SSL check results of hein.homelinux.com

NEW You can also bulk check multiple servers.

Discover if the mail servers for hein.homelinux.com can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 24 Nov 2021 22:21:39 +0000

We can not guarantee a secure connection to the mailservers of hein.homelinux.com!

Please contact the operator of hein.homelinux.com and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/hein.homelinux.com

Servers

Incoming Mails

These servers are responsible for incoming mails to @hein.homelinux.com addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
hein.homelinux.com
188.68.50.184
-
supported
hein.homelinux.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s
hein.homelinux.com
fe80::c826:13ff:fe10:3c0d
Results incomplete
- not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @hein.homelinux.com address so far. Test mail delivery

Certificates

First seen at:

CN=hein.homelinux.com

Certificate chain
  • hein.homelinux.com
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Unknown Authority

      R3
Subject
Common Name (CN)
  • hein.homelinux.com
Alternative Names
  • hein.homelinux.com
  • owncloud.hein.homelinux.com
  • webmail.hein.homelinux.com
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2021-11-07
Not valid after
2022-02-05
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
02:BE:68:25:1A:F8:43:4A:4A:52:46:A5:24:93:AB:82:61:8C:4E:11:C0:98:BA:DB:FE:93:84:FF:22:9F:69:34
SHA1
23:34:3F:B3:F6:9C:40:FE:8C:59:3F:19:D4:27:D2:CF:74:60:69:F1
X509v3 extensions
subjectKeyIdentifier
  • FD:54:16:68:E5:05:18:33:64:F7:66:41:88:73:10:55:9A:78:E8:5D
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 41:C8:CA:B1:DF:22:46:4A:10:C6:A1:3A:09:42:87:5E:
  • 4E:31:8B:1B:03:EB:EB:4B:C7:68:F0:90:62:96:06:F6
  • Timestamp : Nov 7 18:23:16.945 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:72:78:D1:65:15:20:27:63:80:92:B5:2D:
  • CA:67:3A:26:78:8F:8B:06:00:5B:F1:33:A6:9E:49:E8:
  • 97:9C:FA:A3:02:21:00:FC:87:9A:ED:6D:4C:4B:93:18:
  • 99:DA:CE:33:78:49:FA:2C:3D:C3:40:9E:3A:EE:91:99:
  • 77:FD:A9:4A:DB:B6:E5
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 46:A5:55:EB:75:FA:91:20:30:B5:A2:89:69:F4:F3:7D:
  • 11:2C:41:74:BE:FD:49:B8:85:AB:F2:FC:70:FE:6D:47
  • Timestamp : Nov 7 18:23:16.971 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:C5:9B:FB:80:DB:18:E5:BC:3E:F6:67:
  • 6C:BA:42:9F:57:AE:39:2C:D6:58:DF:BA:14:31:FE:F6:
  • D2:B9:99:FD:48:02:21:00:AC:CC:6F:49:FE:69:D2:A5:
  • B3:01:B4:12:8F:E1:D8:3E:3D:EC:8E:A5:5D:CB:A5:61:
  • 9D:E2:89:58:35:D1:17:3D