SSL check results of mx02.clustermail.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for mx02.clustermail.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 23 Sep 2021 10:40:36 +0000

We can not guarantee a secure connection to the mailservers of mx02.clustermail.de!

Please contact the operator of mx02.clustermail.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/mx02.clustermail.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @mx02.clustermail.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx02.clustermail.de
212.223.29.38
-
supported
mx02.clustermail.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
11 s
mx02.clustermail.de
2a02:708:0:dc::2
Results incomplete
- not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @mx02.clustermail.de address so far. Test mail delivery

Certificates

First seen at:

CN=mx02.clustermail.de

Certificate chain
Subject
Common Name (CN)
  • mx02.clustermail.de
Alternative Names
  • mx02.clustermail.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2019-05-07
Not valid after
2019-08-05
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
60:28:A5:C6:0A:78:8C:3D:EE:29:C0:D2:91:15:33:31:1F:19:82:AE:C6:69:49:27:BF:71:37:5C:8A:F8:F4:70
SHA1
3E:72:2D:98:7D:6B:43:6E:D7:9D:51:C4:43:8A:2D:BD:41:A9:09:B9
X509v3 extensions
subjectKeyIdentifier
  • 94:25:91:80:B1:D1:29:42:57:F5:2F:76:02:3A:43:F5:32:D5:AC:B1
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 74:7E:DA:83:31:AD:33:10:91:21:9C:CE:25:4F:42:70:
  • C2:BF:FD:5E:42:20:08:C6:37:35:79:E6:10:7B:CC:56
  • Timestamp : May 7 09:41:14.221 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:82:A7:CA:C6:D1:EF:CC:0E:A7:24:09:
  • 31:34:B7:40:DB:E3:9A:DD:00:DA:3C:81:93:89:72:11:
  • 5A:4F:7F:0A:69:02:21:00:FE:37:9B:1D:CC:BF:85:93:
  • 8F:46:B0:E1:07:20:6C:98:15:27:76:FC:64:C1:B3:F4:
  • 6A:D2:B4:54:66:1F:D4:AA
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 63:F2:DB:CD:E8:3B:CC:2C:CF:0B:72:84:27:57:6B:33:
  • A4:8D:61:77:8F:BD:75:A6:38:B1:C7:68:54:4B:D8:8D
  • Timestamp : May 7 09:41:13.732 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:C5:20:FC:09:F7:59:E3:94:2C:46:39:
  • E2:7C:FD:52:38:5D:90:28:F9:92:F5:DD:4A:AF:36:DE:
  • 5D:6E:C5:21:F7:02:21:00:C9:63:50:CB:1E:37:6D:23:
  • 31:3B:35:4B:4A:5A:3C:5A:07:BD:97:A9:3E:B4:8E:0A:
  • 11:BC:8E:19:A8:3E:D7:B8