SSL check results of smtp.strato.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for smtp.strato.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 15 Mar 2024 18:03:11 +0000

No connection to the mailservers of smtp.strato.de could be established.

Servers

Incoming Mails

These servers are responsible for incoming mails to @smtp.strato.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
smtp.strato.de
81.169.145.133
Results incomplete
-
supported
smtp.strato.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
smtp.strato.de
2a01:238:20a:202:55f0::1133
Results incomplete
-
supported
smtp.strato.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @smtp.strato.de address so far. Test mail delivery

Certificates

First seen at:

CN=smtp.strato.de,O=Strato AG,L=Berlin,ST=Berlin,C=DE

Certificate chain
Subject
Country (C)
  • DE
State (ST)
  • Berlin
Locality (L)
  • Berlin
Organization (O)
  • Strato AG
Common Name (CN)
  • smtp.strato.de
Alternative Names
  • smtp.strato.de
Issuer
Country (C)
  • DE
Organization (O)
  • Deutsche Telekom Security GmbH
Common Name (CN)
  • Telekom Security ServerID OV Class 2 CA
validity period
Not valid before
2024-02-09
Not valid after
2025-02-13
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Client Authentication
  • TLS Web Server Authentication
Fingerprints
SHA256
4B:09:6D:8C:CA:E2:6C:43:CD:C6:82:C0:D7:9B:D9:E9:4C:AD:B9:9F:C6:02:E6:00:25:DC:D4:50:E6:54:A7:B4
SHA1
4A:6A:E6:E5:C6:8A:87:A8:C8:09:C7:2D:A1:B8:52:C4:81:CE:B5:0F
X509v3 extensions
authorityKeyIdentifier
  • keyid:1C:05:93:B1:7F:A8:34:30:8C:52:E0:96:40:A0:72:A3:10:5D:E0:FF
subjectKeyIdentifier
  • 8E:AE:37:40:B3:07:3A:28:E6:27:18:43:40:68:78:0C:73:BB:25:49
certificatePolicies
  • Policy: 2.23.140.1.2.2
  • CPS: http://docs.serverid.telesec.de/cps/serverid.htm
crlDistributionPoints
  • Full Name:
  • URI:http://crl.serverid.telesec.de/rl/Telekom_Security_ServerID_OV_Class_2_CA.crl
authorityInfoAccess
  • OCSP - URI:http://ocsp.serverid.telesec.de/ocspr
  • CA Issuers - URI:http://crt.serverid.telesec.de/crt/Telekom_Security_ServerID_OV_Class_2_CA.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 55:81:D4:C2:16:90:36:01:4A:EA:0B:9B:57:3C:53:F0:
  • C0:E4:38:78:70:25:08:17:2F:A3:AA:1D:07:13:D3:0C
  • Timestamp : Feb 9 11:00:52.881 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:E2:FB:7A:F9:76:14:0D:C4:61:6E:EC:
  • 93:27:3C:C3:36:C1:AF:4B:A7:FE:B3:41:45:55:71:99:
  • 48:6C:C3:6D:CB:02:20:34:F2:40:FE:73:A4:B6:B6:2E:
  • 61:F1:26:7D:04:06:94:0A:30:84:66:DF:B4:2F:5A:3A:
  • 46:5B:49:1B:FE:B1:58
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Feb 9 11:00:52.762 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:5E:96:60:D4:43:CF:DE:D0:DF:9F:67:2F:
  • ED:A4:E6:4D:B2:35:A7:4D:D0:2E:63:15:DB:6E:3E:30:
  • 97:15:58:30:02:21:00:E0:92:FD:2C:46:2E:37:D5:85:
  • 10:C6:CB:E0:79:94:17:2E:83:6B:E0:F2:83:01:AA:62:
  • CA:4B:86:EC:A3:C3:63
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 28:E2:81:38:FD:83:21:45:E9:A9:D6:AA:75:37:6D:83:
  • 77:A8:85:12:B3:C0:7F:72:41:48:21:DC:BD:E9:8C:66
  • Timestamp : Feb 9 11:00:53.262 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:9B:A0:1E:84:0F:3B:D0:63:B5:B7:2A:
  • A6:07:D8:71:C3:5E:91:A9:18:27:4E:DE:E3:F1:85:96:
  • 09:E0:12:71:2A:02:20:3D:7C:72:34:F4:15:2D:AB:0A:
  • 86:B7:61:24:03:B3:E6:A7:D9:E7:74:06:7E:4D:15:9F:
  • 0B:05:D0:94:FD:D3:79
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CF:11:56:EE:D5:2E:7C:AF:F3:87:5B:D9:69:2E:9B:E9:
  • 1A:71:67:4A:B0:17:EC:AC:01:D2:5B:77:CE:CC:3B:08
  • Timestamp : Feb 9 11:00:52.635 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:FE:8D:07:17:9A:86:A1:59:51:FB:FB:
  • 3C:16:9F:10:EE:F7:A4:0B:3B:D3:D9:E5:ED:F7:40:19:
  • 01:85:80:8A:1C:02:20:7A:B1:9E:19:AA:15:E6:D5:50:
  • 07:16:3B:5A:BD:BA:BE:0F:8C:83:FB:3C:4F:61:94:8B:
  • A6:13:94:AA:64:92:73
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 4E:75:A3:27:5C:9A:10:C3:38:5B:6C:D4:DF:3F:52:EB:
  • 1D:F0:E0:8E:1B:8D:69:C0:B1:FA:64:B1:62:9A:39:DF
  • Timestamp : Feb 9 11:00:52.685 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:83:FD:AE:55:70:7F:63:FB:D4:9C:EE:
  • 41:08:E4:D6:B8:FC:3D:35:4C:18:35:2A:75:7C:6C:F2:
  • DF:73:85:F9:65:02:21:00:D5:74:F3:4A:8E:A1:3C:10:
  • 4C:45:5D:B2:51:B4:0D:03:46:26:B7:D5:D7:51:CF:FA:
  • 14:10:49:35:F1:D4:61:EF