SSL check results of cil.bf

NEW You can also bulk check multiple servers.

Discover if the mail servers for cil.bf can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 24 Jul 2025 00:30:53 +0000

We can not guarantee a secure connection to the mailservers of cil.bf!

Please contact the operator of cil.bf and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/cil.bf

Servers

Incoming Mails

These servers are responsible for incoming mails to @cil.bf addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mg02.gov.bf
196.13.207.23
10
supported
*.gov.bf
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
mg01.gov.bf
196.13.207.22
Results incomplete
10
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
2 s

Outgoing Mails

We have not received any emails from a @cil.bf address so far. Test mail delivery

Certificates

First seen at:

CN=*.gov.bf,O=gov.bf,OU=Proxmox Mail Gateway

Certificate chain
  • *.gov.bf (Certificate is self-signed.)
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption
    • Unknown Authority

Subject
Organizational Unit (OU)
  • Proxmox Mail Gateway
Organization (O)
  • gov.bf
Common Name (CN)
  • *.gov.bf
Issuer

Certificate is self-signed.

validity period
Not valid before
2021-10-05
Not valid after
2031-10-03
Fingerprints
SHA256
7A:FF:5A:DA:29:4C:82:C2:7C:6A:DA:6C:63:DA:93:97:95:6B:C5:20:41:FF:C6:D5:02:33:AE:7C:32:D5:AC:AC
SHA1
04:15:28:95:8B:3B:2C:F9:DE:34:88:EC:B1:83:EE:76:BE:04:68:30