SSL check results of bruch.berlin

NEW You can also bulk check multiple servers.

Discover if the mail servers for bruch.berlin can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 15 Aug 2020 21:38:12 +0000

We can not guarantee a secure connection to the mailservers of bruch.berlin!

Please contact the operator of bruch.berlin and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/bruch.berlin

Servers

Incoming Mails

These servers are responsible for incoming mails to @bruch.berlin addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx.bruch.berlin
90.187.125.89
10
supported
mail.example.org
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
10 s
mxlb.ispgateway.de
80.67.18.126
Results incomplete
20
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mxlb.ispgateway.de
80.67.18.126
Results incomplete
30
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @bruch.berlin address so far. Test mail delivery

Certificates

First seen at:

CN=mail.example.org,O=mailcow

Certificate chain
  • mail.example.org
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Expired
    • Unknown Authority

Subject
Organization (O)
  • mailcow
Common Name (CN)
  • mail.example.org
Issuer
Organization (O)
  • mailcow
validity period
Not valid before
2016-12-13
Not valid after
2019-11-28
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • Key Agreement
  • TLS Web Client Authentication
  • TLS Web Server Authentication
Fingerprints
SHA256
AF:A0:07:98:10:2A:70:81:26:53:F3:30:4F:25:98:54:2D:1F:F3:D6:9F:33:EA:F6:90:19:49:6D:4E:9C:96:54
SHA1
75:9E:94:74:C9:77:BF:E7:B7:A3:55:79:41:F4:D9:36:AE:A9:A8:AA