SSL check results of mail.bemo.lu

NEW You can also bulk check multiple servers.

Discover if the webservers of mail.bemo.lu can be reached through a secure connection.

Summary

Report created Tue, 25 Apr 2023 12:18:56 +0000

The mailservers of mail.bemo.lu can be reached through an encrypted connection.

However, we found problems that may affect the security.

Servers

Hostname / IP address Certificates Protocol
mail.bemo.lu
213.166.42.104
*.bemo.lu
HSTS
missing
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
Poodle
possible
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s

Certificates

First seen at:

CN=*.bemo.lu,O=BEMO EUROPE BANQUE PRIVEE,L=Luxembourg,ST=Luxembourg,C=LU

Certificate chain
  • *.bemo.lu
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Unknown Authority

      GlobalSign RSA OV SSL CA 2018
Subject
Country (C)
  • LU
State (ST)
  • Luxembourg
Locality (L)
  • Luxembourg
Organization (O)
  • BEMO EUROPE BANQUE PRIVEE
Common Name (CN)
  • *.bemo.lu
Alternative Names
  • *.bemo.lu
  • bemo.lu
Issuer
Country (C)
  • BE
Organization (O)
  • GlobalSign nv-sa
Common Name (CN)
  • GlobalSign RSA OV SSL CA 2018
validity period
Not valid before
2023-03-17
Not valid after
2024-04-17
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
00:35:52:8E:BC:A2:ED:F8:07:7E:C9:32:9B:EE:19:6A:75:50:81:77:92:9E:60:7B:B4:61:D0:5F:84:4A:0C:50
SHA1
0B:55:E9:BD:09:76:01:CA:A4:3E:2A:1C:6F:0D:22:F8:99:90:77:3B
X509v3 extensions
authorityInfoAccess
  • CA Issuers - URI:http://secure.globalsign.com/cacert/gsrsaovsslca2018.crt
  • OCSP - URI:http://ocsp.globalsign.com/gsrsaovsslca2018
certificatePolicies
  • Policy: 1.3.6.1.4.1.4146.1.20
  • CPS: https://www.globalsign.com/repository/
  • Policy: 2.23.140.1.2.2
crlDistributionPoints
  • Full Name:
  • URI:http://crl.globalsign.com/gsrsaovsslca2018.crl
authorityKeyIdentifier
  • keyid:F8:EF:7F:F2:CD:78:67:A8:DE:6F:8F:24:8D:88:F1:87:03:02:B3:EB
subjectKeyIdentifier
  • BB:7E:B9:0F:EB:1D:1F:4E:4F:B4:1A:52:90:B7:F9:26:9D:19:3A:9B
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 48:B0:E3:6B:DA:A6:47:34:0F:E5:6A:02:FA:9D:30:EB:
  • 1C:52:01:CB:56:DD:2C:81:D9:BB:BF:AB:39:D8:84:73
  • Timestamp : Mar 17 16:26:26.041 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:80:5D:40:2E:D6:E1:34:0B:E5:3E:B9:
  • BE:69:77:5E:19:4F:77:2F:95:BF:D5:47:02:14:AC:9A:
  • 6B:57:76:74:BB:02:21:00:8C:B3:B6:81:DB:CD:09:E7:
  • 2C:A2:9C:19:85:4D:F9:8A:25:BE:B2:B6:2B:06:59:CB:
  • 40:C5:CE:DC:65:EE:C5:67
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2:
  • 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B
  • Timestamp : Mar 17 16:26:26.090 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:BE:5B:17:7D:8C:C0:B8:5B:DA:F0:E0:
  • D8:3D:03:A0:44:78:8F:0C:44:2F:39:07:C5:01:15:7A:
  • 54:E2:29:3C:41:02:21:00:D8:7C:85:08:80:07:98:AC:
  • 28:1F:67:BC:09:3B:CE:76:35:B4:94:A8:5B:77:B9:01:
  • 5E:3C:DE:D4:6C:5A:B8:2C
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DA:B6:BF:6B:3F:B5:B6:22:9F:9B:C2:BB:5C:6B:E8:70:
  • 91:71:6C:BB:51:84:85:34:BD:A4:3D:30:48:D7:FB:AB
  • Timestamp : Mar 17 16:26:26.025 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:E4:77:4A:75:32:B4:FF:8F:78:2F:84:
  • DB:2A:38:5D:62:02:4B:95:B2:36:43:ED:D5:69:57:EA:
  • 24:4E:E0:80:11:02:20:79:8E:6D:DB:CE:82:C1:2C:EB:
  • 1D:4D:95:2F:CB:A2:67:1E:38:2F:6F:34:13:0F:F4:15:
  • 2E:81:94:10:9B:7F:49