SSL check results of efw.bcs.org

NEW You can also bulk check multiple servers.

Discover if the mail servers for efw.bcs.org can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 20 Mar 2023 14:34:15 +0000

We can not guarantee a secure connection to the mailservers of efw.bcs.org!

Please contact the operator of efw.bcs.org and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/efw.bcs.org

Servers

Incoming Mails

These servers are responsible for incoming mails to @efw.bcs.org addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
efw-live-0a26f0a72a1f8a43.elb.eu-west-1.amazonaws.com
54.216.164.194
10
supported
Plesk
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
12 s
efw-live-0a26f0a72a1f8a43.elb.eu-west-1.amazonaws.com
108.129.66.214
Results incomplete
10
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
efw-live-0a26f0a72a1f8a43.elb.eu-west-1.amazonaws.com
52.18.121.216
10
supported
Plesk
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
12 s

Outgoing Mails

We have not received any emails from a @efw.bcs.org address so far. Test mail delivery

Certificates

First seen at:

emailAddress=info@plesk.com,CN=Plesk,O=Plesk,L=Schaffhausen,C=CH

Certificate chain
  • Plesk (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Country (C)
  • CH
Locality (L)
  • Schaffhausen
Organization (O)
  • Plesk
Common Name (CN)
  • Plesk
Email
  • info@plesk.com
Issuer

Certificate is self-signed.

validity period
Not valid before
2022-12-22
Not valid after
2023-12-22
This certifcate has been verified for the following usages:
  • TLS Web Server Authentication
Fingerprints
SHA256
5F:DA:25:3E:DD:0F:69:A0:42:2A:11:BA:65:82:50:74:05:A2:4C:56:13:8D:E4:F2:7D:5C:4F:2C:01:35:63:8C
SHA1
D5:6E:13:3C:BE:AC:BD:2E:DA:EF:3B:27:B7:C9:57:53:09:03:3C:FF
First seen at:

emailAddress=info@plesk.com,CN=Plesk,O=Plesk,L=Schaffhausen,C=CH

Certificate chain
  • Plesk (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Country (C)
  • CH
Locality (L)
  • Schaffhausen
Organization (O)
  • Plesk
Common Name (CN)
  • Plesk
Email
  • info@plesk.com
Issuer

Certificate is self-signed.

validity period
Not valid before
2022-12-22
Not valid after
2023-12-22
This certifcate has been verified for the following usages:
  • TLS Web Server Authentication
Fingerprints
SHA256
42:1C:61:93:71:13:49:67:43:6D:94:9B:8E:46:AB:C5:FF:29:36:1E:DC:74:4E:A8:28:95:AF:E0:7B:B6:CC:0A
SHA1
BE:0E:98:EC:EB:EF:B2:5D:C5:EB:CB:43:6B:7C:08:6E:CD:9A:7E:56