SSL check results of arjanenmaaike.nl

NEW You can also bulk check multiple servers.

Discover if the mail servers for arjanenmaaike.nl can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 17 Sep 2023 10:31:28 +0000

We can not guarantee a secure connection to the mailservers of arjanenmaaike.nl!

Please contact the operator of arjanenmaaike.nl and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/arjanenmaaike.nl

Servers

Incoming Mails

These servers are responsible for incoming mails to @arjanenmaaike.nl addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
arjanenmaaike.nl
62.238.166.9
10
supported
Sophos SSL CA_wJWSdyzP69Sq6bv
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
2 s
relay.transip.nl
2a01:7c8:7c8::12
Results incomplete
20
supported
not checked
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
relay.transip.nl
2a01:7c8:7c8::29
Results incomplete
20
supported
not checked
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
relay.transip.nl
149.210.149.29
Results incomplete
20
supported
not checked
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
relay.transip.nl
149.210.149.12
Results incomplete
20
supported
not checked
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @arjanenmaaike.nl address so far. Test mail delivery

Certificates

First seen at:

emailAddress=support@sophos.com,CN=Sophos SSL CA_wJWSdyzP69Sq6bv,OU=NSG,O=Sophos,ST=Oxfordshire,C=GB

Certificate chain
  • Sophos SSL CA_wJWSdyzP69Sq6bv (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Country (C)
  • GB
State (ST)
  • Oxfordshire
Organization (O)
  • Sophos
Organizational Unit (OU)
  • NSG
Common Name (CN)
  • Sophos SSL CA_wJWSdyzP69Sq6bv
Email
  • support@sophos.com
Issuer

Certificate is self-signed.

validity period
Not valid before
2015-08-01
Not valid after
2036-12-31
Fingerprints
SHA256
6A:94:17:7E:26:96:73:99:06:A3:B2:1C:2C:03:A3:22:04:3E:32:79:19:D8:64:E8:EA:19:32:E1:CF:15:BB:6B
SHA1
6C:54:32:66:48:B8:C1:CF:AB:F7:37:D9:27:BB:4C:F6:9A:A3:04:C9
X509v3 extensions
subjectKeyIdentifier
  • 45:0F:CB:A2:B9:5B:19:33:B9:A6:E2:ED:73:0E:D3:3D:F9:56:E6:86
authorityKeyIdentifier
  • keyid:45:0F:CB:A2:B9:5B:19:33:B9:A6:E2:ED:73:0E:D3:3D:F9:56:E6:86
  • DirName:/C=GB/ST=Oxfordshire/O=Sophos/OU=NSG/CN=Sophos SSL CA_wJWSdyzP69Sq6bv/emailAddress=support@sophos.com
  • serial:01

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.relay.transip.nl
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid