SSL check results of ewetel.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for ewetel.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 23 Aug 2018 13:39:47 +0000

The mailservers of ewetel.net can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @ewetel.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx1.ewetel.de
212.6.122.250
10
supported
*.ewetel.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
11 s

Outgoing Mails

We have received emails from these servers with @ewetel.net sender addresses. Test mail delivery

Host TLS Version & Cipher
mail-in11-06-pp.ewetel.de (212.6.122.116)
Insecure - not encrypted!
mail-out10.ewetel.de (212.6.122.10)
TLSv1.2 AECDH-AES256-SHA
mail-out13.ewetel.de (212.6.122.13)
TLSv1.2 AECDH-AES256-SHA
mail-out17.ewetel.de (212.6.122.17)
TLSv1.2 AECDH-AES256-SHA
mail-out23.ewetel.de (212.6.122.23)
TLSv1.2 AECDH-AES256-SHA

Certificates

First seen at:

CN=*.ewetel.de,OU=Domain Control Validated

Certificate chain
Subject
Organizational Unit (OU)
  • Domain Control Validated
Common Name (CN)
  • *.ewetel.de
Alternative Names
  • *.ewetel.de
  • ewetel.de
Issuer
Country (C)
  • GB
State (ST)
  • Greater Manchester
Locality (L)
  • Salford
Organization (O)
  • COMODO CA Limited
Common Name (CN)
  • COMODO RSA Domain Validation Secure Server CA
validity period
Not valid before
2017-12-01
Not valid after
2021-02-28
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
4C:88:D5:E6:A3:0E:70:15:8C:EA:AF:C3:41:D5:A1:26:AB:D0:FF:48:86:88:5A:D9:35:CC:AF:87:AE:11:77:93
SHA1
79:1A:C7:33:B6:B8:6F:8E:96:CB:71:13:C7:14:C3:FE:CC:94:01:67
X509v3 extensions
authorityKeyIdentifier
  • keyid:90:AF:6A:3A:94:5A:0B:D8:90:EA:12:56:73:DF:43:B4:3A:28:DA:E7
subjectKeyIdentifier
  • 27:88:C8:D5:E7:91:3A:2D:0E:00:2A:56:5B:41:21:5E:85:EC:32:B9
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.7
  • CPS: https://secure.comodo.com/CPS
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl
authorityInfoAccess
  • CA Issuers - URI:http://crt.comodoca.com/COMODORSADomainValidationSecureServerCA.crt
  • OCSP - URI:http://ocsp.comodoca.com