SSL check results of duttlinger.email

NEW You can also bulk check multiple servers.

Discover if the mail servers for duttlinger.email can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 30 May 2020 23:38:31 +0000

We can not guarantee a secure connection to the mailservers of duttlinger.email!

Please contact the operator of duttlinger.email and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/duttlinger.email

Servers

Incoming Mails

These servers are responsible for incoming mails to @duttlinger.email addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
server1.egroc.de
81.169.215.198
10
supported
server1.egroc.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
5 s
tar.junkemailfilter.com
184.105.182.224
20
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
31 s
tar.junkemailfilter.com
184.105.182.214
20
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
31 s
tar.junkemailfilter.com
184.105.182.225
20
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
30 s
tar.junkemailfilter.com
184.105.182.215
20
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
30 s
tar.junkemailfilter.com
184.105.182.213
Results incomplete
20
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
tar.junkemailfilter.com
184.105.182.223
Results incomplete
20
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @duttlinger.email address so far. Test mail delivery

Certificates

First seen at:

CN=server1.egroc.de

Certificate chain
Subject
Common Name (CN)
  • server1.egroc.de
Alternative Names
  • server1.egroc.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-05-16
Not valid after
2020-08-14
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
D3:04:19:46:59:B3:36:5C:EE:9C:00:15:9E:F8:E9:13:C5:A0:4A:DA:CA:8E:EA:88:5E:4D:62:F9:FE:F7:DC:C3
SHA1
0C:70:9B:F2:C2:55:CE:16:A6:CC:56:81:5B:02:23:A5:E7:57:C1:CE
X509v3 extensions
subjectKeyIdentifier
  • 5C:64:C6:91:83:97:2C:B1:CB:B8:41:A4:35:67:6C:E9:CA:7F:28:BC
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5E:A7:73:F9:DF:56:C0:E7:B5:36:48:7D:D0:49:E0:32:
  • 7A:91:9A:0C:84:A1:12:12:84:18:75:96:81:71:45:58
  • Timestamp : May 16 05:09:42.307 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:4B:D1:B9:6F:04:F2:91:ED:BC:71:3B:2C:
  • 61:C3:DC:FD:ED:4A:CD:CB:13:7B:54:3A:C1:5A:65:52:
  • B3:D9:2A:37:02:21:00:F8:8A:25:D9:1A:13:FB:35:7D:
  • 2C:3F:C8:EB:40:31:99:8B:B3:A2:D0:02:F6:FE:F6:09:
  • EB:FD:9E:D1:63:76:58
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : B2:1E:05:CC:8B:A2:CD:8A:20:4E:87:66:F9:2B:B9:8A:
  • 25:20:67:6B:DA:FA:70:E7:B2:49:53:2D:EF:8B:90:5E
  • Timestamp : May 16 05:09:42.299 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:26:9A:B7:07:6F:5B:C0:85:21:7E:5C:36:
  • 9B:04:63:82:D0:CD:B9:9E:AC:94:E9:A2:E7:C0:AC:5A:
  • 4F:4D:61:FD:02:21:00:85:EA:3D:F8:C3:72:44:70:25:
  • 4A:C8:03:EE:0B:99:70:E4:C7:0C:C2:48:5A:18:6E:51:
  • 09:F9:9E:08:5D:20:D7
First seen at:

CN=junkemailfilter.com

Certificate chain
Subject
Common Name (CN)
  • junkemailfilter.com
Alternative Names
  • *.junkemailfilter.com
  • junkemailfilter.com
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-05-11
Not valid after
2020-08-09
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
67:BD:75:21:38:48:26:5E:D6:E2:0D:46:51:35:54:41:18:C9:62:B8:17:8D:EB:A7:2C:3A:1E:11:0A:67:CB:DD
SHA1
86:AE:7F:ED:09:D3:39:40:93:E9:FA:1A:D3:EF:D1:4F:1F:73:9C:A4
X509v3 extensions
subjectKeyIdentifier
  • FB:20:D2:FC:30:AA:F6:DC:89:B0:30:23:C6:40:1C:8E:85:77:B1:BD
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : B2:1E:05:CC:8B:A2:CD:8A:20:4E:87:66:F9:2B:B9:8A:
  • 25:20:67:6B:DA:FA:70:E7:B2:49:53:2D:EF:8B:90:5E
  • Timestamp : May 11 10:40:28.205 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:D6:27:75:B2:C3:04:DF:26:18:B1:36:
  • 1E:90:55:E2:62:47:10:72:94:AA:4C:5D:23:C5:84:1B:
  • 4A:8F:E1:97:19:02:21:00:9A:2F:A6:BB:60:96:BE:B9:
  • 0C:46:EF:E4:A0:75:1F:6A:16:B0:12:C5:FB:23:6D:EE:
  • 6D:63:9A:5B:DC:C7:C8:85
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : May 11 10:40:28.378 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:87:2D:7F:7C:D3:F8:CD:7A:18:9A:7A:
  • 20:47:38:20:01:58:62:F3:C7:05:89:44:2D:9F:6F:93:
  • 58:1D:87:98:F0:02:20:16:C5:81:2C:7D:E9:3F:80:32:
  • 3C:BE:A6:95:06:D7:58:75:FD:65:5E:6D:E0:EA:80:98:
  • E6:4C:38:C1:61:B2:21