SSL check results of budweiserbudvar.sk

NEW You can also bulk check multiple servers.

Discover if the mail servers for budweiserbudvar.sk can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 20 Jan 2022 15:04:03 +0000

We can not guarantee a secure connection to the mailservers of budweiserbudvar.sk!

Please contact the operator of budweiserbudvar.sk and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/budweiserbudvar.sk

Servers

Incoming Mails

These servers are responsible for incoming mails to @budweiserbudvar.sk addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.budweiserbudvar.sk
85.248.38.82
Results incomplete
10
supported
not checked
DANE
missing
PFS
not checked
Heartbleed
not vulnerable
Weak ciphers
not checked
1 s
mx-backup1.nextra.sk
195.168.0.110
95
supported
*.gts.sk
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
12 s
mx-backup1.nextra.sk
195.168.0.108
95
supported
*.gts.sk
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
11 s
mx-backup2.nextra.sk
195.168.1.108
100
supported
*.gts.sk
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
11 s
mx-backup2.nextra.sk
195.168.1.110
100
supported
*.gts.sk
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
11 s

Outgoing Mails

We have not received any emails from a @budweiserbudvar.sk address so far. Test mail delivery

Certificates

First seen at:

CN=*.gts.sk

Certificate chain
  • *.gts.sk
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Expired

Subject
Common Name (CN)
  • *.gts.sk
Alternative Names
  • *.gts.sk
  • gts.sk
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • RapidSSL RSA CA 2018
validity period
Not valid before
2018-04-26
Not valid after
2020-05-22
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
A6:55:9B:A2:5B:A6:D9:00:22:4A:F9:35:4E:D2:73:7C:4D:7F:28:93:AB:9E:19:2F:13:13:1B:83:FB:88:36:96
SHA1
E7:35:CE:B2:AA:2F:1B:75:E1:11:34:B7:21:C0:10:1D:47:9B:B3:8B
X509v3 extensions
authorityKeyIdentifier
  • keyid:53:CA:17:59:FC:6B:C0:03:21:2F:1A:AE:E4:AA:A8:1C:82:56:DA:75
subjectKeyIdentifier
  • 00:68:86:BD:A4:C7:5B:C9:A5:61:CB:2A:9E:70:DC:C3:A5:BC:9D:42
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.rapidssl.com/RapidSSLRSACA2018.crl
certificatePolicies
  • Policy: 2.16.840.1.114412.1.2
  • CPS: https://www.digicert.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • OCSP - URI:http://status.rapidssl.com
  • CA Issuers - URI:http://cacerts.rapidssl.com/RapidSSLRSACA2018.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A4:B9:09:90:B4:18:58:14:87:BB:13:A2:CC:67:70:0A:
  • 3C:35:98:04:F9:1B:DF:B8:E3:77:CD:0E:C8:0D:DC:10
  • Timestamp : Apr 26 13:48:42.326 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:81:BD:B0:7B:B0:38:5B:17:7E:69:7F:
  • 90:22:D2:1F:49:D4:75:E5:F2:C2:AD:81:98:FB:AE:E3:
  • 6D:97:31:AB:EB:02:20:28:48:C9:1F:76:E5:B8:2E:A1:
  • CF:18:DF:E4:E2:73:A9:63:C5:EF:68:F3:F0:F2:B7:83:
  • D8:0D:B9:C1:ED:B0:BE
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : Apr 26 13:48:42.620 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:2A:4D:0F:99:3A:31:09:8C:29:C4:83:BA:
  • D8:FD:7B:49:6F:16:02:55:85:DC:B2:7A:3B:81:E9:2D:
  • 74:4F:30:6D:02:20:70:1C:5A:F1:E5:0F:AA:3E:58:F0:
  • A9:1D:76:A3:FA:F6:B0:AE:2F:61:82:EB:BA:FD:51:A5:
  • C0:55:48:61:CB:F5
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : BB:D9:DF:BC:1F:8A:71:B5:93:94:23:97:AA:92:7B:47:
  • 38:57:95:0A:AB:52:E8:1A:90:96:64:36:8E:1E:D1:85
  • Timestamp : Apr 26 13:48:42.226 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:01:33:E6:9A:3F:CB:60:05:7E:37:31:A7:
  • 34:C7:25:DD:44:B3:6F:A0:36:B8:3E:9A:A4:A1:0E:1F:
  • 0A:14:F6:75:02:21:00:98:B6:7E:77:F4:11:95:1E:E0:
  • 02:D4:A4:E6:FB:C2:6B:35:60:1B:6F:E3:FC:F1:0C:C4:
  • 9B:40:25:9D:79:F1:F4