SSL check results of ad5ey.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for ad5ey.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 27 Mar 2018 21:12:39 +0000

The mailservers of ad5ey.net can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @ad5ey.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
tensor.ad5ey.net
2604:a880:2:d0::826:6001
10
supported
tensor.subspacedynamics.net
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
7 s
tensor.ad5ey.net
138.68.60.124
10
supported
tensor.subspacedynamics.net
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
9 s

Outgoing Mails

We have not received any emails from a @ad5ey.net address so far. Test mail delivery

Certificates

First seen at:

CN=tensor.subspacedynamics.net

Certificate chain
Subject
Common Name (CN)
  • tensor.subspacedynamics.net
Alternative Names
  • ad5ey.net
  • av.ad5ey.net
  • conference.ad5ey.net
  • git.ad5ey.net
  • git.subspacedynamics.com
  • imap.ad5ey.net
  • pubsub.ad5ey.net
  • sip.ad5ey.net
  • smtp.ad5ey.net
  • stun.ad5ey.net
  • subspacedynamics.com
  • svn.ad5ey.net
  • tensor.ad5ey.net
  • tensor.subspacedynamics.net
  • turn.ad5ey.net
  • www.ad5ey.net
  • www.subspacedynamics.com
  • xmpp.ad5ey.net
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2018-03-06
Not valid after
2018-06-04
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
BC:78:69:E3:5F:79:3B:8E:4F:7B:52:98:BB:72:48:45:23:53:A5:1A:EF:11:DA:CF:20:50:A4:BB:A5:80:FF:53
SHA1
6A:5A:0F:C3:9A:E4:C6:CB:EE:7B:35:E7:D7:22:3B:55:6D:2B:F3:43
X509v3 extensions
subjectKeyIdentifier
  • B9:58:B9:A9:62:22:22:1E:49:06:1B:CD:0C:62:CF:5D:AB:71:CE:14
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
  • User Notice:
  • Explicit Text: This Certificate may only be relied upon by Relying Parties and only in accordance with the Certificate Policy found at https://letsencrypt.org/repository/

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.tensor.ad5ey.net
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-512 Hash
valid
valid
_25._tcp.tensor.ad5ey.net
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid