SSL check results of danielavanni.com

NEW You can also bulk check multiple servers.

Discover if the mail servers for danielavanni.com can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 23 Jun 2020 22:52:48 +0000

The mailservers of danielavanni.com can be reached through an encrypted connection.

However, we found problems that may affect the security.

Servers

Incoming Mails

These servers are responsible for incoming mails to @danielavanni.com addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx.danielavanni.com
62.149.128.154
10
supported
*.aruba.it
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
12 s
mx.danielavanni.com
62.149.128.151
Results incomplete
10
supported
*.aruba.it
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mx.danielavanni.com
62.149.128.163
10
supported
*.aruba.it
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
mx.danielavanni.com
62.149.128.160
10
supported
*.aruba.it
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
mx.danielavanni.com
62.149.128.72
10
supported
*.aruba.it
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
mx.danielavanni.com
62.149.128.74
10
supported
*.aruba.it
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
mx.danielavanni.com
62.149.128.157
Results incomplete
10
supported
*.aruba.it
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mx.danielavanni.com
62.149.128.166
10
supported
*.aruba.it
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s

Outgoing Mails

We have not received any emails from a @danielavanni.com address so far. Test mail delivery

Certificates

First seen at:

CN=*.aruba.it,O=Aruba S.p.A.,L=Ponte San Pietro,ST=Bergamo,C=IT

Certificate chain
  • *.aruba.it
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

      Actalis Organization Validated Server CA G2
Subject
Country (C)
  • IT
State (ST)
  • Bergamo
Locality (L)
  • Ponte San Pietro
Organization (O)
  • Aruba S.p.A.
Common Name (CN)
  • *.aruba.it
Alternative Names
  • *.aruba.it
  • aruba.it
Issuer
Country (C)
  • IT
State (ST)
  • Bergamo
Locality (L)
  • Ponte San Pietro
Organization (O)
  • Actalis S.p.A./03358520967
Common Name (CN)
  • Actalis Organization Validated Server CA G2
validity period
Not valid before
2019-04-01
Not valid after
2021-04-01
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Client Authentication
  • TLS Web Server Authentication
Fingerprints
SHA256
92:83:4B:D8:95:63:7F:9C:8F:74:63:69:16:01:2C:D3:2A:77:3E:E6:60:F2:3D:8B:21:E9:C8:B8:29:7F:B1:F0
SHA1
5C:35:2B:37:FE:4A:C4:88:E2:89:89:7E:0A:F6:F6:08:2C:96:64:A9
X509v3 extensions
authorityKeyIdentifier
  • keyid:62:FE:BB:27:8A:64:44:ED:68:96:5A:58:79:A1:DB:5A:26:AD:FF:BB
authorityInfoAccess
  • CA Issuers - URI:http://cacert.actalis.it/certs/actalis-authovg2
  • OCSP - URI:http://ocsp09.actalis.it/VA/AUTHOV-G2
certificatePolicies
  • Policy: 1.3.159.1.19.1
  • CPS: https://www.actalis.it/area-download
  • Policy: 2.23.140.1.2.2
crlDistributionPoints
  • Full Name:
  • URI:http://crl09.actalis.it/Repository/AUTHOV-G2/getLastCRL
subjectKeyIdentifier
  • 39:7C:45:B4:5F:DF:58:72:E3:B5:63:E4:6C:6F:A0:FC:EF:14:0B:55
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5C:DC:43:92:FE:E6:AB:45:44:B1:5E:9A:D4:56:E6:10:
  • 37:FB:D5:FA:47:DC:A1:73:94:B2:5E:E6:F6:C7:0E:CA
  • Timestamp : Apr 1 07:33:59.362 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:77:E8:DA:98:95:17:84:40:63:3E:D2:0C:
  • 8A:7E:E9:5A:B5:DD:C9:BD:3C:BB:54:56:BA:E7:81:7A:
  • 16:C9:F8:14:02:21:00:C0:7A:9E:77:44:8C:E8:49:6F:
  • 1B:A6:D1:1F:C9:97:11:8C:9B:9E:90:FD:0A:33:81:27:
  • 18:2D:7F:D8:85:CF:1B
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 44:94:65:2E:B0:EE:CE:AF:C4:40:07:D8:A8:FE:28:C0:
  • DA:E6:82:BE:D8:CB:31:B5:3F:D3:33:96:B5:B6:81:A8
  • Timestamp : Apr 1 07:33:58.744 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:1D:78:67:6F:35:76:77:05:0A:41:6B:17:
  • 84:37:9C:81:6A:84:12:B6:CE:3B:AD:57:AC:E6:0A:45:
  • 45:2B:71:BC:02:21:00:FE:A7:14:9E:3C:D0:29:1B:39:
  • 42:4C:D8:E3:0C:D9:8E:33:DC:8A:72:16:23:77:04:51:
  • CB:99:9D:9F:99:32:F0
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : EE:4B:BD:B7:75:CE:60:BA:E1:42:69:1F:AB:E1:9E:66:
  • A3:0F:7E:5F:B0:72:D8:83:00:C4:7B:89:7A:A8:FD:CB
  • Timestamp : Apr 1 07:33:58.683 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:DD:07:B0:48:11:83:DF:D4:CC:8F:18:
  • 4A:A6:64:FA:84:AF:89:D1:FB:0B:06:B4:9B:91:50:3F:
  • BC:95:6D:E1:D4:02:21:00:F3:57:71:88:D3:0F:E4:D6:
  • E1:61:84:21:58:1F:BF:4A:35:66:62:63:21:89:DA:1D:
  • 63:4D:2C:BA:CF:C9:50:27