SSL check results of adeline.mobi

NEW You can also bulk check multiple servers.

Discover if the mail servers for adeline.mobi can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 26 May 2020 20:37:42 +0000

The mailservers of adeline.mobi can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @adeline.mobi addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.adeline.mobi
54.37.162.255
1
supported
mail.adeline.mobi
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
3 s

Outgoing Mails

We have not received any emails from a @adeline.mobi address so far. Test mail delivery

Certificates

First seen at:

CN=mail.adeline.mobi

Certificate chain
Subject
Common Name (CN)
  • mail.adeline.mobi
Alternative Names
  • mail.adeline.mobi
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-04-29
Not valid after
2020-07-28
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
7E:85:57:8A:8E:5B:F7:2D:0C:FE:AB:F4:91:B5:6E:57:76:0C:E3:32:F3:9A:BF:AD:68:A0:34:77:D5:72:EE:81
SHA1
D1:E2:7A:99:C3:FE:5D:05:7C:1E:0C:2B:B9:C7:80:84:E3:4B:6B:00
X509v3 extensions
subjectKeyIdentifier
  • 8B:91:6C:05:3D:6F:35:A1:3E:57:7D:B6:25:7F:DC:00:3B:D3:15:DD
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
tlsfeature
  • status_request
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E7:12:F2:B0:37:7E:1A:62:FB:8E:C9:0C:61:84:F1:EA:
  • 7B:37:CB:56:1D:11:26:5B:F3:E0:F3:4B:F2:41:54:6E
  • Timestamp : Apr 29 08:34:50.075 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:08:31:41:92:DC:14:4C:BA:20:2F:00:12:
  • 9E:37:7B:4E:A1:29:5A:90:6E:10:60:DF:FC:D3:F7:5E:
  • B2:6F:78:9F:02:20:24:26:3F:88:61:DE:B3:CC:8B:F1:
  • 01:D7:DE:C9:A4:A6:F1:B6:0C:D2:BD:64:2E:31:91:12:
  • 81:C9:E9:7B:00:7B
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 07:B7:5C:1B:E5:7D:68:FF:F1:B0:C6:1D:23:15:C7:BA:
  • E6:57:7C:57:94:B7:6A:EE:BC:61:3A:1A:69:D3:A2:1C
  • Timestamp : Apr 29 08:34:50.085 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:4B:09:9A:BD:B1:75:37:01:BC:9D:A7:D2:
  • 0E:88:9E:0F:AF:05:D8:C7:03:3B:FA:FB:AE:9A:BC:8E:
  • D2:F4:5E:BA:02:20:69:3D:EA:22:7C:8E:42:63:79:FC:
  • E1:8A:FB:D6:7E:CF:2F:AE:94:89:FF:9B:98:72:EC:04:
  • 37:5F:07:82:34:FA

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.adeline.mobi
  • DANE-TA: Trust Anchor Assertion
  • Use full certificate
  • SHA-256 Hash
valid
valid