SSL check results of mail1.nexusdigital.net.au

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail1.nexusdigital.net.au can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 19 Apr 2024 02:00:53 +0000

The mailservers of mail1.nexusdigital.net.au can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail1.nexusdigital.net.au addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail1.nexusdigital.net.au
27.50.90.152
-
supported
mail1.nexusdigital.net.au
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
mail1.nexusdigital.net.au
2400:d400:6:7045::1:152
Results incomplete
- not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s

Outgoing Mails

We have not received any emails from a @mail1.nexusdigital.net.au address so far. Test mail delivery

Certificates

First seen at:

CN=mail1.nexusdigital.net.au

Certificate chain
  • mail1.nexusdigital.net.au
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail1.nexusdigital.net.au
Alternative Names
  • mail1.nexusdigital.net.au
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2024-03-28
Not valid after
2024-06-26
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
E6:B1:FD:32:B9:F5:BF:D2:0D:73:67:9A:7B:C4:FB:7C:13:8E:0A:38:EB:49:26:55:96:4B:EF:B0:EA:53:A7:45
SHA1
D8:C2:23:20:33:6E:68:8D:64:60:AC:51:3A:17:61:8B:AA:5A:D8:62
X509v3 extensions
subjectKeyIdentifier
  • A3:63:81:99:EB:B6:D4:88:C4:F1:21:9D:7F:24:18:BD:9F:20:90:A9
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A2:E2:BF:D6:1E:DE:2F:2F:07:A0:D6:4E:6D:37:A7:DC:
  • 65:43:B0:C6:B5:2E:A2:DA:B7:8A:F8:9A:6D:F5:17:D8
  • Timestamp : Mar 28 18:22:22.879 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:4A:F2:4D:92:FB:D5:0C:80:17:24:7C:9A:
  • 23:1E:0F:32:50:09:6C:B6:78:A5:7A:E8:16:77:EC:26:
  • A5:14:29:85:02:21:00:D1:BC:A5:13:01:77:D8:90:F5:
  • 75:A1:CD:58:91:EC:C8:2C:5D:1E:03:9B:D4:E4:F9:0A:
  • DA:E3:FF:5C:01:9D:27
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2:
  • 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B
  • Timestamp : Mar 28 18:22:22.867 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:EB:61:C3:88:50:BD:8F:00:44:32:2B:
  • 01:CD:55:43:78:10:9A:68:2A:22:C2:8D:EC:AF:09:E3:
  • 40:E1:03:BB:EE:02:20:2F:89:59:A4:E6:9D:44:8E:03:
  • 43:08:62:AC:25:97:37:0D:7B:A8:23:C3:C7:02:32:84:
  • D2:A0:09:2B:11:C3:15