SSL check results of quintessenz.org

NEW You can also bulk check multiple servers.

Discover if the mail servers for quintessenz.org can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 14 Apr 2021 00:26:32 +0000

We can not guarantee a secure connection to the mailservers of quintessenz.org!

Please contact the operator of quintessenz.org and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/quintessenz.org

Servers

Incoming Mails

These servers are responsible for incoming mails to @quintessenz.org addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.quintessenz.at
212.232.26.218
10
supported
quizzebox.quintessenz.at
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • TLSv1.0
  • SSLv3
2 s
quizzebox.quintessenz.at
212.232.26.218
20
supported
quizzebox.quintessenz.at
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • TLSv1.0
  • SSLv3
2 s
gilean.luchs.at
2a02:b18:c13b:4::83
Results incomplete
30
supported
not checked
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
gilean.luchs.at
95.129.205.83
Results incomplete
30
supported
not checked
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @quintessenz.org address so far. Test mail delivery

Certificates

First seen at:

CN=quizzebox.quintessenz.at

Certificate chain
Subject
Common Name (CN)
  • quizzebox.quintessenz.at
Common Name is not included in Alternative Names
Alternative Names
  • quintessenz.at
  • *.quintessenz.at
  • linuxwochen.at
  • *.linuxwochen.at
  • quintessenz.org
  • *.quintessenz.org
  • quintessenz.net
  • *.quintessenz.net
  • quintessenz.info
  • *.quintessenz.info
  • linuxdays.at
  • *.linuxdays.at
  • bigbrotherawards.at
  • *.bigbrotherawards.at
  • bigbrotherawards.org
  • *.bigbrotherawards.org
  • bigbrother.awards.at
  • *.bigbrother.awards.at
Issuer
Organization (O)
  • Root CA
Organizational Unit (OU)
  • http://www.cacert.org
Common Name (CN)
  • CA Cert Signing Authority
Email
  • support@cacert.org
validity period
Not valid before
2012-02-20
Not valid after
2014-02-19
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Client Authentication
  • TLS Web Server Authentication
  • Netscape Server Gated Crypto
  • Microsoft Server Gated Crypto
Fingerprints
SHA256
1D:37:D4:17:A5:94:BF:3F:D9:8B:59:46:F1:6C:7E:4A:CB:4F:3D:36:8A:6E:7A:CA:85:86:65:3E:E8:37:76:1A
SHA1
66:65:43:70:1D:7F:B1:F3:BA:E0:AF:C5:66:A6:BC:85:A6:ED:40:ED
X509v3 extensions
authorityInfoAccess
  • OCSP - URI:http://ocsp.cacert.org/

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.gilean.luchs.at
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-512 Hash
valid