SSL check results of britney.oeh-wu.at

NEW You can also bulk check multiple servers.

Discover if the mail servers for britney.oeh-wu.at can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 20 Dec 2023 13:53:56 +0000

The mailservers of britney.oeh-wu.at can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @britney.oeh-wu.at addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
britney.oeh-wu.at
137.208.79.3
-
supported
*.oeh-wu.at
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
britney.oeh-wu.at
2001:628:404:79::3
-
supported
*.oeh-wu.at
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @britney.oeh-wu.at address so far. Test mail delivery

Certificates

First seen at:

CN=*.oeh-wu.at

Certificate chain
Subject
Common Name (CN)
  • *.oeh-wu.at
Alternative Names
  • *.oeh-wu.at
  • oeh-wu.at
Issuer
Country (C)
  • LV
Locality (L)
  • Riga
Organization (O)
  • GoGetSSL
Common Name (CN)
  • GoGetSSL RSA DV CA
validity period
Not valid before
2023-12-20
Not valid after
2025-01-18
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
CB:0A:65:78:AA:E1:04:B7:C6:D1:F7:8E:41:A1:2D:5C:AD:FF:9D:B7:AC:F0:72:8B:0E:38:2E:78:42:F0:72:7F
SHA1
7C:B8:79:C9:5A:2A:5B:39:54:20:9B:62:E4:34:A9:41:8C:AE:AD:BE
X509v3 extensions
authorityKeyIdentifier
  • keyid:F9:FB:50:C4:8B:67:BB:67:64:FE:83:21:A6:A9:CE:3F:55:84:93:99
subjectKeyIdentifier
  • 08:EC:3F:6C:11:3F:12:84:FE:23:E5:EB:B5:E0:73:B6:EA:43:63:60
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.64
  • CPS: https://cps.usertrust.com
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://crl.usertrust.com/GoGetSSLRSADVCA.crl
authorityInfoAccess
  • CA Issuers - URI:http://crt.usertrust.com/GoGetSSLRSADVCA.crt
  • OCSP - URI:http://ocsp.usertrust.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CF:11:56:EE:D5:2E:7C:AF:F3:87:5B:D9:69:2E:9B:E9:
  • 1A:71:67:4A:B0:17:EC:AC:01:D2:5B:77:CE:CC:3B:08
  • Timestamp : Dec 20 13:24:19.233 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:B9:BE:3D:53:F0:ED:33:42:D0:65:F6:
  • C1:5B:FA:87:67:DE:0D:D4:91:21:07:F5:6C:54:C0:45:
  • 2A:AF:D4:00:19:02:20:57:26:9C:2B:06:07:28:AC:BF:
  • 32:CC:AF:D8:92:E0:44:BE:3D:67:B1:DA:DE:9B:1F:95:
  • A0:10:77:5A:E5:18:48
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53:
  • D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7
  • Timestamp : Dec 20 13:24:19.222 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:81:35:A6:EB:34:83:72:A0:64:0A:DC:
  • 3B:F6:99:BE:45:76:F4:7B:F0:8A:D1:0E:02:79:20:BF:
  • 27:09:1C:4C:2C:02:21:00:E7:78:AC:BD:24:9A:0E:E4:
  • 27:50:90:50:11:8A:EA:C3:F7:18:B5:5A:1A:21:31:61:
  • 40:A6:F3:94:C9:D5:66:EB
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 4E:75:A3:27:5C:9A:10:C3:38:5B:6C:D4:DF:3F:52:EB:
  • 1D:F0:E0:8E:1B:8D:69:C0:B1:FA:64:B1:62:9A:39:DF
  • Timestamp : Dec 20 13:24:19.197 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:8A:F4:96:99:26:A4:66:33:38:94:C2:
  • DB:24:EA:98:79:2A:17:F5:01:5F:5A:22:AE:32:30:DA:
  • B3:A4:27:B2:D9:02:21:00:8D:CD:2A:61:A0:E2:DF:27:
  • BE:13:5C:09:EB:72:50:DC:DA:7E:5A:8E:6F:1A:40:4A:
  • A0:FE:B6:39:55:D4:4B:3C