SSL check results of duttlinger.email

NEW You can also bulk check multiple servers.

Discover if the mail servers for duttlinger.email can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 01 Dec 2019 18:32:39 +0000

We can not guarantee a secure connection to the mailservers of duttlinger.email!

Please contact the operator of duttlinger.email and ask him or her to solve this problem. This result stays accessible under the following address:

https://ssl-tools.net/mailservers/duttlinger.email

Servers

Incoming Mails

These servers are responsible for incoming mails to @duttlinger.email addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
server1.egroc.de
81.169.215.198
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
tar.junkemailfilter.com
184.105.182.223
20
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • SSLv3
21 s
tar.junkemailfilter.com
184.105.182.225
20
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
32 s
tar.junkemailfilter.com
184.105.182.213
20
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
35 s
tar.junkemailfilter.com
184.105.182.224
20
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
9 s
tar.junkemailfilter.com
184.105.182.214
20
supported
junkemailfilter.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
36 s
tar.junkemailfilter.com
184.105.182.215
Results incomplete
20 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @duttlinger.email address so far. Test mail delivery

Certificates

First seen at:

CN=junkemailfilter.com

Certificate chain
Subject
Common Name (CN)
  • junkemailfilter.com
Alternative Names
  • *.junkemailfilter.com
  • junkemailfilter.com
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2019-11-12
Not valid after
2020-02-10
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
47:C3:70:B0:55:E5:4E:7C:0F:CD:11:DA:4F:5B:2B:DA:F7:B3:1D:0D:3F:D2:0B:2B:81:95:A5:D1:FA:D1:91:22
SHA1
04:FF:30:6D:36:13:D1:B0:DF:7A:CF:50:D3:B1:A2:97:53:D8:2A:40
X509v3 extensions
subjectKeyIdentifier
  • DF:EA:6F:84:69:04:E3:B2:88:82:80:91:17:CF:EE:63:CE:F0:A2:11
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5E:A7:73:F9:DF:56:C0:E7:B5:36:48:7D:D0:49:E0:32:
  • 7A:91:9A:0C:84:A1:12:12:84:18:75:96:81:71:45:58
  • Timestamp : Nov 12 11:16:15.124 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:8E:1C:6B:25:8D:B0:04:23:D3:B3:19:
  • A6:D9:B3:F3:67:BC:CA:0A:4B:32:8F:9C:9E:8A:AF:AC:
  • 8E:69:F0:88:5A:02:20:09:52:7D:DE:FC:DD:DC:2C:28:
  • 1D:FA:3C:32:13:5C:8A:FE:E5:44:B9:BA:53:E5:3A:71:
  • A2:4E:B9:2C:69:76:1A
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 07:B7:5C:1B:E5:7D:68:FF:F1:B0:C6:1D:23:15:C7:BA:
  • E6:57:7C:57:94:B7:6A:EE:BC:61:3A:1A:69:D3:A2:1C
  • Timestamp : Nov 12 11:16:15.202 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:27:7F:69:8D:60:20:A3:20:14:E5:B2:6F:
  • EB:19:8C:32:01:EE:A0:73:22:C8:B4:14:E1:A6:A9:3A:
  • 77:45:B1:92:02:21:00:E4:BF:12:5C:2B:7B:CA:8E:89:
  • 8F:AE:FB:1A:63:77:66:02:6B:9B:62:A0:36:39:74:E8:
  • FD:97:3E:11:0F:A5:F4