SSL check results of chrissk.solutions

NEW You can also bulk check multiple servers.

Discover if the mail servers for chrissk.solutions can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 20 Jul 2020 23:44:37 +0000

The mailservers of chrissk.solutions can be reached through an encrypted connection.

However, we found problems that may affect the security.

Servers

Incoming Mails

These servers are responsible for incoming mails to @chrissk.solutions addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
chrissk.solutions
2a01:238:43c8:4100:3a8e:3901:9b5d:5a32
10
supported
imap.example.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
12 s
chrissk.solutions
85.214.148.130
10
supported
imap.example.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
11 s

Outgoing Mails

We have not received any emails from a @chrissk.solutions address so far. Test mail delivery

Certificates

First seen at:

emailAddress=postmaster@example.com,CN=imap.example.com,OU=IMAP server

Certificate chain
  • imap.example.com (Certificate is self-signed.)
    • remaining
    • 1024 bit
    • sha1WithRSAEncryption
    • Hostname Mismatch
    • Expired
    • Unknown Authority

Subject
Organizational Unit (OU)
  • IMAP server
Common Name (CN)
  • imap.example.com
Email
  • postmaster@example.com
Issuer

Certificate is self-signed.

validity period
Not valid before
2017-08-14
Not valid after
2018-08-14
Fingerprints
SHA256
E2:79:03:DE:02:71:CF:09:9F:5F:5D:53:58:D1:8B:E2:B7:E6:7A:A9:0D:11:25:0D:BE:76:F0:A9:74:57:D2:41
SHA1
2F:A1:E1:DB:1D:AA:87:6C:1C:57:4D:C0:CA:59:D6:86:B2:C6:F3:D7
X509v3 extensions
nsCertType
  • SSL Server