SSL check results of failp.it

NEW You can also bulk check multiple servers.

Discover if the mail servers for failp.it can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 07 Mar 2021 18:13:06 +0000

The mailservers of failp.it can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @failp.it addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.failp.it
185.31.65.184
0
supported
failp.it
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
13 s

Outgoing Mails

We have received emails from these servers with @failp.it sender addresses. Test mail delivery

Host TLS Version & Cipher
server.failp.it (185.31.65.184)
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
server.failp.it (185.31.65.183)
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256

Certificates

First seen at:

CN=failp.it

Certificate chain
  • failp.it
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • DST Root CA X3 (Certificate is self-signed.)
            • remaining
            • 2048 bit
            • sha1WithRSAEncryption

Subject
Common Name (CN)
  • failp.it
Alternative Names
  • *.failp.it
  • failp.it
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2021-02-23
Not valid after
2021-05-24
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
33:B1:5A:1D:ED:26:D4:D8:1D:5F:ED:D8:BE:E2:71:90:03:26:83:1F:61:5F:BC:E5:E6:7E:4B:3D:ED:EF:D5:A9
SHA1
64:93:B6:BA:E6:4C:CC:48:36:56:74:16:B5:53:ED:9D:58:26:04:1F
X509v3 extensions
subjectKeyIdentifier
  • 7B:99:45:DB:5D:25:B7:0F:07:AA:85:73:9C:C8:AB:D3:D4:49:5C:D7
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : Feb 23 16:23:14.239 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:44:DF:55:E1:64:46:82:6C:4F:36:16:71:
  • 91:61:1D:6F:1E:08:BE:94:79:0A:02:0C:ED:E9:48:F9:
  • 62:93:CB:9C:02:21:00:F9:56:57:90:4B:4C:35:30:39:
  • 43:D0:FF:7E:CC:9A:88:38:A3:5A:12:4F:72:D9:6B:16:
  • B2:75:43:77:40:46:1D
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 7D:3E:F2:F8:8F:FF:88:55:68:24:C2:C0:CA:9E:52:89:
  • 79:2B:C5:0E:78:09:7F:2E:6A:97:68:99:7E:22:F0:D7
  • Timestamp : Feb 23 16:23:14.232 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:D5:75:FD:4D:0E:C0:C1:90:AE:A5:73:
  • AD:10:F2:9A:37:C1:5F:9E:B5:55:34:04:84:65:CA:53:
  • 1F:01:C1:63:D2:02:21:00:C0:88:58:8D:60:A0:EB:D7:
  • 33:A9:4D:C4:86:40:4A:B8:E4:6C:D3:B4:0E:67:8C:01:
  • 6B:BA:F0:D9:ED:5D:CC:37