SSL check results of wtnet.nl

NEW You can also bulk check multiple servers.

Discover if the mail servers for wtnet.nl can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 01 Aug 2020 11:50:41 +0000

We can not guarantee a secure connection to the mailservers of wtnet.nl!

Please contact the operator of wtnet.nl and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/wtnet.nl

Servers

Incoming Mails

These servers are responsible for incoming mails to @wtnet.nl addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
pop3.wtnet.nl
80.95.161.112
10
supported
*.wtnet.nl
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
12 s
fallback.intermax.nl
80.95.163.100
Results incomplete
50
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @wtnet.nl address so far. Test mail delivery

Certificates

First seen at:

CN=*.wtnet.nl,O=W.T. International B.V.,L=Capelle aan den IJssel,C=NL

Certificate chain
Subject
Country (C)
  • NL
Locality (L)
  • Capelle aan den IJssel
Organization (O)
  • W.T. International B.V.
Common Name (CN)
  • *.wtnet.nl
Alternative Names
  • *.wtnet.nl
  • wtnet.nl
  • ns1.wtnet.nl
  • webmail.wtnet.nl
  • wtndc-vsrvmail1.wtnet.nl
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • DigiCert SHA2 High Assurance Server CA
validity period
Not valid before
2020-01-29
Not valid after
2021-02-03
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
15:5B:7E:85:29:11:32:36:86:C8:22:17:A7:E9:8B:23:DC:D0:08:4D:73:E8:17:C0:BD:AB:C5:4B:6E:92:52:85
SHA1
29:E9:00:6A:AD:FD:BC:60:37:A8:85:EF:3E:38:15:1D:F1:9E:B1:B5
X509v3 extensions
authorityKeyIdentifier
  • keyid:51:68:FF:90:AF:02:07:75:3C:CC:D9:65:64:62:A2:12:B8:59:72:3B
subjectKeyIdentifier
  • 2A:A8:04:45:FB:A7:1A:9B:CD:A6:A2:15:9F:7C:85:13:35:30:21:74
crlDistributionPoints
  • Full Name:
  • URI:http://crl3.digicert.com/sha2-ha-server-g6.crl
  • Full Name:
  • URI:http://crl4.digicert.com/sha2-ha-server-g6.crl
certificatePolicies
  • Policy: 2.16.840.1.114412.1.1
  • CPS: https://www.digicert.com/CPS
  • Policy: 2.23.140.1.2.2
authorityInfoAccess
  • OCSP - URI:http://ocsp.digicert.com
  • CA Issuers - URI:http://cacerts.digicert.com/DigiCertSHA2HighAssuranceServerCA.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : F6:5C:94:2F:D1:77:30:22:14:54:18:08:30:94:56:8E:
  • E3:4D:13:19:33:BF:DF:0C:2F:20:0B:CC:4E:F1:64:E3
  • Timestamp : Jan 29 07:54:28.280 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:DC:EC:24:31:1D:17:EA:A9:3A:5C:C1:
  • 24:E5:02:2F:F8:51:6C:BE:1E:E9:7F:94:B8:F1:F7:59:
  • B3:CB:5D:95:56:02:20:2E:85:AE:0E:5A:89:D3:58:5B:
  • 56:D1:57:9C:6C:58:ED:06:3F:E5:B9:80:8C:35:EC:68:
  • EB:3E:19:18:4B:DB:1E
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5C:DC:43:92:FE:E6:AB:45:44:B1:5E:9A:D4:56:E6:10:
  • 37:FB:D5:FA:47:DC:A1:73:94:B2:5E:E6:F6:C7:0E:CA
  • Timestamp : Jan 29 07:54:28.319 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:BC:1B:58:0B:43:BC:ED:2B:E8:DC:C5:
  • DE:A2:6D:36:5A:F2:F5:53:1B:A1:ED:E7:EB:A7:1F:A6:
  • BE:B3:2A:10:59:02:21:00:EC:CD:3A:3A:1A:77:B9:30:
  • AB:FC:7A:24:DE:1F:5B:ED:A4:10:33:B7:33:FF:74:42:
  • F6:35:F7:D2:C7:4C:7B:4F