SSL check results of eee.ufmg.br

NEW You can also bulk check multiple servers.

Discover if the mail servers for eee.ufmg.br can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 15 Sep 2021 04:27:24 +0000

We can not guarantee a secure connection to the mailservers of eee.ufmg.br!

Please contact the operator of eee.ufmg.br and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/eee.ufmg.br

Servers

Incoming Mails

These servers are responsible for incoming mails to @eee.ufmg.br addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail1.grude.ufmg.br
150.164.64.65
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
12 s
mail2.grude.ufmg.br
150.164.64.66
Results incomplete
30 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
mail.ufmg.br
150.164.64.64
50
supported
*.ufmg.br
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
22 s
mail.ufmg.br
150.164.64.63
50
supported
*.ufmg.br
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
23 s
mail.ufmg.br
150.164.64.62
50
supported
*.ufmg.br
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
22 s
mail.ufmg.br
150.164.64.61
50
supported
*.ufmg.br
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
22 s

Outgoing Mails

We have not received any emails from a @eee.ufmg.br address so far. Test mail delivery

Certificates

First seen at:

CN=*.ufmg.br,O=UNIVERSIDADE FEDERAL DE MINAS GERAIS,L=Belo Horizonte,ST=MG,C=BR

Certificate chain
  • *.ufmg.br
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Unknown Authority

      GlobalSign RSA OV SSL CA 2018
Subject
Country (C)
  • BR
State (ST)
  • MG
Locality (L)
  • Belo Horizonte
Organization (O)
  • UNIVERSIDADE FEDERAL DE MINAS GERAIS
Common Name (CN)
  • *.ufmg.br
Alternative Names
  • *.ufmg.br
  • ufmg.br
Issuer
Country (C)
  • BE
Organization (O)
  • GlobalSign nv-sa
Common Name (CN)
  • GlobalSign RSA OV SSL CA 2018
validity period
Not valid before
2020-07-09
Not valid after
2022-07-10
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
E1:DE:02:20:DF:B2:57:6E:B0:4A:AE:E1:62:44:D2:14:67:C6:DA:D1:1F:05:57:CD:B0:AD:01:2B:FB:AC:59:34
SHA1
6C:44:FA:0D:0D:83:4A:87:19:89:5E:2D:D0:1E:91:8E:15:73:F1:50
X509v3 extensions
authorityInfoAccess
  • CA Issuers - URI:http://secure.globalsign.com/cacert/gsrsaovsslca2018.crt
  • OCSP - URI:http://ocsp.globalsign.com/gsrsaovsslca2018
certificatePolicies
  • Policy: 1.3.6.1.4.1.4146.1.20
  • CPS: https://www.globalsign.com/repository/
  • Policy: 2.23.140.1.2.2
crlDistributionPoints
  • Full Name:
  • URI:http://crl.globalsign.com/gsrsaovsslca2018.crl
authorityKeyIdentifier
  • keyid:F8:EF:7F:F2:CD:78:67:A8:DE:6F:8F:24:8D:88:F1:87:03:02:B3:EB
subjectKeyIdentifier
  • 43:2B:C1:CB:4D:F1:2F:D9:68:E2:38:60:5D:95:DF:2C:C5:1A:40:7D
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 22:45:45:07:59:55:24:56:96:3F:A1:2F:F1:F7:6D:86:
  • E0:23:26:63:AD:C0:4B:7F:5D:C6:83:5C:6E:E2:0F:02
  • Timestamp : Jul 9 17:11:30.581 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:A2:F0:18:AA:A3:70:84:A1:05:AB:C0:
  • B1:E8:4F:98:3B:58:80:98:A1:D4:D1:9C:6B:3D:3C:CA:
  • E2:BF:79:8D:D9:02:20:67:23:DF:B1:1D:96:F1:1F:39:
  • 3C:93:4A:4F:4F:5C:E9:28:9C:C8:D0:E9:3F:1F:32:DF:
  • 3A:04:50:5B:9A:C5:74
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 29:79:BE:F0:9E:39:39:21:F0:56:73:9F:63:A5:77:E5:
  • BE:57:7D:9C:60:0A:F8:F9:4D:5D:26:5C:25:5D:C7:84
  • Timestamp : Jul 9 17:11:30.563 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:C9:A7:5D:A4:08:79:97:A4:BF:8A:58:
  • 31:3C:C0:74:EC:23:30:1E:D3:B7:70:B6:22:DC:38:CC:
  • 16:9C:99:8D:61:02:21:00:D1:CD:9A:26:37:EA:91:15:
  • 22:03:2C:B3:15:2E:C7:F6:4E:4C:05:CE:A3:38:B7:F5:
  • 97:3F:0F:CF:35:B8:A5:6E
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 51:A3:B0:F5:FD:01:79:9C:56:6D:B8:37:78:8F:0C:A4:
  • 7A:CC:1B:27:CB:F7:9E:88:42:9A:0D:FE:D4:8B:05:E5
  • Timestamp : Jul 9 17:11:30.612 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:6B:3F:91:39:22:DE:95:D1:B8:0A:BD:F2:
  • 48:43:D1:AC:48:9B:7E:F8:8C:FC:12:C4:69:C7:E0:FC:
  • A8:56:F1:5A:02:20:71:4E:B4:28:E8:01:15:4B:15:D1:
  • 42:DA:49:C4:90:67:DB:BD:6D:0C:D5:D7:5B:27:E4:C1:
  • 14:A2:A7:D9:3E:AD