SSL check results of its-fulda.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for its-fulda.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 16 Oct 2025 19:46:23 +0000

We can not guarantee a secure connection to the mailservers of its-fulda.de!

Please contact the operator of its-fulda.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/its-fulda.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @its-fulda.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail02.its-fulda.de
212.218.18.230
Results incomplete
5 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
mail01.its-fulda.de
78.94.0.74
5
supported
DMZ-POSTFIX
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
12 s

Outgoing Mails

We have not received any emails from a @its-fulda.de address so far. Test mail delivery

Certificates

First seen at:

CN=DMZ-POSTFIX

Certificate chain
  • DMZ-POSTFIX (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • DMZ-POSTFIX
Issuer

Certificate is self-signed.

validity period
Not valid before
2017-03-17
Not valid after
2027-03-15
Fingerprints
SHA256
95:7C:41:62:26:7E:D6:CB:5D:01:CA:51:82:AD:5C:A0:49:8C:8D:03:65:27:22:50:87:D4:70:03:8B:96:8A:C2
SHA1
FA:41:CA:BB:00:4D:A8:E6:A7:FA:54:91:B6:93:57:FE:E2:8D:D2:A1