andrespartner.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 28 Jan 2021 13:55:08 +0000

We can not guarantee a secure connection to the mailservers of andrespartner.de!

Please contact the operator of andrespartner.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/andrespartner.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @andrespartner.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
omikron.andrespartner.de
2001:8d8:100f:f000::21d
Results incomplete
1 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
omikron.andrespartner.de
80.155.139.181
1
supported
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @andrespartner.de address so far. Test mail delivery

Certificates

First seen at:

emailAddress=administrator@andrespartner.de,OU=IT,O=Andrespartner,L=DUESSELDORF,ST=NRW,C=DE

Certificate chain
  • IT (Certificate is self-signed.)
    • remaining
    • 4096 bit
    • sha512WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Country (C)
  • DE
State (ST)
  • NRW
Locality (L)
  • DUESSELDORF
Organization (O)
  • Andrespartner
Organizational Unit (OU)
  • IT
Email
  • administrator@andrespartner.de
Issuer

Certificate is self-signed.

validity period
Not valid before
2019-09-05
Not valid after
2039-09-05
This certifcate has been verified for the following usages:
  • Digital Signature
  • Non Repudiation
  • Key Encipherment
Fingerprints
SHA256
EF:50:4E:DA:12:66:A2:12:03:ED:45:B9:D7:A2:5C:6A:95:B9:97:20:A7:30:5F:7D:4B:E8:8B:AF:0F:80:37:FA
SHA1
C3:91:79:A3:1F:33:7B:6A:61:3B:FD:23:A8:F5:49:BD:79:B5:48:DC
X509v3 extensions
subjectKeyIdentifier
  • 4F:07:83:73:B8:BE:C4:F4:22:15:EA:E1:7F:C0:9D:4A:BE:A6:0A:97
nsCertType
  • SSL Server
nsComment
  • xca certificate