SSL check results of xmission.com.au

NEW You can also bulk check multiple servers.

Discover if the mail servers for xmission.com.au can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 28 Apr 2024 11:34:17 +0000

We can not guarantee a secure connection to the mailservers of xmission.com.au!

Please contact the operator of xmission.com.au and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/xmission.com.au

Servers

Incoming Mails

These servers are responsible for incoming mails to @xmission.com.au addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
aspmx.l.google.com
2a00:1450:400c:c1d::1a
Results incomplete
1
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
aspmx.l.google.com
64.233.166.26
Results incomplete
1
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
alt2.aspmx.l.google.com
2a00:1450:4025:c03::1a
Results incomplete
5
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
alt2.aspmx.l.google.com
142.251.9.26
Results incomplete
5
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
alt1.aspmx.l.google.com
2a00:1450:4013:c16::1a
Results incomplete
5
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
alt1.aspmx.l.google.com
142.250.153.26
Results incomplete
5
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
aspmx2.googlemail.com
2a00:1450:4013:c16::1a
Results incomplete
10
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
aspmx2.googlemail.com
142.250.153.26
Results incomplete
10
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
aspmx3.googlemail.com
2a00:1450:4025:c03::1b
Results incomplete
10
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
aspmx3.googlemail.com
142.251.9.27
Results incomplete
10
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
fallback.work.de
87.253.164.42
20
supported
mailback.work.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @xmission.com.au address so far. Test mail delivery

Certificates

First seen at:

CN=mailback.work.de

Certificate chain
  • mailback.work.de
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mailback.work.de
Alternative Names
  • mailback.work.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2024-03-12
Not valid after
2024-06-10
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
3C:5A:44:CF:30:D6:7C:0D:50:94:66:38:F7:23:62:7A:7F:39:9F:D2:71:BE:C8:BB:E6:64:3C:A3:6F:28:67:DD
SHA1
FD:84:30:8B:96:8A:EE:C1:A9:93:5F:C8:9C:62:62:D8:07:72:AC:27
X509v3 extensions
subjectKeyIdentifier
  • 87:49:2C:B9:20:FA:23:7C:59:BA:AF:AA:A2:5D:76:66:5A:E5:6F:54
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A2:E2:BF:D6:1E:DE:2F:2F:07:A0:D6:4E:6D:37:A7:DC:
  • 65:43:B0:C6:B5:2E:A2:DA:B7:8A:F8:9A:6D:F5:17:D8
  • Timestamp : Mar 12 23:31:10.543 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:D8:45:DF:F2:66:58:30:D0:84:0F:E4:
  • 49:7D:7D:A6:05:63:8E:E9:6B:D0:59:40:16:2A:BA:28:
  • AA:E8:52:FA:71:02:20:7B:6C:10:E0:2F:88:54:06:EB:
  • C2:BD:FB:65:F7:92:74:10:98:53:5E:DC:56:EC:B7:66:
  • 79:B2:84:1E:7B:84:64
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2:
  • 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B
  • Timestamp : Mar 12 23:31:10.515 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:B0:9C:6C:03:15:BA:AC:2E:29:82:6C:
  • ED:D3:1D:13:7F:20:2D:98:32:91:1E:DF:50:3A:9C:CE:
  • A9:40:D2:D4:40:02:21:00:C8:2B:99:1F:87:36:41:42:
  • B5:5A:4D:5F:D4:FA:34:D7:30:2B:62:AF:02:29:C5:B6:
  • 30:B3:92:70:4C:84:E9:0B