SSL check results of vilera.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for vilera.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 30 Jun 2020 10:09:14 +0000

We can not guarantee a secure connection to the mailservers of vilera.de!

Please contact the operator of vilera.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/vilera.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @vilera.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.vilera.de
82.119.165.11
50
supported
mail.vilera.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
mail-backup.tenno.de
87.139.25.114
Results incomplete
100
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @vilera.de address so far. Test mail delivery

Certificates

First seen at:

CN=mail.vilera.de

Certificate chain
  • mail.vilera.de
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption
    • Unknown Authority

      Let's Encrypt Authority X3
Subject
Common Name (CN)
  • mail.vilera.de
Alternative Names
  • mail.vilera.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-06-30
Not valid after
2020-09-28
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
94:BF:27:AD:7E:5B:26:CB:B5:58:DA:41:44:B9:82:26:71:C9:64:51:39:7B:15:BA:6C:B2:8F:54:36:62:E9:62
SHA1
35:34:5C:A9:B4:FB:F8:1F:C2:2C:BD:48:5A:1F:71:37:F4:62:13:29
X509v3 extensions
subjectKeyIdentifier
  • 1B:E6:82:E2:2A:1B:D0:FC:29:6B:58:D0:EC:79:7D:20:DE:E9:C8:93
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : F0:95:A4:59:F2:00:D1:82:40:10:2D:2F:93:88:8E:AD:
  • 4B:FE:1D:47:E3:99:E1:D0:34:A6:B0:A8:AA:8E:B2:73
  • Timestamp : Jun 30 07:12:56.046 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:67:D2:61:C9:F6:6C:53:49:E6:05:1E:C0:
  • 91:4F:45:CD:21:12:4E:A6:36:1E:8F:CA:D1:6C:60:43:
  • 64:36:AD:80:02:21:00:90:70:13:F0:87:F3:D1:BD:E2:
  • 1F:28:F2:92:C2:CD:07:9C:BF:74:85:0C:11:3C:7C:B0:
  • 9A:62:63:E1:43:4B:57
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 07:B7:5C:1B:E5:7D:68:FF:F1:B0:C6:1D:23:15:C7:BA:
  • E6:57:7C:57:94:B7:6A:EE:BC:61:3A:1A:69:D3:A2:1C
  • Timestamp : Jun 30 07:12:56.133 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:08:26:25:27:5C:61:11:5B:14:A0:1B:CD:
  • 8D:06:BA:38:87:7C:95:67:8F:86:C8:49:50:4F:2A:74:
  • 54:54:B5:11:02:21:00:A3:C6:1B:8E:9E:21:72:88:CA:
  • D9:37:5A:23:62:72:A2:7E:60:1C:98:33:94:51:F9:ED:
  • 3A:DA:94:68:36:D5:3A