SSL check results of krailling.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for krailling.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 06 Dec 2023 16:21:25 +0000

We can not guarantee a secure connection to the mailservers of krailling.de!

Please contact the operator of krailling.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/krailling.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @krailling.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mgw.krailling.de
217.86.184.102
10
supported
Default_CA_qfJTDckb0MJqMLL
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
2 s
krailling-de.mail.protection.outlook.com
104.47.17.138
Results incomplete
50
supported
not checked
DANE
missing
PFS
not checked
Heartbleed
not vulnerable
Weak ciphers
not checked
2 s
krailling-de.mail.protection.outlook.com
104.47.17.74
Results incomplete
50
supported
not checked
DANE
missing
PFS
not checked
Heartbleed
not vulnerable
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @krailling.de address so far. Test mail delivery

Certificates

First seen at:

emailAddress=na@example.com,CN=Default_CA_qfJTDckb0MJqMLL,OU=NA,O=NA,L=NA,ST=NA,C=NA

Certificate chain
  • Default_CA_qfJTDckb0MJqMLL (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Country (C)
  • NA
State (ST)
  • NA
Locality (L)
  • NA
Organization (O)
  • NA
Organizational Unit (OU)
  • NA
Common Name (CN)
  • Default_CA_qfJTDckb0MJqMLL
Email
  • na@example.com
Issuer

Certificate is self-signed.

validity period
Not valid before
2022-11-25
Not valid after
2036-12-31
Fingerprints
SHA256
96:A1:15:01:3B:18:E2:55:85:E9:5D:AE:25:DC:C4:86:45:95:48:3E:FA:0D:7D:00:D3:9B:10:60:B6:82:F0:13
SHA1
8F:BF:E5:34:7D:38:31:37:61:E7:D1:A0:8A:5E:73:E4:AD:83:EA:3B
X509v3 extensions
subjectKeyIdentifier
  • 03:18:AE:1C:4A:D9:E8:DC:91:E0:68:0C:56:48:F6:42:1A:14:94:4F
authorityKeyIdentifier
  • keyid:03:18:AE:1C:4A:D9:E8:DC:91:E0:68:0C:56:48:F6:42:1A:14:94:4F
  • DirName:/C=NA/ST=NA/L=NA/O=NA/OU=NA/CN=Default_CA_qfJTDckb0MJqMLL/emailAddress=na@example.com
  • serial:81:4B:E5:72:CA:F4:64:E3