SSL check results of dotdash.dk

NEW You can also bulk check multiple servers.

Discover if the mail servers for dotdash.dk can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 05 Jun 2017 13:53:25 +0000

The mailservers of dotdash.dk can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @dotdash.dk addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
hermod.arnested.dk
2a02:c207:2007:7741::1
10
supported
hermod.arnested.dk
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
11 s
hermod.arnested.dk
5.189.168.47
10
supported
hermod.arnested.dk
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
11 s

Outgoing Mails

We have received emails from these servers with @dotdash.dk sender addresses. Test mail delivery

Host TLS Version & Cipher
hermod.arnested.dk (5.189.168.47)
TLSv1.2 AECDH-AES256-SHA
hermod.arnested.dk (IPv6:2a02:c207:2007:7741::1)
TLSv1.2 AECDH-AES256-SHA

Certificates

First seen at:

CN=hermod.arnested.dk

Certificate chain
Subject
Common Name (CN)
  • hermod.arnested.dk
Alternative Names
  • hermod.arnested.dk
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2017-04-30
Not valid after
2017-07-29
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
91:A8:4E:EF:13:EE:1B:E3:1A:94:96:42:25:03:28:15:A1:65:02:21:2C:AD:75:BB:02:B6:1D:78:6A:CC:3A:CD
SHA1
82:A7:73:57:8A:09:00:06:DB:7C:C3:AB:F3:EA:72:DA:7B:6A:0C:4D
X509v3 extensions
subjectKeyIdentifier
  • 07:97:B1:65:BA:41:BB:23:E1:70:29:21:A2:25:24:E9:D6:39:44:7E
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org/
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
  • User Notice:
  • Explicit Text: This Certificate may only be relied upon by Relying Parties and only in accordance with the Certificate Policy found at https://letsencrypt.org/repository/

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.hermod.arnested.dk
  • DANE-TA: Trust Anchor Assertion
  • Use full certificate
  • SHA-256 Hash
valid
valid