SSL check results of mail.rebelsheep.software

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail.rebelsheep.software can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 09 Nov 2024 01:57:59 +0000

We can not guarantee a secure connection to the mailservers of mail.rebelsheep.software!

Please contact the operator of mail.rebelsheep.software and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/mail.rebelsheep.software

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail.rebelsheep.software addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.rebelsheep.software
79.116.45.223
-
supported
rebelsheep.software
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mail.rebelsheep.software
2a0c:5a82:1703:b100:a236:9fff:feec:4968
Results incomplete
- not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s

Outgoing Mails

We have not received any emails from a @mail.rebelsheep.software address so far. Test mail delivery

Certificates

First seen at:

CN=rebelsheep.software

Certificate chain
Subject
Common Name (CN)
  • rebelsheep.software
Alternative Names
  • rebelsheep.software
  • www.rebelsheep.software
Issuer
Country (C)
  • GB
State (ST)
  • Greater Manchester
Locality (L)
  • Salford
Organization (O)
  • Sectigo Limited
Common Name (CN)
  • Sectigo RSA Domain Validation Secure Server CA
validity period
Not valid before
2024-11-09
Not valid after
2025-12-10
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
22:FB:C9:59:36:C1:8A:18:86:10:55:26:16:B7:4D:CC:4A:D7:06:F2:DE:F9:91:AC:E3:15:19:61:ED:4D:37:AD
SHA1
94:D9:3F:DB:DE:6C:59:87:88:0B:DB:54:1F:6D:8F:CD:B0:0B:87:85
X509v3 extensions
authorityKeyIdentifier
  • keyid:8D:8C:5E:C4:54:AD:8A:E1:77:E9:9B:F9:9B:05:E1:B8:01:8D:61:E1
subjectKeyIdentifier
  • 85:39:16:E6:59:25:94:17:B0:DD:A0:B9:54:D8:22:D6:0F:37:2E:37
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.7
  • CPS: https://sectigo.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • CA Issuers - URI:http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
  • OCSP - URI:http://ocsp.sectigo.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DD:DC:CA:34:95:D7:E1:16:05:E7:95:32:FA:C7:9F:F8:
  • 3D:1C:50:DF:DB:00:3A:14:12:76:0A:2C:AC:BB:C8:2A
  • Timestamp : Nov 9 01:30:08.654 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:8B:E7:2B:CA:4A:04:FF:47:EE:DD:B2:
  • F7:EA:AD:8C:9E:1A:E7:2A:2B:53:4C:FB:F0:69:AB:07:
  • AE:3D:5C:8D:7D:02:20:2C:BD:4E:74:90:C4:4D:67:81:
  • 33:65:8D:41:1D:A6:DD:F1:D2:3D:B0:3D:97:9F:9C:8B:
  • D8:27:D7:8B:84:91:02
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Nov 9 01:30:08.599 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:93:09:35:DB:D6:DA:FF:EC:DF:32:E3:
  • 94:8B:71:40:57:9F:EA:33:40:F6:DB:2D:24:86:36:06:
  • 8B:44:DC:33:2F:02:21:00:83:DF:09:D1:F7:B7:85:50:
  • 58:7A:50:22:6C:D9:1E:52:4F:69:FE:DC:E0:9E:AC:33:
  • B7:0B:DE:B4:2D:CE:F9:37
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
  • F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
  • Timestamp : Nov 9 01:30:08.558 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:E7:83:80:05:DE:71:34:7D:10:29:41:
  • 2D:14:07:9A:4B:72:3F:23:5F:5F:69:DC:E9:0C:3F:B5:
  • CA:4F:67:CF:41:02:21:00:97:4D:09:06:4F:4A:7F:5F:
  • 7E:27:E1:D7:CC:06:9B:36:B8:BE:76:C3:3B:03:12:70:
  • 3C:52:39:2E:D3:9A:6A:22

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.rebelsheep.software
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid