SSL check results of rxaxlxf.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for rxaxlxf.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 05 Sep 2024 10:07:22 +0000

The mailservers of rxaxlxf.net can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @rxaxlxf.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.rxaxlxf.net
2a0d:2787:1b:a00::a
10
supported
rxaxlxf.net
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mail.rxaxlxf.net
45.87.41.47
10
supported
rxaxlxf.net
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @rxaxlxf.net address so far. Test mail delivery

Certificates

First seen at:

CN=rxaxlxf.net

Certificate chain
  • rxaxlxf.net
    • remaining
    • 384 bit
    • ecdsa-with-SHA384

      • E6
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • rxaxlxf.net
Alternative Names
  • ftp.rxaxlxf.net
  • kupandakuangaza.rxaxlxf.net
  • mail.rxaxlxf.net
  • pop.rxaxlxf.net
  • rxaxlxf.net
  • smtp.rxaxlxf.net
  • www.kupandakuangaza.rxaxlxf.net
  • www.rxaxlxf.net
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E6
validity period
Not valid before
2024-08-15
Not valid after
2024-11-13
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
A0:CA:D1:14:D7:93:89:89:56:93:1C:43:F8:C6:F7:06:30:8D:0F:7A:5A:F2:43:4E:48:84:A0:15:62:3A:AC:8A
SHA1
00:A7:B4:E5:15:48:08:70:16:BE:87:11:CE:32:C2:21:89:D2:02:A1
X509v3 extensions
subjectKeyIdentifier
  • 4F:3B:8F:63:9A:D0:64:B5:14:4E:61:46:B8:49:59:F2:14:A1:48:B9
authorityKeyIdentifier
  • keyid:93:27:46:98:03:A9:51:68:8E:98:D6:C4:42:48:DB:23:BF:58:94:D2
authorityInfoAccess
  • OCSP - URI:http://e6.o.lencr.org
  • CA Issuers - URI:http://e6.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34:
  • B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74
  • Timestamp : Aug 15 18:18:08.991 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:6A:F4:47:92:EB:0A:D1:E9:7B:B4:FB:87:
  • 31:3E:CF:E9:51:6A:C9:CE:10:61:92:D1:CE:A4:BC:F2:
  • 29:BA:1C:FF:02:21:00:DE:A3:0C:F2:DD:7A:90:7C:B9:
  • 70:38:5A:FA:D5:3C:59:4D:0E:95:A3:F1:0A:92:29:95:
  • E6:6B:A0:F5:AF:ED:B2
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DF:E1:56:EB:AA:05:AF:B5:9C:0F:86:71:8D:A8:C0:32:
  • 4E:AE:56:D9:6E:A7:F5:A5:6A:01:D1:C1:3B:BE:52:5C
  • Timestamp : Aug 15 18:18:09.142 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:DB:4A:33:75:E2:3C:10:B1:21:64:98:
  • 19:CC:43:7A:BF:4C:6D:D8:29:F7:10:F4:77:98:60:43:
  • D0:D8:FF:B7:4E:02:20:5D:68:43:11:35:2F:4B:6C:6B:
  • F7:84:0C:8B:85:07:15:94:87:3C:F7:4D:7F:C4:63:AC:
  • 2C:B0:D0:CF:5E:09:D0

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.rxaxlxf.net
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
valid
_25._tcp.mail.rxaxlxf.net
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid