SSL check results of britney.oeh-wu.at

NEW You can also bulk check multiple servers.

Discover if the mail servers for britney.oeh-wu.at can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 24 Nov 2022 09:59:48 +0000

The mailservers of britney.oeh-wu.at can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @britney.oeh-wu.at addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
britney.oeh-wu.at
137.208.79.3
-
supported
*.oeh-wu.at
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
britney.oeh-wu.at
2001:628:404:79::3
-
supported
*.oeh-wu.at
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @britney.oeh-wu.at address so far. Test mail delivery

Certificates

First seen at:

CN=*.oeh-wu.at

Certificate chain
Subject
Common Name (CN)
  • *.oeh-wu.at
Alternative Names
  • *.oeh-wu.at
  • oeh-wu.at
Issuer
Country (C)
  • LV
Locality (L)
  • Riga
Organization (O)
  • GoGetSSL
Common Name (CN)
  • GoGetSSL RSA DV CA
validity period
Not valid before
2022-11-24
Not valid after
2023-12-24
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
A3:8B:5C:F2:37:BB:8A:EF:7B:D1:4A:63:74:E8:31:1C:57:8C:7A:17:72:36:39:BD:B9:03:00:67:32:55:43:8E
SHA1
F9:04:5E:A8:2D:D8:DC:99:15:5D:5A:28:10:91:40:0B:83:46:29:00
X509v3 extensions
authorityKeyIdentifier
  • keyid:F9:FB:50:C4:8B:67:BB:67:64:FE:83:21:A6:A9:CE:3F:55:84:93:99
subjectKeyIdentifier
  • 08:EC:3F:6C:11:3F:12:84:FE:23:E5:EB:B5:E0:73:B6:EA:43:63:60
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.64
  • CPS: https://cps.usertrust.com
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://crl.usertrust.com/GoGetSSLRSADVCA.crl
authorityInfoAccess
  • CA Issuers - URI:http://crt.usertrust.com/GoGetSSLRSADVCA.crt
  • OCSP - URI:http://ocsp.usertrust.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : AD:F7:BE:FA:7C:FF:10:C8:8B:9D:3D:9C:1E:3E:18:6A:
  • B4:67:29:5D:CF:B1:0C:24:CA:85:86:34:EB:DC:82:8A
  • Timestamp : Nov 24 09:18:46.606 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:29:72:EB:DD:E6:91:57:F6:73:FF:3E:71:
  • 09:85:10:B6:88:50:84:C9:12:02:25:51:23:9C:E5:50:
  • 33:B6:91:9B:02:20:23:A6:96:08:46:BC:89:7D:23:3F:
  • 72:9B:71:5E:B5:58:13:35:71:74:0E:46:26:F4:7C:E2:
  • 6A:87:C8:0D:7E:B8
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 7A:32:8C:54:D8:B7:2D:B6:20:EA:38:E0:52:1E:E9:84:
  • 16:70:32:13:85:4D:3B:D2:2B:C1:3A:57:A3:52:EB:52
  • Timestamp : Nov 24 09:18:46.543 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:AB:27:C5:19:09:57:F7:F6:2C:DC:83:
  • 44:AC:D8:3A:1F:5A:3A:E0:14:70:98:67:2C:49:70:85:
  • A4:84:48:BD:A7:02:20:41:2C:44:63:45:25:23:6E:67:
  • F7:3E:DA:6C:96:82:FE:82:4C:20:9C:42:0E:36:D5:90:
  • 13:78:98:1F:5E:9F:F3
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E8:3E:D0:DA:3E:F5:06:35:32:E7:57:28:BC:89:6B:C9:
  • 03:D3:CB:D1:11:6B:EC:EB:69:E1:77:7D:6D:06:BD:6E
  • Timestamp : Nov 24 09:18:46.502 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:31:17:1B:C9:D1:59:C8:20:85:15:11:29:
  • D4:50:9A:59:26:02:4F:BF:53:96:28:41:AA:38:DF:CA:
  • AA:3F:61:07:02:21:00:D6:56:8C:9D:91:82:0B:65:DE:
  • C5:65:E3:DD:29:32:56:4A:68:78:54:CB:36:D6:22:D4:
  • D4:0B:61:2B:13:47:A4