SSL check results of disroot.org

NEW You can also bulk check multiple servers.

Discover if the mail servers for disroot.org can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 01 May 2024 20:37:41 +0000

No connection to the mailservers of disroot.org could be established.

Servers

Incoming Mails

These servers are responsible for incoming mails to @disroot.org addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
disroot.org
178.21.23.139
Results incomplete
10
supported
disroot.org
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have received emails from these servers with @disroot.org sender addresses. Test mail delivery

Host TLS Version & Cipher
knopi.disroot.org (178.21.23.139)
TLSv1.2 DHE-RSA-CHACHA20-POLY1305

Certificates

First seen at:

CN=disroot.org

Certificate chain
  • disroot.org
    • remaining
    • 256 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • disroot.org
Alternative Names
  • disroot.org
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2024-02-04
Not valid after
2024-05-04
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
C1:50:45:65:4D:02:B3:E8:D4:92:87:30:CA:91:D8:40:14:C5:69:ED:56:91:08:CA:EC:F1:53:EC:97:41:D6:25
SHA1
FC:0D:5F:8E:49:C4:26:78:AC:00:5F:50:2D:2C:0B:B5:DD:B9:F2:7C
X509v3 extensions
subjectKeyIdentifier
  • 5A:36:2D:0B:FA:23:02:4F:AE:1A:F9:9E:62:7F:DA:34:F0:13:47:5B
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 3B:53:77:75:3E:2D:B9:80:4E:8B:30:5B:06:FE:40:3B:
  • 67:D8:4F:C3:F4:C7:BD:00:0D:2D:72:6F:E1:FA:D4:17
  • Timestamp : Feb 4 17:19:12.593 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:06:BF:6B:E8:25:5A:A5:B0:D8:F5:1C:AE:
  • 7E:3D:38:03:A3:CD:EB:17:E3:6E:7C:6C:33:FD:D1:1A:
  • 96:89:1D:4E:02:21:00:A2:A0:0D:B8:46:3C:7F:A3:BE:
  • EC:5C:CA:62:3F:7B:1A:43:19:AD:28:AC:C2:76:C6:7D:
  • 6B:2E:42:CA:4C:7F:14
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34:
  • B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74
  • Timestamp : Feb 4 17:19:12.752 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:CD:53:CE:16:16:E2:4A:C3:41:71:F6:
  • 61:54:1E:FE:13:4C:23:4E:98:F7:1A:B9:3C:62:36:05:
  • DA:0B:75:BB:F2:02:20:1D:ED:DD:30:71:86:FE:1C:69:
  • 46:CF:67:3B:D4:6C:05:EE:A1:1E:75:91:D9:AA:0F:7F:
  • 93:7A:86:67:64:A3:54

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.disroot.org
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid