SSL check results of computerama.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for computerama.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 23 Feb 2021 01:28:08 +0000

We can not guarantee a secure connection to the mailservers of computerama.net!

Please contact the operator of computerama.net and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/computerama.net

Servers

Incoming Mails

These servers are responsible for incoming mails to @computerama.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
store1.dynu.com
162.216.242.38
1
supported
*.dynu.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
18 s
store1.dynu.com
162.216.242.37
1
supported
*.dynu.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
18 s
store1.dynu.com
162.216.242.35
1
supported
*.dynu.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
18 s
store1.dynu.com
162.216.242.36
1
supported
*.dynu.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
18 s
store2.dynu.com
107.161.27.201
10
supported
*.dynu.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
19 s
mail.computerama.net
73.42.133.164
Results incomplete
15 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s

Outgoing Mails

We have not received any emails from a @computerama.net address so far. Test mail delivery

Certificates

First seen at:

CN=*.dynu.com,OU=PositiveSSL Wildcard,OU=Domain Control Validated

Certificate chain
Subject
Organizational Unit (OU)
  • Domain Control Validated
  • PositiveSSL Wildcard
Common Name (CN)
  • *.dynu.com
Alternative Names
  • *.dynu.com
  • dynu.com
Issuer
Country (C)
  • GB
State (ST)
  • Greater Manchester
Locality (L)
  • Salford
Organization (O)
  • Sectigo Limited
Common Name (CN)
  • Sectigo RSA Domain Validation Secure Server CA
validity period
Not valid before
2019-12-08
Not valid after
2022-02-05
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
E9:6E:D4:25:C8:24:8B:F1:FA:D1:C0:CB:89:0A:57:0C:AB:A2:1B:AB:C5:F7:F2:F4:92:43:45:19:C8:41:DB:A3
SHA1
0F:BC:67:60:93:98:DA:DF:A1:C8:C3:35:F1:F8:AD:A9:1D:40:14:9B
X509v3 extensions
authorityKeyIdentifier
  • keyid:8D:8C:5E:C4:54:AD:8A:E1:77:E9:9B:F9:9B:05:E1:B8:01:8D:61:E1
subjectKeyIdentifier
  • E3:B3:13:BC:45:04:EC:3B:F1:66:52:DC:24:FC:31:D4:AF:34:F0:F6
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.7
  • CPS: https://sectigo.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • CA Issuers - URI:http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
  • OCSP - URI:http://ocsp.sectigo.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 46:A5:55:EB:75:FA:91:20:30:B5:A2:89:69:F4:F3:7D:
  • 11:2C:41:74:BE:FD:49:B8:85:AB:F2:FC:70:FE:6D:47
  • Timestamp : Dec 8 15:35:55.083 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:85:5B:26:61:83:13:54:81:3E:13:47:
  • 5D:19:8B:63:91:33:19:FB:19:01:9A:DF:95:EE:FD:D5:
  • D0:FD:4B:5B:EA:02:21:00:C2:FF:4B:11:CF:D4:7E:66:
  • B8:B4:55:EC:BE:2C:C6:B0:F7:C0:ED:F9:BE:35:A5:94:
  • 2C:8C:27:F7:8D:6B:9D:F7
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : Dec 8 15:35:55.063 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:3F:7E:C4:ED:BC:72:99:08:F8:53:A8:7B:
  • 81:D1:6C:88:A2:87:67:EB:7B:80:ED:F1:3A:F6:9C:3A:
  • 8F:57:EE:F5:02:21:00:AF:72:D4:BD:A0:B3:10:C6:64:
  • 5B:17:EF:C1:E3:8B:E6:4A:AB:92:C5:63:0C:71:9B:58:
  • A0:E2:BB:BB:66:17:09
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 22:45:45:07:59:55:24:56:96:3F:A1:2F:F1:F7:6D:86:
  • E0:23:26:63:AD:C0:4B:7F:5D:C6:83:5C:6E:E2:0F:02
  • Timestamp : Dec 8 15:35:55.075 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:6D:98:B9:E1:AF:32:BD:F2:2F:5A:B7:3C:
  • 13:84:94:96:D8:23:19:79:74:14:33:7C:2F:26:36:FF:
  • 41:07:65:37:02:21:00:C6:A1:6D:48:BF:9E:E3:2A:EF:
  • B8:6E:AE:91:4A:A1:A2:86:47:7D:C6:7B:B0:11:C9:BE:
  • 51:1B:54:8F:B7:9C:E7