SSL check results of dision.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for dision.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 13 Oct 2021 10:18:08 +0000

We can not guarantee a secure connection to the mailservers of dision.de!

Please contact the operator of dision.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/dision.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @dision.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail04.ocip.de
213.109.161.122
5
supported
mail04
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s
mail03.ocip.de
213.252.135.213
Results incomplete
10
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
7 s

Outgoing Mails

We have not received any emails from a @dision.de address so far. Test mail delivery

Certificates

First seen at:

CN=mail04

Certificate chain
  • mail04 (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • mail04
Issuer

Certificate is self-signed.

validity period
Not valid before
2016-08-02
Not valid after
2026-07-31
Fingerprints
SHA256
20:28:40:E5:B4:A7:76:1C:65:7F:EB:3E:8B:0D:1E:86:62:9C:12:8C:D7:B0:98:F1:E4:92:33:0B:7E:D6:CC:DB
SHA1
61:6C:74:75:DB:23:3B:A9:C5:F5:88:FC:5B:08:0A:A3:77:91:BB:6E