SSL check results of anurag.drdo.in

NEW You can also bulk check multiple servers.

Discover if the mail servers for anurag.drdo.in can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 21 Feb 2020 04:04:49 +0000

We can not guarantee a secure connection to the mailservers of anurag.drdo.in!

Please contact the operator of anurag.drdo.in and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/anurag.drdo.in

Servers

Incoming Mails

These servers are responsible for incoming mails to @anurag.drdo.in addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
smtp1.drdo.in
14.139.225.148
1
supported
imap.drdo.in
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
9 s
smtp2.drdo.in
14.139.225.149
Results incomplete
1
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
2 s

Outgoing Mails

We have not received any emails from a @anurag.drdo.in address so far. Test mail delivery

Certificates

First seen at:

CN=imap.drdo.in

Certificate chain
  • imap.drdo.in
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Expired
    • Unknown Authority

      NIC sub-CA for NIC 2011
Subject
Common Name (CN)
  • imap.drdo.in
Alternative Names
  • imap.drdo.in
Issuer
Country (C)
  • IN
Organization (O)
  • National Informatics Centre
Organizational Unit (OU)
  • Sub-CA
Common Name (CN)
  • NIC sub-CA for NIC 2011
validity period
Not valid before
2011-07-22
Not valid after
2013-07-21
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
E1:A1:3B:CF:77:B5:8F:48:1A:54:63:BC:BF:C6:A4:93:FB:8D:A0:30:C6:9B:67:30:80:1D:96:BE:95:03:07:45
SHA1
BC:0F:E6:5C:DA:F7:7E:C3:15:D9:9D:A2:AE:0C:12:37:BE:CB:23:90
X509v3 extensions
subjectKeyIdentifier
  • 2C:BF:2D:81:E6:98:0D:0E:CB:1A:3C:8E:65:FB:50:A7:45:93:D3:50
authorityKeyIdentifier
  • keyid:FA:80:0F:1C:FC:73:A4:C7:69:90:13:AE:EF:3C:10:AD:AA:AF:19:84
certificatePolicies
  • Policy: 2.16.356.100.2.2
  • User Notice:
  • Explicit Text: Class 2 Certificate
crlDistributionPoints
  • Full Name:
  • URI:http://nicca.nic.in/crl_142926D2FF14439B38F9.crl