SSL check results of glavstroy.ru

NEW You can also bulk check multiple servers.

Discover if the mail servers for glavstroy.ru can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 06 Dec 2023 07:00:36 +0000

We can not guarantee a secure connection to the mailservers of glavstroy.ru!

Please contact the operator of glavstroy.ru and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/glavstroy.ru

Servers

Incoming Mails

These servers are responsible for incoming mails to @glavstroy.ru addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
relay3.glavstroy.ru
212.119.244.180
Results incomplete
5
supported
*.glavstroy.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
relay2.glavstroy.ru
212.119.244.187
10
supported
Postfix.gs.corp.int
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s
mx25.glavstroy.ru
95.161.160.116
15
supported
spb-postfix
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s
relay.glavstroy.ru
185.196.237.22
Results incomplete
20
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @glavstroy.ru address so far. Test mail delivery

Certificates

First seen at:

CN=Postfix.gs.corp.int

Certificate chain
  • Postfix.gs.corp.int (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • Postfix.gs.corp.int
Alternative Names
  • Postfix.gs.corp.int
Issuer

Certificate is self-signed.

validity period
Not valid before
2019-08-30
Not valid after
2029-08-27
Fingerprints
SHA256
23:67:1B:EB:B6:A9:AF:C0:24:51:8F:76:E6:27:C6:17:63:E8:10:31:70:0E:3F:A5:7A:82:BE:D6:ED:CF:01:90
SHA1
D1:86:6E:BF:4C:9D:E5:69:F1:26:EB:7A:21:4C:E8:A6:9C:E7:31:50
First seen at:

CN=*.glavstroy.ru,O=Glavstroy LLC,L=Moscow,ST=Moscow,C=RU

Certificate chain
Subject
Country (C)
  • RU
State (ST)
  • Moscow
Locality (L)
  • Moscow
Organization (O)
  • Glavstroy LLC
Common Name (CN)
  • *.glavstroy.ru
Alternative Names
  • *.glavstroy.ru
  • glavstroy.ru
Issuer
Country (C)
  • BE
Organization (O)
  • GlobalSign nv-sa
Common Name (CN)
  • GlobalSign RSA OV SSL CA 2018
validity period
Not valid before
2022-02-09
Not valid after
2023-03-13
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
F1:D5:EB:51:40:BD:FA:63:1B:C9:BF:6A:67:D2:05:5F:43:F6:74:D8:3E:0A:FA:02:DB:32:80:C7:03:9A:18:FE
SHA1
71:4F:D4:DB:DA:B3:A0:33:A3:A2:6E:38:33:2D:23:8A:77:FA:A4:BE
X509v3 extensions
authorityInfoAccess
  • CA Issuers - URI:http://secure.globalsign.com/cacert/gsrsaovsslca2018.crt
  • OCSP - URI:http://ocsp.globalsign.com/gsrsaovsslca2018
certificatePolicies
  • Policy: 1.3.6.1.4.1.4146.1.20
  • CPS: https://www.globalsign.com/repository/
  • Policy: 2.23.140.1.2.2
crlDistributionPoints
  • Full Name:
  • URI:http://crl.globalsign.com/gsrsaovsslca2018.crl
authorityKeyIdentifier
  • keyid:F8:EF:7F:F2:CD:78:67:A8:DE:6F:8F:24:8D:88:F1:87:03:02:B3:EB
subjectKeyIdentifier
  • 92:29:B3:01:08:24:AB:DE:3B:94:A8:AB:33:24:B6:D6:6F:5B:A5:6A
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : Feb 9 14:59:31.318 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:3D:08:92:11:7A:51:11:8C:A6:DF:A9:E8:
  • 06:37:28:A7:C3:46:F7:11:08:6B:58:60:A2:EA:4B:45:
  • 2A:1C:0D:44:02:21:00:AD:52:DC:17:67:0F:6A:85:5E:
  • 1D:00:F6:A6:9E:D2:AA:5C:35:8B:DF:34:21:2D:75:03:
  • B2:2E:AB:FF:87:6F:59
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 55:81:D4:C2:16:90:36:01:4A:EA:0B:9B:57:3C:53:F0:
  • C0:E4:38:78:70:25:08:17:2F:A3:AA:1D:07:13:D3:0C
  • Timestamp : Feb 9 14:59:31.355 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:DD:EE:66:6A:A1:2C:81:DB:B2:C3:58:
  • 22:9D:EC:E7:14:0E:C1:98:5F:FB:8D:1C:AA:0B:4E:88:
  • A3:2F:6C:A8:B7:02:20:40:2A:8F:00:56:AC:61:C8:62:
  • 30:50:F7:C7:E3:70:61:7F:94:03:B5:5F:4F:E7:CD:E0:
  • 5C:13:16:D0:75:0D:FD
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : AD:F7:BE:FA:7C:FF:10:C8:8B:9D:3D:9C:1E:3E:18:6A:
  • B4:67:29:5D:CF:B1:0C:24:CA:85:86:34:EB:DC:82:8A
  • Timestamp : Feb 9 14:59:31.402 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:05:51:C3:55:F9:F8:38:B2:F0:6F:26:0F:
  • AF:33:FF:76:52:0C:EC:E6:7F:D1:B4:48:F7:1D:C5:0C:
  • 4D:98:B0:6E:02:21:00:C0:30:69:33:69:76:CF:70:C0:
  • FB:92:AB:9F:F6:4F:99:3F:F7:C3:44:43:6C:A7:01:E3:
  • BB:E4:09:C6:8F:04:09
First seen at:

CN=spb-postfix

Certificate chain
  • spb-postfix (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • spb-postfix
Alternative Names
  • spb-postfix
Issuer

Certificate is self-signed.

validity period
Not valid before
2022-02-11
Not valid after
2032-02-09
Fingerprints
SHA256
C9:AD:79:01:FE:0B:7C:B0:BA:3E:59:D9:B1:F2:BD:50:95:80:AB:F0:BA:55:D0:E6:B0:2A:37:22:1F:CB:96:07
SHA1
DF:75:15:77:89:CE:0E:B4:19:5D:D4:49:25:40:69:13:15:80:50:35