SSL check results of alitecs.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for alitecs.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 07 Aug 2020 19:29:10 +0000

We can not guarantee a secure connection to the mailservers of alitecs.de!

Please contact the operator of alitecs.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/alitecs.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @alitecs.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
ns2005.alitecs.de
2a01:4f8:10a:444c::1:1
Results incomplete
0 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
ns2005.alitecs.de
88.99.219.77
0
supported
*.alitecs.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
8 s

Outgoing Mails

We have not received any emails from a @alitecs.de address so far. Test mail delivery

Certificates

First seen at:

CN=*.alitecs.de,O=alitecs.de,OU=Proxmox Mail Gateway

Certificate chain
  • *.alitecs.de (Certificate is self-signed.)
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption
    • Unknown Authority

Subject
Organizational Unit (OU)
  • Proxmox Mail Gateway
Organization (O)
  • alitecs.de
Common Name (CN)
  • *.alitecs.de
Issuer

Certificate is self-signed.

validity period
Not valid before
2018-03-09
Not valid after
2028-03-06
Fingerprints
SHA256
4D:2A:94:77:8B:89:CA:73:2D:C5:1B:E3:02:EA:F4:B9:25:73:64:B3:13:0B:22:93:7D:35:C3:DA:3D:6F:C1:C3
SHA1
C2:C2:F6:6C:B2:36:64:04:2A:03:CC:AF:D4:A1:00:FF:43:9A:CA:9C