SSL check results of teledata.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for teledata.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 21 Jul 2023 07:28:52 +0000

We can not guarantee a secure connection to the mailservers of teledata.de!

Please contact the operator of teledata.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/teledata.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @teledata.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx0.teledata-fn.de
2a02:590:1:3::63
10
supported
*.teledata-fn.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
18 s
mx0.teledata-fn.de
212.62.194.63
10
supported
*.teledata-fn.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
18 s
mx1.teledata-fn.de
2a02:590:1:1::61
10
supported
*.teledata-fn.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
18 s
mx1.teledata-fn.de
217.24.194.61
10
supported
*.teledata-fn.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
18 s
fallback.teledata-fn.de
2a02:590:1:1::18
Results incomplete
20 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
fallback.teledata-fn.de
217.24.194.18
20
supported
*.teledata-fn.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
21 s
fallback.ffm.teledata-fn.de
82.98.106.76
Results incomplete
30
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s

Outgoing Mails

We have not received any emails from a @teledata.de address so far. Test mail delivery

Certificates

First seen at:

CN=*.teledata-fn.de,O=TeleData GmbH,L=Friedrichshafen,ST=Baden-Württemberg,C=DE

Certificate chain
Subject
Country (C)
  • DE
State (ST)
  • Baden-Württemberg
Locality (L)
  • Friedrichshafen
Organization (O)
  • TeleData GmbH
Common Name (CN)
  • *.teledata-fn.de
Alternative Names
  • *.teledata-fn.de
  • teledata-fn.de
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • Thawte RSA CA 2018
validity period
Not valid before
2022-09-14
Not valid after
2023-10-15
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
58:F0:F5:26:42:EB:4E:3A:33:AB:F1:E3:63:1F:B3:1D:6D:C8:02:3B:11:13:FE:E8:2F:30:A2:D2:32:7C:3B:F0
SHA1
20:F2:ED:38:38:1E:D4:F5:31:BD:73:95:D8:C9:74:E0:96:6E:2E:B6
X509v3 extensions
authorityKeyIdentifier
  • keyid:A3:C8:5E:65:54:E5:30:78:C1:05:EA:07:0A:6A:59:CC:B9:FE:DE:5A
subjectKeyIdentifier
  • 96:AE:CD:48:D2:F3:48:55:12:8D:3E:6D:5D:5B:1C:A7:51:55:B6:1B
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.thawte.com/ThawteRSACA2018.crl
certificatePolicies
  • Policy: 2.23.140.1.2.2
  • CPS: http://www.digicert.com/CPS
authorityInfoAccess
  • OCSP - URI:http://status.thawte.com
  • CA Issuers - URI:http://cacerts.thawte.com/ThawteRSACA2018.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : AD:F7:BE:FA:7C:FF:10:C8:8B:9D:3D:9C:1E:3E:18:6A:
  • B4:67:29:5D:CF:B1:0C:24:CA:85:86:34:EB:DC:82:8A
  • Timestamp : Sep 14 12:13:12.178 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:CC:F4:FC:2E:52:7C:2B:3E:B6:F2:99:
  • 1E:E9:2A:6F:9E:CC:9F:09:4E:98:4E:54:13:99:97:1B:
  • AB:68:BF:79:71:02:20:09:8B:EE:FC:B6:2B:2A:78:A3:
  • 59:A0:E3:99:2C:0B:B2:E0:37:E2:F8:68:78:0A:86:2A:
  • 61:09:E0:6B:6D:89:F3
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 35:CF:19:1B:BF:B1:6C:57:BF:0F:AD:4C:6D:42:CB:BB:
  • B6:27:20:26:51:EA:3F:E1:2A:EF:A8:03:C3:3B:D6:4C
  • Timestamp : Sep 14 12:13:12.157 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:06:FF:F0:2A:A5:6D:BD:C7:E7:CF:FD:AD:
  • 38:6C:2C:E7:11:5F:38:9A:8E:05:A3:63:1A:49:98:89:
  • 64:1A:A2:F5:02:20:2E:EA:5B:5D:64:8C:D6:6E:76:DA:
  • 00:38:65:EE:1A:73:B4:3B:22:A3:E2:61:2A:FC:29:23:
  • D9:65:55:01:95:51
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : B3:73:77:07:E1:84:50:F8:63:86:D6:05:A9:DC:11:09:
  • 4A:79:2D:B1:67:0C:0B:87:DC:F0:03:0E:79:36:A5:9A
  • Timestamp : Sep 14 12:13:12.202 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:AB:21:DF:2A:78:12:40:8A:EA:E1:8A:
  • 5A:C5:C7:12:27:44:A5:94:71:48:1E:2C:27:7C:1C:1A:
  • B0:2D:3E:9F:F0:02:20:14:87:22:68:94:35:52:EC:5E:
  • 79:B1:93:97:C4:E7:05:A1:6E:4F:73:2B:C0:1C:96:97:
  • 70:18:51:70:BB:C0:50