SSL check results of cfrq.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for cfrq.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 05 Jul 2020 03:21:50 +0000

The mailservers of cfrq.net can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @cfrq.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
persephone.cfrq.net
2a01:7e01::f03c:91ff:fed5:f474
10
supported
persephone.cfrq.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
8 s
persephone.cfrq.net
172.104.150.145
10
supported
persephone.cfrq.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
8 s
penelope.cfrq.net
2600:3c03::f03c:91ff:fe70:f23e
20
supported
penelope.cfrq.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
11 s
penelope.cfrq.net
173.255.229.79
20
supported
penelope.cfrq.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
10 s

Outgoing Mails

We have not received any emails from a @cfrq.net address so far. Test mail delivery

Certificates

First seen at:

CN=penelope.cfrq.net

Certificate chain
Subject
Common Name (CN)
  • penelope.cfrq.net
Alternative Names
  • penelope.cfrq.net
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-06-21
Not valid after
2020-09-19
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
9E:91:3C:8E:B6:B7:9D:75:D7:BB:5E:1C:29:83:15:43:DB:84:28:9C:33:D7:DE:AE:C9:49:E5:6E:9D:51:B4:60
SHA1
91:E0:9B:25:F9:B4:68:00:CE:2C:F3:13:DB:66:DD:1B:AA:2F:6A:6F
X509v3 extensions
subjectKeyIdentifier
  • 3E:8C:C8:24:81:55:08:EA:8C:BB:CC:65:20:2C:2E:9E:48:34:59:6E
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E7:12:F2:B0:37:7E:1A:62:FB:8E:C9:0C:61:84:F1:EA:
  • 7B:37:CB:56:1D:11:26:5B:F3:E0:F3:4B:F2:41:54:6E
  • Timestamp : Jun 21 05:05:16.943 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:3D:DA:07:64:67:EF:E6:23:C9:DF:60:B6:
  • 79:87:B7:ED:79:84:AB:71:7B:EE:35:E8:9C:63:BC:83:
  • 00:57:4F:67:02:20:07:82:E5:50:F8:63:CA:8C:11:1F:
  • F3:EE:87:72:7F:03:15:8E:A6:3B:C6:D2:2B:AE:4B:45:
  • 48:AA:F2:DD:37:60
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : B2:1E:05:CC:8B:A2:CD:8A:20:4E:87:66:F9:2B:B9:8A:
  • 25:20:67:6B:DA:FA:70:E7:B2:49:53:2D:EF:8B:90:5E
  • Timestamp : Jun 21 05:05:16.928 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:CE:E1:4E:3E:07:06:2A:4A:0C:3C:7A:
  • C9:46:F3:0B:E9:98:CE:72:29:7B:04:ED:F7:A8:14:4C:
  • 21:9C:83:CD:B4:02:20:74:FF:C1:03:4F:E8:73:FB:1D:
  • 4A:3A:C2:0B:19:5D:12:35:A6:F6:1F:51:FB:05:00:FB:
  • 7D:E0:5B:11:3F:2C:BA
First seen at:

CN=persephone.cfrq.net

Certificate chain
Subject
Common Name (CN)
  • persephone.cfrq.net
Alternative Names
  • lists.cfrq.net
  • mail.cfrq.net
  • mail.kochhaus.net
  • mail.the-gang.ca
  • persephone.cfrq.net
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-06-21
Not valid after
2020-09-19
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
46:67:23:E0:43:4C:86:7A:9B:7B:84:E7:B6:00:79:42:70:81:31:42:F7:7D:C9:F2:23:53:95:1D:38:9B:A4:5A
SHA1
76:4B:E4:4D:C7:3E:B7:F0:2E:62:3F:91:EA:65:CE:4A:4F:E4:9A:02
X509v3 extensions
subjectKeyIdentifier
  • B5:CC:86:8E:DE:6E:0A:BD:DB:E7:69:E2:27:67:6F:A6:1F:AF:B5:D6
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5E:A7:73:F9:DF:56:C0:E7:B5:36:48:7D:D0:49:E0:32:
  • 7A:91:9A:0C:84:A1:12:12:84:18:75:96:81:71:45:58
  • Timestamp : Jun 21 05:06:19.985 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:16:75:86:29:26:0B:B3:C1:6F:47:3B:66:
  • A9:53:2A:81:8F:E1:ED:4C:63:34:5B:55:7C:29:0A:55:
  • B6:9F:64:DC:02:20:64:0E:09:D9:32:4D:5A:5F:E7:6D:
  • E8:6C:AD:1C:4C:C7:2E:BA:82:B3:98:87:54:78:7C:4E:
  • 1C:BF:B2:60:63:4B
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : B2:1E:05:CC:8B:A2:CD:8A:20:4E:87:66:F9:2B:B9:8A:
  • 25:20:67:6B:DA:FA:70:E7:B2:49:53:2D:EF:8B:90:5E
  • Timestamp : Jun 21 05:06:19.995 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:7A:3A:80:D2:51:73:AE:2B:D3:9B:A8:26:
  • 33:FF:45:1D:BB:AC:24:6E:F4:FC:CC:06:2A:F5:A7:94:
  • 0C:AE:B7:52:02:20:36:C5:86:18:35:81:1F:E8:B3:2C:
  • 1E:DE:D6:0D:FE:D7:C4:56:42:60:CB:36:B5:1B:D2:AB:
  • 48:18:26:16:49:09