SSL check results of andre-toellner.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for andre-toellner.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 20 Jan 2025 18:06:39 +0000

We can not guarantee a secure connection to the mailservers of andre-toellner.de!

Please contact the operator of andre-toellner.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/andre-toellner.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @andre-toellner.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx1.andre-toellner.de
45.133.9.176
10
supported
mx1.andre-toellner.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
6 s
mxbackup1.junkemailfilter.com
184.105.182.148
20
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
10 s
mxbackup2.junkemailfilter.com
184.105.182.229
30
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
29 s
mxbackup2.junkemailfilter.com
184.105.182.219
30
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
29 s
mxbackup2.junkemailfilter.com
184.105.182.220
30
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
29 s
mxbackup2.junkemailfilter.com
184.105.182.210
30
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
29 s
mxbackup2.junkemailfilter.com
184.105.182.218
Results incomplete
30
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
mxbackup2.junkemailfilter.com
184.105.182.228
Results incomplete
30
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @andre-toellner.de address so far. Test mail delivery

Certificates

First seen at:

CN=junkemailfilter.com

Certificate chain
  • junkemailfilter.com
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R11
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • junkemailfilter.com
Alternative Names
  • *.junkemailfilter.com
  • junkemailfilter.com
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R11
validity period
Not valid before
2024-12-18
Not valid after
2025-03-18
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
99:B5:9E:41:0D:F6:68:6F:C6:15:25:07:C9:C0:0D:FD:F8:28:5C:7F:E2:8D:63:9E:F4:7F:9E:3B:A9:1C:95:45
SHA1
1E:2B:2A:BF:59:D1:2F:4C:31:BA:68:35:CA:3E:78:C1:6A:51:7E:17
X509v3 extensions
subjectKeyIdentifier
  • BE:ED:0B:12:1E:11:D5:4E:1E:05:3B:68:4D:93:60:29:68:2B:95:EA
authorityKeyIdentifier
  • keyid:C5:CF:46:A4:EA:F4:C3:C0:7A:6C:95:C4:2D:B0:5E:92:2F:26:E3:B9
authorityInfoAccess
  • OCSP - URI:http://r11.o.lencr.org
  • CA Issuers - URI:http://r11.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Dec 18 11:49:00.617 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:64:EE:DE:6F:93:C2:BA:E0:58:B3:E2:13:
  • 2B:10:23:12:C0:D2:5E:0C:B2:86:AF:C9:0F:49:DB:B5:
  • 4B:9A:1D:62:02:20:1E:9E:0A:F1:E8:F4:A0:C0:2D:ED:
  • 86:E8:43:50:D6:72:05:12:C1:B1:3D:23:3A:3F:D8:BA:
  • D1:D0:F5:4F:52:92
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 4E:75:A3:27:5C:9A:10:C3:38:5B:6C:D4:DF:3F:52:EB:
  • 1D:F0:E0:8E:1B:8D:69:C0:B1:FA:64:B1:62:9A:39:DF
  • Timestamp : Dec 18 11:49:00.604 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:E0:07:19:A5:FF:0D:48:6F:D4:88:E6:
  • 7D:DF:B0:53:8E:54:1A:F8:3D:CF:E6:6C:D2:CA:C7:E4:
  • 56:63:9A:AB:6A:02:21:00:A0:78:8A:78:2C:D6:C1:B8:
  • 73:25:8E:FD:AB:1E:38:F3:9D:52:D3:25:C5:1C:52:31:
  • 62:88:DD:63:FF:37:A2:8E
First seen at:

CN=mx1.andre-toellner.de

Certificate chain
  • mx1.andre-toellner.de
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R11
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mx1.andre-toellner.de
Alternative Names
  • mx1.andre-toellner.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R11
validity period
Not valid before
2025-01-19
Not valid after
2025-04-19
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
7D:92:88:F6:55:D9:65:4C:D8:57:3C:A2:5D:47:80:4B:A4:34:6E:FF:D5:F6:2A:D7:D6:E8:01:89:7B:C1:65:E9
SHA1
12:3E:E2:38:EA:59:CC:98:F9:7A:83:EA:E5:38:5E:B6:6F:88:DD:8B
X509v3 extensions
subjectKeyIdentifier
  • D6:2A:5A:1D:81:73:C1:45:66:E5:22:7E:D7:7C:8C:93:D4:D5:56:AE
authorityKeyIdentifier
  • keyid:C5:CF:46:A4:EA:F4:C3:C0:7A:6C:95:C4:2D:B0:5E:92:2F:26:E3:B9
authorityInfoAccess
  • OCSP - URI:http://r11.o.lencr.org
  • CA Issuers - URI:http://r11.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53:
  • D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7
  • Timestamp : Jan 19 14:13:44.776 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:9B:67:6A:66:F6:F2:04:D5:4B:06:77:
  • 26:ED:42:54:FD:3F:8A:E4:3D:C5:78:FF:F6:48:DD:7C:
  • A6:81:C4:03:6F:02:21:00:AA:3D:3F:D7:2A:17:4C:B0:
  • A4:0A:D8:C2:42:C5:22:48:F5:F3:9D:7B:68:6E:7A:4B:
  • 78:6A:25:37:09:C3:C5:70
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 13:4A:DF:1A:B5:98:42:09:78:0C:6F:EF:4C:7A:91:A4:
  • 16:B7:23:49:CE:58:57:6A:DF:AE:DA:A7:C2:AB:E0:22
  • Timestamp : Jan 19 14:13:44.972 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:DC:85:DF:A1:0E:41:A9:D8:39:65:9B:
  • CF:97:97:7A:00:CD:04:69:8E:C6:03:D8:21:25:88:0D:
  • DD:74:1F:76:9C:02:21:00:BE:75:4C:7B:46:DE:FD:05:
  • B8:D5:2B:A3:6A:C3:12:1D:FA:A6:5E:56:6C:67:18:45:
  • 83:DB:DA:A9:CA:41:AB:4A