SSL check results of ejbygruppe.dk

NEW You can also bulk check multiple servers.

Discover if the mail servers for ejbygruppe.dk can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 09 Oct 2020 04:51:08 +0000

The mailservers of ejbygruppe.dk can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @ejbygruppe.dk addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
hermod.arnested.dk
2a02:c207:2007:7741::1
10
supported
hermod.arnested.dk
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
13 s
hermod.arnested.dk
5.189.168.47
10
supported
hermod.arnested.dk
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
12 s

Outgoing Mails

We have received emails from these servers with @ejbygruppe.dk sender addresses. Test mail delivery

Host TLS Version & Cipher
hermod.arnested.dk (IPv6:2a02:c207:2007:7741::1)
TLSv1.2 AECDH-AES256-SHA
hermod.arnested.dk (5.189.168.47)
TLSv1.2 AECDH-AES256-SHA

Certificates

First seen at:

CN=hermod.arnested.dk

Certificate chain
Subject
Common Name (CN)
  • hermod.arnested.dk
Alternative Names
  • hermod.arnested.dk
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-09-01
Not valid after
2020-11-30
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
77:9F:63:19:67:5A:36:59:04:0B:4E:FA:A3:40:1E:43:3C:E9:4E:08:D4:75:52:56:97:D3:38:72:B3:B7:A1:61
SHA1
93:84:9F:2F:76:89:42:DB:91:C6:6C:1E:D3:3E:D5:CC:59:BC:F0:46
X509v3 extensions
subjectKeyIdentifier
  • 3E:AD:BB:11:5F:E5:CF:E2:08:91:D6:F6:9D:82:32:BA:78:69:6B:0D
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E7:12:F2:B0:37:7E:1A:62:FB:8E:C9:0C:61:84:F1:EA:
  • 7B:37:CB:56:1D:11:26:5B:F3:E0:F3:4B:F2:41:54:6E
  • Timestamp : Sep 1 06:50:08.514 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:90:2A:78:8D:15:EA:62:8C:ED:09:94:
  • 6F:F5:C0:C2:58:3D:37:95:A9:7B:17:6A:AC:FF:09:52:
  • 0E:A3:79:12:9C:02:20:3E:61:FD:D8:59:ED:32:B9:6E:
  • 44:96:1A:53:3A:D7:BE:3E:D7:E9:34:42:53:C5:4E:40:
  • 50:47:DC:F0:5A:65:44
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 07:B7:5C:1B:E5:7D:68:FF:F1:B0:C6:1D:23:15:C7:BA:
  • E6:57:7C:57:94:B7:6A:EE:BC:61:3A:1A:69:D3:A2:1C
  • Timestamp : Sep 1 06:50:08.559 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:39:3D:9A:45:F2:B7:A6:8D:44:D4:8F:1C:
  • DE:22:9F:FA:CF:A5:B5:EA:51:68:0B:87:75:2F:9D:47:
  • 1C:77:B8:D3:02:21:00:A2:F4:9A:98:93:6E:80:EC:7C:
  • 92:83:18:87:B3:1C:E7:97:50:F4:64:FA:7A:26:61:95:
  • F2:0D:C1:C7:8D:8E:69

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.hermod.arnested.dk
  • DANE-TA: Trust Anchor Assertion
  • Use full certificate
  • SHA-256 Hash
valid
valid