SSL check results of darkfire.ch

NEW You can also bulk check multiple servers.

Discover if the mail servers for darkfire.ch can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 29 Nov 2024 23:43:16 +0000

The mailservers of darkfire.ch can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @darkfire.ch addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail01-01.darkfire.ch
2a02:169:605:101::121
10
supported
mail01-01.darkfire.ch
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mail01-01.darkfire.ch
81.6.35.252
10
supported
mail01-01.darkfire.ch
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have received emails from these servers with @darkfire.ch sender addresses. Test mail delivery

Host TLS Version & Cipher
mail01-01.darkfire.ch (81.6.35.252)
TLSv1.3 TLS_AES_256_GCM_SHA384
mail01-01.darkfire.ch (IPv6:2a02:169:605:102::121)
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384

Certificates

First seen at:

CN=mail01-01.darkfire.ch

Certificate chain
  • mail01-01.darkfire.ch
    • remaining
    • 256 bit
    • ecdsa-with-SHA384

      • E6
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail01-01.darkfire.ch
Alternative Names
  • imap.darkfire.ch
  • mail.darkfire.ch
  • mail01-01.darkfire.ch
  • smtp.darkfire.ch
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E6
validity period
Not valid before
2024-10-15
Not valid after
2025-01-13
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
B8:37:89:A8:EA:B2:80:BD:17:63:7F:DE:D2:84:7D:1E:00:C7:7F:70:AD:C2:6E:EF:7B:DE:B4:B2:E7:41:CC:EC
SHA1
2A:B5:9E:C6:B3:6B:67:F9:11:00:CF:E8:F1:BD:26:87:9E:5E:12:51
X509v3 extensions
subjectKeyIdentifier
  • CD:CB:0E:D9:E4:EB:29:0D:BE:F2:36:97:71:C4:18:A5:ED:77:2D:84
authorityKeyIdentifier
  • keyid:93:27:46:98:03:A9:51:68:8E:98:D6:C4:42:48:DB:23:BF:58:94:D2
authorityInfoAccess
  • OCSP - URI:http://e6.o.lencr.org
  • CA Issuers - URI:http://e6.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CF:11:56:EE:D5:2E:7C:AF:F3:87:5B:D9:69:2E:9B:E9:
  • 1A:71:67:4A:B0:17:EC:AC:01:D2:5B:77:CE:CC:3B:08
  • Timestamp : Oct 15 06:02:26.287 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:F2:D8:02:DE:E0:33:9C:98:0B:E4:DF:
  • 8F:6E:24:85:62:12:97:E9:D2:0F:04:91:40:48:06:83:
  • 1C:95:34:77:E7:02:21:00:91:F0:E4:62:52:4E:EB:86:
  • 3A:77:7D:14:5F:99:21:94:39:69:47:1C:DD:8D:8E:7A:
  • EE:CA:80:66:BA:A2:43:63
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 3F:17:4B:4F:D7:22:47:58:94:1D:65:1C:84:BE:0D:12:
  • ED:90:37:7F:1F:85:6A:EB:C1:BF:28:85:EC:F8:64:6E
  • Timestamp : Oct 15 06:02:28.242 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:33:B9:30:19:BA:26:8A:97:D7:2B:77:80:
  • B7:5F:AC:B2:08:3E:A2:BF:94:AB:72:A9:A8:50:24:33:
  • 4E:7A:BC:0C:02:20:53:A5:05:28:E7:CE:64:AB:A1:46:
  • DD:AF:95:CA:79:35:85:1B:53:6A:26:89:CC:DF:EA:07:
  • 09:42:37:38:60:10

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail01-01.darkfire.ch
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.mail01-01.darkfire.ch
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid