SSL check results of mail.cdom.de

NEW You can also bulk check multiple servers.

Discover if the webservers of mail.cdom.de can be reached through a secure connection.

Summary

Report created Sun, 09 Aug 2020 17:04:52 +0000

The webservers of mail.cdom.de can be reached through a secure connection.

Servers

Hostname / IP address Certificates Protocol
mail.cdom.de
5.9.68.167
mail.cdom.de
HSTS
missing
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mail.cdom.de
2a01:4f8:161:73b0::167
mail.cdom.de
HSTS
missing
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Certificates

First seen at:

CN=mail.cdom.de

Certificate chain
Subject
Common Name (CN)
  • mail.cdom.de
Alternative Names
  • mail.cdom.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-06-29
Not valid after
2020-09-27
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
23:FB:15:F2:D7:A2:64:5B:74:C7:9D:C6:33:22:A9:B3:D4:3A:43:71:CA:40:95:C6:F3:6F:C7:88:06:5C:2D:17
SHA1
02:33:FE:E6:25:8A:D1:A3:4A:CB:42:14:B7:BC:A3:42:CE:FE:64:BE
X509v3 extensions
subjectKeyIdentifier
  • EA:26:72:99:28:DC:E8:30:C9:7D:E7:8A:A5:A6:F0:2E:B8:A0:B0:6E
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : Jun 29 21:59:59.819 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:27:B2:01:19:19:42:17:96:FB:15:FA:EC:
  • 0B:47:3E:84:CD:98:99:B8:81:FA:71:14:DB:43:1B:CC:
  • D9:FE:47:1A:02:20:7A:64:9C:98:50:EA:B5:D2:3F:8C:
  • 76:97:28:CD:1F:76:2A:F6:70:F2:08:8D:BB:4A:EA:4C:
  • 96:3E:8D:95:1E:78
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 07:B7:5C:1B:E5:7D:68:FF:F1:B0:C6:1D:23:15:C7:BA:
  • E6:57:7C:57:94:B7:6A:EE:BC:61:3A:1A:69:D3:A2:1C
  • Timestamp : Jun 29 21:59:59.824 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:AC:05:DF:06:CD:84:80:36:2A:3F:89:
  • 99:75:3C:0B:3B:C5:F8:B0:9E:0D:9B:45:86:27:5A:0C:
  • 4D:7A:E3:16:50:02:21:00:CF:57:62:C3:9F:4E:2E:98:
  • 31:C9:D6:AB:20:06:79:24:5D:81:BD:F8:85:BF:FE:76:
  • 80:D5:24:91:3E:53:CD:87

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_443._tcp.mail.cdom.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid