SSL check results of mirula.at

NEW You can also bulk check multiple servers.

Discover if the mail servers for mirula.at can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 09 Oct 2024 00:30:35 +0000

The mailservers of mirula.at can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mirula.at addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mta-gw.infomaniak.ch
2001:1600:0:aaaa::1:3
5
supported
mta-gw.infomaniak.ch
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mta-gw.infomaniak.ch
2001:1600:0:aaaa::1:4
5
supported
mta-gw.infomaniak.ch
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s
mta-gw.infomaniak.ch
83.166.143.57
5
supported
mta-gw.infomaniak.ch
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mta-gw.infomaniak.ch
83.166.143.58
5
supported
mta-gw.infomaniak.ch
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @mirula.at address so far. Test mail delivery

Certificates

First seen at:

CN=mta-gw.infomaniak.ch

Certificate chain
  • mta-gw.infomaniak.ch
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R11
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mta-gw.infomaniak.ch
Alternative Names
  • mta-gw.infomaniak.ch
  • mx.infomaniak.com
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R11
validity period
Not valid before
2024-08-27
Not valid after
2024-11-25
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
10:FB:1B:B7:8C:1F:0F:48:05:87:25:44:05:9B:DC:10:A2:6E:78:E8:09:10:DE:9B:41:54:5B:25:16:29:F6:AB
SHA1
F1:CB:2A:E0:42:C5:C3:2F:B4:52:54:60:5C:D8:55:14:E1:05:0F:AC
X509v3 extensions
subjectKeyIdentifier
  • 0B:CD:9E:34:44:88:F5:74:B5:23:4A:DE:2A:2B:C7:77:62:8B:5D:86
authorityKeyIdentifier
  • keyid:C5:CF:46:A4:EA:F4:C3:C0:7A:6C:95:C4:2D:B0:5E:92:2F:26:E3:B9
authorityInfoAccess
  • OCSP - URI:http://r11.o.lencr.org
  • CA Issuers - URI:http://r11.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 3F:17:4B:4F:D7:22:47:58:94:1D:65:1C:84:BE:0D:12:
  • ED:90:37:7F:1F:85:6A:EB:C1:BF:28:85:EC:F8:64:6E
  • Timestamp : Aug 27 22:41:31.430 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:72:8A:00:2A:F0:F0:18:83:9E:41:D7:C5:
  • 02:F5:1C:A5:BE:3C:B0:09:C7:49:E2:6D:50:04:6B:71:
  • 42:E6:D3:4F:02:20:43:7A:69:DA:A6:DF:D5:93:43:01:
  • AA:7B:F8:19:99:7A:B7:65:86:47:67:1C:EF:2D:81:7A:
  • B6:C0:63:6E:4D:44
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34:
  • B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74
  • Timestamp : Aug 27 22:41:31.467 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:91:DD:F2:9E:2B:BF:7C:6C:26:B1:4E:
  • 20:60:C8:57:AB:33:67:7D:8B:1D:69:13:FC:96:44:D9:
  • 56:D1:63:A7:43:02:21:00:A5:2A:7C:13:96:AB:C7:AB:
  • EE:90:6B:E3:5A:FF:A7:F2:F2:0B:64:6D:E5:0A:52:92:
  • 3B:D5:AA:B0:3C:E8:9B:58

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mta-gw.infomaniak.ch
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid