SSL check results of iss-reshetnev.ru

NEW You can also bulk check multiple servers.

Discover if the mail servers for iss-reshetnev.ru can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 21 Nov 2022 13:02:09 +0000

We can not guarantee a secure connection to the mailservers of iss-reshetnev.ru!

Please contact the operator of iss-reshetnev.ru and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/iss-reshetnev.ru

Servers

Incoming Mails

These servers are responsible for incoming mails to @iss-reshetnev.ru addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail2.iss-reshetnev.ru
62.33.236.211
10
supported
Default Cert
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
15 s
mail3.iss-reshetnev.ru
62.33.236.212
10
supported
Default Cert
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
15 s
mail.iss-reshetnev.ru
94.199.64.34
Results incomplete
20
supported
not checked
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.0
  • SSLv3
1 s
mail1.iss-reshetnev.ru
62.33.236.198
Results incomplete
20
supported
not checked
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.0
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @iss-reshetnev.ru address so far. Test mail delivery

Certificates

First seen at:

CN=Default Cert

Certificate chain
  • Default Cert (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • Default Cert
Issuer

Certificate is self-signed.

validity period
Not valid before
2022-04-05
Not valid after
2037-12-15
Fingerprints
SHA256
AF:7B:77:04:94:EA:F4:F5:53:0F:2B:86:31:4B:5C:4E:82:8C:2D:4F:45:7E:4D:F5:72:96:C8:55:2C:B8:41:88
SHA1
B5:AC:28:AF:17:F4:5D:CE:B6:15:A6:8C:AB:11:6E:44:74:28:73:C6
X509v3 extensions
subjectKeyIdentifier
  • C3:AA:86:EB:01:E2:EF:59:20:90:1D:FC:6B:A5:F6:5F:DE:CA:CF:6B
authorityKeyIdentifier
  • keyid:C3:AA:86:EB:01:E2:EF:59:20:90:1D:FC:6B:A5:F6:5F:DE:CA:CF:6B