SSL check results of mail.rebelsheep.software

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail.rebelsheep.software can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 22 Jan 2025 00:09:29 +0000

We can not guarantee a secure connection to the mailservers of mail.rebelsheep.software!

Please contact the operator of mail.rebelsheep.software and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/mail.rebelsheep.software

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail.rebelsheep.software addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
rebelsheep.software
2a0c:5a82:1105:2b00:89b1:926:8f9:21c5
Results incomplete
10 not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
rebelsheep.software
79.117.56.146
10
supported
mail.rebelsheep.software
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
11 s

Outgoing Mails

We have not received any emails from a @mail.rebelsheep.software address so far. Test mail delivery

Certificates

First seen at:

CN=mail.rebelsheep.software

Certificate chain
  • mail.rebelsheep.software
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

      Sectigo RSA Domain Validation Secure Server CA
Subject
Common Name (CN)
  • mail.rebelsheep.software
Alternative Names
  • mail.rebelsheep.software
  • www.mail.rebelsheep.software
Issuer
Country (C)
  • GB
State (ST)
  • Greater Manchester
Locality (L)
  • Salford
Organization (O)
  • Sectigo Limited
Common Name (CN)
  • Sectigo RSA Domain Validation Secure Server CA
validity period
Not valid before
2025-01-22
Not valid after
2026-02-22
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
F5:2E:AE:5A:A8:10:BF:14:9E:E7:82:FA:5D:E2:51:C9:EA:F5:AF:03:D6:46:92:28:63:A0:9C:71:50:5E:AE:4D
SHA1
BA:44:0F:E0:FF:5E:B3:47:0C:67:82:4C:58:83:A9:95:23:1F:C8:CA
X509v3 extensions
authorityKeyIdentifier
  • keyid:8D:8C:5E:C4:54:AD:8A:E1:77:E9:9B:F9:9B:05:E1:B8:01:8D:61:E1
subjectKeyIdentifier
  • 54:43:BC:35:32:A3:FB:F2:73:63:7E:54:0B:AE:8D:24:62:89:83:1F
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.7
  • CPS: https://sectigo.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • CA Issuers - URI:http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
  • OCSP - URI:http://ocsp.sectigo.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 96:97:64:BF:55:58:97:AD:F7:43:87:68:37:08:42:77:
  • E9:F0:3A:D5:F6:A4:F3:36:6E:46:A4:3F:0F:CA:A9:C6
  • Timestamp : Jan 22 00:00:21.123 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:39:10:7C:E2:ED:57:45:69:2A:26:7D:99:
  • 7D:EF:95:2F:4D:F8:9A:89:3E:27:E5:EC:73:2F:27:82:
  • FC:02:5D:C7:02:20:1E:31:29:2F:21:19:C1:E9:49:61:
  • 98:92:F0:41:0D:84:81:1D:E9:C6:9A:5C:35:9F:24:BF:
  • CC:CF:9D:7B:B2:80
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 19:86:D4:C7:28:AA:6F:FE:BA:03:6F:78:2A:4D:01:91:
  • AA:CE:2D:72:31:0F:AE:CE:5D:70:41:2D:25:4C:C7:D4
  • Timestamp : Jan 22 00:00:21.052 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:53:DD:95:BD:86:42:C5:DE:D7:4C:4F:77:
  • C4:8D:34:2E:76:8E:22:19:60:E8:D7:64:1B:A6:DA:B3:
  • F2:E2:75:19:02:21:00:94:9A:9C:5E:39:5B:C9:30:1F:
  • DC:80:10:F7:FB:20:94:7D:13:94:4A:41:28:71:F4:8E:
  • 0D:E9:7C:F1:0F:8A:C7
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CB:38:F7:15:89:7C:84:A1:44:5F:5B:C1:DD:FB:C9:6E:
  • F2:9A:59:CD:47:0A:69:05:85:B0:CB:14:C3:14:58:E7
  • Timestamp : Jan 22 00:00:21.057 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:2D:50:9B:73:69:8F:65:F6:AF:10:2F:B9:
  • 73:19:E7:40:C5:D4:5D:8A:84:FA:BD:DC:4D:96:12:0D:
  • 7D:E1:D0:B4:02:21:00:C1:72:0C:C1:07:29:88:17:39:
  • 05:CE:F3:55:FB:3B:5E:D6:3B:6A:E7:68:E9:B5:03:F2:
  • 53:18:F1:10:FA:85:58

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.rebelsheep.software
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid