SSL check results of no66.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for no66.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 26 Jan 2025 01:31:19 +0000

The mailservers of no66.net can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @no66.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail2.podmaniczky.de
212.227.101.120
50
supported
mail2.podmaniczky.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @no66.net address so far. Test mail delivery

Certificates

First seen at:

CN=mail2.podmaniczky.de

Certificate chain
  • mail2.podmaniczky.de
    • remaining
    • 256 bit
    • ecdsa-with-SHA384

      • E6
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail2.podmaniczky.de
Alternative Names
  • mail2.podmaniczky.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E6
validity period
Not valid before
2025-01-20
Not valid after
2025-04-20
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
CF:72:78:54:8C:AC:E2:47:A3:3D:7C:F1:A2:59:5F:22:E4:99:A3:16:68:49:33:58:6F:9D:2B:F6:18:57:27:D2
SHA1
0A:38:94:A2:BA:83:88:6C:6A:AE:36:A7:D8:0C:41:0F:AC:9E:62:57
X509v3 extensions
subjectKeyIdentifier
  • 85:82:6D:AC:26:9D:3D:7C:5E:1C:6D:1A:39:D3:C0:9B:BD:A5:B1:3F
authorityKeyIdentifier
  • keyid:93:27:46:98:03:A9:51:68:8E:98:D6:C4:42:48:DB:23:BF:58:94:D2
authorityInfoAccess
  • OCSP - URI:http://e6.o.lencr.org
  • CA Issuers - URI:http://e6.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 7D:59:1E:12:E1:78:2A:7B:1C:61:67:7C:5E:FD:F8:D0:
  • 87:5C:14:A0:4E:95:9E:B9:03:2F:D9:0E:8C:2E:79:B8
  • Timestamp : Jan 20 12:52:02.999 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:96:10:7C:44:EB:F4:B2:69:00:F0:EA:
  • 23:D7:9F:7C:41:9B:66:CF:F3:96:95:9B:70:FC:5D:B4:
  • 5F:B9:34:E4:64:02:21:00:A4:92:3A:21:09:78:9E:0E:
  • 80:B9:36:6A:0B:3D:87:59:41:89:D2:2C:E4:E8:D6:F2:
  • AF:F8:71:E3:00:B0:0E:61
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E0:92:B3:FC:0C:1D:C8:E7:68:36:1F:DE:61:B9:96:4D:
  • 0A:52:78:19:8A:72:D6:72:C4:B0:4D:A5:6D:6F:54:04
  • Timestamp : Jan 20 12:52:03.303 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:63:D1:FB:89:E6:3A:7B:F9:CB:59:64:1A:
  • 13:5F:9A:DC:CF:46:F4:3F:75:20:43:83:78:7D:D9:4D:
  • F8:30:DA:18:02:21:00:B9:2C:EC:6C:EA:48:9C:42:5B:
  • 90:78:04:6D:72:26:13:33:8C:D5:79:4E:33:37:6D:11:
  • 3F:D8:BE:00:4D:D3:9C