SSL check results of enmore.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for enmore.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 27 May 2020 00:35:44 +0000

The mailservers of enmore.de can be reached through an encrypted connection.

However, we found problems that may affect the security.

Servers

Incoming Mails

These servers are responsible for incoming mails to @enmore.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx01.enmore-gruppe.de
2003:4a:23:1::60
10
supported
SRVMXS01.enmore.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mx01.enmore-gruppe.de
62.157.103.74
10
supported
SRVMXS01.enmore.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mx03.enmore-gruppe.de
130.180.81.60
20
supported
SRVMXS01.enmore.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s

Outgoing Mails

We have received emails from these servers with @enmore.de sender addresses. Test mail delivery

Host TLS Version & Cipher
mail-am6eur05on20626.outbound.protection.outlook.com (IPv6:2a01:111:f400:7e1b::626)
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
mail.enmore-gruppe.de (212.185.126.214)
TLSv1.2 ECDHE-RSA-AES256-SHA384

Certificates

First seen at:

CN=SRVMXS01.enmore.de,O=enmoregruppe

Certificate chain
  • SRVMXS01.enmore.de (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha1WithRSAEncryption
    • Hostname Mismatch
    • Expired
    • Unknown Authority

Subject
Organization (O)
  • enmoregruppe
Common Name (CN)
  • SRVMXS01.enmore.de
Issuer

Certificate is self-signed.

validity period
Not valid before
2016-03-18
Not valid after
2018-12-13
Fingerprints
SHA256
CD:5A:FE:32:39:C6:70:EE:88:E9:A9:50:28:D4:BA:FE:38:88:4A:7F:3B:0B:57:53:DC:89:33:99:42:3B:C8:5C
SHA1
E0:AE:D4:D1:E1:EE:9C:B2:0B:E2:15:1E:40:07:62:BA:59:6D:70:22
X509v3 extensions
subjectKeyIdentifier
  • 6A:5A:28:A8:B7:6F:4E:06:FE:F9:35:D1:90:C1:04:60:08:40:7F:92
authorityKeyIdentifier
  • keyid:6A:5A:28:A8:B7:6F:4E:06:FE:F9:35:D1:90:C1:04:60:08:40:7F:92

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mx01.enmore-gruppe.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid
_25._tcp.mx03.enmore-gruppe.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid