SSL check results of b-text.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for b-text.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 10 Jun 2021 09:43:32 +0000

We can not guarantee a secure connection to the mailservers of b-text.de!

Please contact the operator of b-text.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/b-text.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @b-text.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
protect1.servermanager.app
84.200.96.125
Results incomplete
0
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
protect2.servermanager.app
194.45.196.244
10
supported
protect3.servermanager.app
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @b-text.de address so far. Test mail delivery

Certificates

First seen at:

CN=protect3.servermanager.app

Certificate chain
  • protect3.servermanager.app
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • DST Root CA X3 (Certificate is self-signed.)
            • remaining
            • 2048 bit
            • sha1WithRSAEncryption

Subject
Common Name (CN)
  • protect3.servermanager.app
Alternative Names
  • protect3.servermanager.app
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2021-05-20
Not valid after
2021-08-18
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
97:3F:E2:80:50:01:63:EF:EF:42:C5:DB:54:F2:6B:4A:0F:6D:A2:55:A6:AA:02:BA:C7:54:E3:C9:B0:67:24:D3
SHA1
AD:01:32:EB:3D:8B:32:99:17:6E:FE:52:F7:A6:00:D1:C7:0E:2F:37
X509v3 extensions
subjectKeyIdentifier
  • EC:BD:27:27:DE:4E:A4:48:A1:2B:1B:7F:11:2F:DC:63:FE:CA:90:6A
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5C:DC:43:92:FE:E6:AB:45:44:B1:5E:9A:D4:56:E6:10:
  • 37:FB:D5:FA:47:DC:A1:73:94:B2:5E:E6:F6:C7:0E:CA
  • Timestamp : May 20 02:43:15.660 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:89:C1:C8:E5:98:AC:B3:15:2F:1F:1A:
  • 05:86:4D:D5:B1:A8:20:7C:54:0A:AD:29:D1:98:A0:44:
  • DF:48:3F:C8:DC:02:21:00:ED:FA:AC:EE:C0:2E:DE:90:
  • 76:47:3F:D5:91:CC:CF:1C:46:84:B0:C4:EB:7F:E7:B9:
  • 88:98:A2:23:5E:96:0D:BF
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : F6:5C:94:2F:D1:77:30:22:14:54:18:08:30:94:56:8E:
  • E3:4D:13:19:33:BF:DF:0C:2F:20:0B:CC:4E:F1:64:E3
  • Timestamp : May 20 02:43:15.645 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:AC:3B:25:E5:47:F7:AA:C8:F5:7D:D0:
  • 2B:F7:E8:64:31:69:34:D3:DF:4D:DB:EE:3E:D1:0E:D2:
  • 0F:25:9A:B5:B7:02:21:00:CB:14:C4:B0:99:09:04:73:
  • 46:06:3E:B8:0B:9F:B2:B6:C2:C1:A7:C1:4B:97:E8:85:
  • 4B:27:D0:6B:56:82:4A:B7