SSL check results of arpnet.org

NEW You can also bulk check multiple servers.

Discover if the mail servers for arpnet.org can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 06 Dec 2024 01:30:44 +0000

We can not guarantee a secure connection to the mailservers of arpnet.org!

Please contact the operator of arpnet.org and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/arpnet.org

Servers

Incoming Mails

These servers are responsible for incoming mails to @arpnet.org addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.arpnet.org
2a03:b0c0:1:d0::f4:e001
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
mail.arpnet.org
138.68.176.110
10
supported
stux.localdomain
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s

Outgoing Mails

We have not received any emails from a @arpnet.org address so far. Test mail delivery

Certificates

First seen at:

CN=stux.localdomain

Certificate chain
  • stux.localdomain (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • stux.localdomain
Alternative Names
  • stux.localdomain
Issuer

Certificate is self-signed.

validity period
Not valid before
2017-11-24
Not valid after
2027-11-22
Fingerprints
SHA256
C3:0C:38:91:D1:07:1F:5C:41:4A:52:23:8F:06:80:F3:D2:C8:4C:F0:16:73:4B:9F:BA:DE:66:F2:8B:A3:BB:B3
SHA1
40:87:F9:0B:AB:B7:2C:E6:92:D6:A4:D6:D9:0C:CB:40:4D:4A:B8:86