SSL check results of drogisterij.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for drogisterij.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 14 Jan 2020 14:41:28 +0000

We can not guarantee a secure connection to the mailservers of drogisterij.net!

Please contact the operator of drogisterij.net and ask him or her to solve this problem. This result stays accessible under the following address:

https://ssl-tools.net/mailservers/drogisterij.net

Servers

Incoming Mails

These servers are responsible for incoming mails to @drogisterij.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail3.inperon.nl
2a03:8180:1001:95::4
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
mail3.inperon.nl
5.153.21.245
10
supported
mail3.inperon.nl
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
11 s

Outgoing Mails

We have not received any emails from a @drogisterij.net address so far. Test mail delivery

Certificates

First seen at:

CN=mail3.inperon.nl,OU=PositiveSSL,OU=Domain Control Validated

Certificate chain
  • mail3.inperon.nl
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Unknown Authority

      Sectigo RSA Domain Validation Secure Server CA
Subject
Organizational Unit (OU)
  • Domain Control Validated
  • PositiveSSL
Common Name (CN)
  • mail3.inperon.nl
Alternative Names
  • mail3.inperon.nl
  • www.mail3.inperon.nl
Issuer
Country (C)
  • GB
State (ST)
  • Greater Manchester
Locality (L)
  • Salford
Organization (O)
  • Sectigo Limited
Common Name (CN)
  • Sectigo RSA Domain Validation Secure Server CA
validity period
Not valid before
2019-01-18
Not valid after
2020-01-31
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
E5:B5:D1:ED:AE:CE:27:30:03:0E:75:C9:34:8E:93:A5:42:AD:3D:6E:43:DC:1E:F1:92:84:60:29:D9:95:B2:D6
SHA1
0C:00:FA:3A:06:8E:83:FA:9F:33:B5:22:55:44:AD:E5:06:66:43:0A
X509v3 extensions
authorityKeyIdentifier
  • keyid:8D:8C:5E:C4:54:AD:8A:E1:77:E9:9B:F9:9B:05:E1:B8:01:8D:61:E1
subjectKeyIdentifier
  • FB:D3:33:31:90:C3:8D:71:52:79:5B:8D:57:00:70:4B:EF:6D:E4:5B
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.7
  • CPS: https://sectigo.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • CA Issuers - URI:http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
  • OCSP - URI:http://ocsp.sectigo.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : BB:D9:DF:BC:1F:8A:71:B5:93:94:23:97:AA:92:7B:47:
  • 38:57:95:0A:AB:52:E8:1A:90:96:64:36:8E:1E:D1:85
  • Timestamp : Jan 18 11:42:37.417 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:33:E6:63:51:2F:C0:F4:1E:DD:2E:CE:3C:
  • 33:B4:19:A9:E7:4F:FA:83:B2:07:77:19:A6:6B:51:10:
  • C7:91:55:99:02:21:00:E5:DB:51:51:BE:01:E4:7C:2A:
  • 0A:7B:02:2D:2F:00:3B:99:1F:93:21:90:B8:47:A2:19:
  • B7:F5:A8:45:75:9B:94
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5E:A7:73:F9:DF:56:C0:E7:B5:36:48:7D:D0:49:E0:32:
  • 7A:91:9A:0C:84:A1:12:12:84:18:75:96:81:71:45:58
  • Timestamp : Jan 18 11:42:37.491 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:2C:18:07:66:30:58:A3:3C:8D:24:D1:0B:
  • 9D:F4:D0:2A:AA:13:27:D9:AF:E3:4D:AB:50:62:71:F7:
  • 78:00:12:BB:02:20:3F:9D:D5:19:9B:85:8A:CE:F4:01:
  • D8:A2:A6:4C:BC:E7:B1:BA:0D:60:19:D3:8A:EB:F5:F0:
  • F6:34:EB:63:1A:B0