SSL check results of retail.andreasgoll.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for retail.andreasgoll.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 06 Jul 2020 05:42:15 +0000

We can not guarantee a secure connection to the mailservers of retail.andreasgoll.de!

Please contact the operator of retail.andreasgoll.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/retail.andreasgoll.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @retail.andreasgoll.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
a5z5tysaztyskomx.myfritz.net
2001:a61:ae0:3700:9ec7:a6ff:fe3f:cdcd
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
a5z5tysaztyskomx.myfritz.net
88.217.122.54
10
supported
nas.andreasgoll.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
13 s
elysium.diskstation.me
2001:a61:ae0:3701:211:32ff:feaa:f89f
Results incomplete
20 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
elysium.diskstation.me
88.217.122.54
20
supported
nas.andreasgoll.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
13 s
mx00.kundenserver.de
212.227.15.41
Results incomplete
30
supported
mx.kundenserver.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mx01.kundenserver.de
217.72.192.67
Results incomplete
31
supported
mx.kundenserver.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @retail.andreasgoll.de address so far. Test mail delivery

Certificates

First seen at:

CN=mx.kundenserver.de,L=Montabaur,ST=Rheinland-Pfalz,O=1&1 IONOS SE,C=DE

Certificate chain
Subject
Country (C)
  • DE
Organization (O)
  • 1&1 IONOS SE
State (ST)
  • Rheinland-Pfalz
Locality (L)
  • Montabaur
Common Name (CN)
  • mx.kundenserver.de
Alternative Names
  • mx.kundenserver.de
  • mx00.kundenserver.de
  • mx01.kundenserver.de
  • mx00.emig.kundenserver.de
  • mx01.emig.kundenserver.de
  • mx00.ionos.co.uk
  • mx00.ionos.de
  • mx00.ionos.es
  • mx00.ionos.fr
  • mx00.ionos.it
  • mx01.ionos.co.uk
  • mx01.ionos.de
  • mx01.ionos.es
  • mx01.ionos.fr
  • mx01.ionos.it
Issuer
Country (C)
  • DE
Organization (O)
  • T-Systems International GmbH
Organizational Unit (OU)
  • T-Systems Trust Center
State (ST)
  • Nordrhein Westfalen
Postal code
  • 57250
Locality (L)
  • Netphen
Street
  • Untere Industriestr. 20
Common Name (CN)
  • TeleSec ServerPass Class 2 CA
validity period
Not valid before
2020-05-28
Not valid after
2022-06-02
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Client Authentication
  • TLS Web Server Authentication
Fingerprints
SHA256
47:CF:D9:CB:F2:9B:5D:5B:07:E3:48:02:C2:BC:3E:A9:C8:3D:F8:F2:2F:E5:55:15:95:08:BF:E9:18:E0:D7:C9
SHA1
45:8C:72:A7:04:70:7A:EC:CE:30:E2:B3:E9:BF:57:09:08:90:C1:5D
X509v3 extensions
authorityKeyIdentifier
  • keyid:94:C8:74:46:F5:3A:B4:46:48:26:F8:2B:CA:34:1E:56:26:04:12:00
subjectKeyIdentifier
  • 80:66:28:24:07:5E:B7:17:25:97:74:D0:18:3E:36:9A:2F:6E:A5:B0
certificatePolicies
  • Policy: 1.3.6.1.4.1.7879.13.23.1
  • CPS: http://www.telesec.de/serverpass/cps.html
  • Policy: 2.23.140.1.2.2
crlDistributionPoints
  • Full Name:
  • URI:http://crl.serverpass.telesec.de/rl/ServerPass_Class_2.crl
authorityInfoAccess
  • OCSP - URI:http://ocsp.serverpass.telesec.de/ocspr
  • CA Issuers - URI:http://crl.serverpass.telesec.de/crt/TeleSec_ServerPass_Class_2_CA.cer
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : May 28 07:54:38.375 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:C1:62:53:B5:6F:2C:04:97:2A:05:30:
  • FA:EF:39:86:2B:15:88:DD:87:4E:29:F1:71:DD:62:C9:
  • 82:4B:6A:24:35:02:20:33:16:11:4F:01:BB:57:82:89:
  • 76:E8:9F:AD:E2:27:31:5F:5C:9B:3D:EA:EF:61:A6:01:
  • B7:2D:86:FB:34:59:1B
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : BB:D9:DF:BC:1F:8A:71:B5:93:94:23:97:AA:92:7B:47:
  • 38:57:95:0A:AB:52:E8:1A:90:96:64:36:8E:1E:D1:85
  • Timestamp : May 28 07:54:38.370 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:6F:57:EC:0C:FC:DB:79:C2:47:54:AA:71:
  • 98:2C:FC:8F:A4:16:C6:CC:AA:C3:FE:C7:C1:AD:78:61:
  • D4:F8:22:DD:02:20:49:C6:E1:3E:77:80:29:4C:F2:CD:
  • 5F:75:AE:FA:92:36:61:CA:F6:AA:C1:CF:32:88:08:C4:
  • 1B:8F:DA:D6:5B:2A
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 55:81:D4:C2:16:90:36:01:4A:EA:0B:9B:57:3C:53:F0:
  • C0:E4:38:78:70:25:08:17:2F:A3:AA:1D:07:13:D3:0C
  • Timestamp : May 28 07:54:38.631 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:17:66:35:CF:43:7D:CF:3D:B8:ED:D1:70:
  • 88:25:54:31:71:EB:4E:FE:D2:68:56:D5:FF:43:EF:C0:
  • D0:1E:BA:14:02:21:00:E7:DE:AB:88:3F:95:DE:42:1F:
  • FF:2B:47:D2:ED:73:11:82:7B:BB:F6:AA:9D:FB:2D:F3:
  • 43:C6:A9:08:74:D7:25
First seen at:

CN=nas.andreasgoll.de

Certificate chain
Subject
Common Name (CN)
  • nas.andreasgoll.de
Alternative Names
  • a5z5tysaztyskomx.myfritz.net
  • nas.andreasgoll.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-05-19
Not valid after
2020-08-17
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
E0:CB:65:FD:8E:F0:A0:7A:75:BE:77:4A:66:7E:5A:E1:B7:3F:11:13:5E:74:6E:B2:30:51:3C:DB:39:F7:0F:19
SHA1
70:FD:2A:DA:7D:D1:DD:F0:58:B3:5D:D9:14:6B:2D:68:F2:58:C0:19
X509v3 extensions
subjectKeyIdentifier
  • 5D:AC:EA:6C:DC:AA:3E:EB:F6:7A:42:6E:8E:C9:B5:84:1F:CD:FE:71
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : B2:1E:05:CC:8B:A2:CD:8A:20:4E:87:66:F9:2B:B9:8A:
  • 25:20:67:6B:DA:FA:70:E7:B2:49:53:2D:EF:8B:90:5E
  • Timestamp : May 19 10:41:02.460 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:C5:A3:CE:6F:DE:06:A4:F3:32:EB:AA:
  • 88:24:30:6B:16:D1:53:22:16:49:8D:EC:CE:2B:11:CB:
  • 17:62:24:1E:2E:02:20:31:1D:82:17:48:FC:B7:88:91:
  • 1B:66:7E:38:56:D1:01:73:75:1E:52:C5:04:A2:C0:63:
  • B5:5C:70:64:F6:64:FD
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5E:A7:73:F9:DF:56:C0:E7:B5:36:48:7D:D0:49:E0:32:
  • 7A:91:9A:0C:84:A1:12:12:84:18:75:96:81:71:45:58
  • Timestamp : May 19 10:41:02.510 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:82:DD:0A:96:68:06:73:BA:C9:54:BB:
  • 6F:68:18:AD:75:09:BE:64:3D:3A:B6:9B:C4:35:D1:4B:
  • 30:D7:93:3A:97:02:21:00:F6:3C:9B:D9:AC:64:9E:C8:
  • F3:35:DB:21:08:BE:01:D1:CC:51:D8:CA:B2:03:4C:19:
  • 39:7E:F7:F5:E3:67:17:99