SSL check results of extranet.conplio.ch

NEW You can also bulk check multiple servers.

Discover if the mail servers for extranet.conplio.ch can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 27 Apr 2024 13:37:59 +0000

We can not guarantee a secure connection to the mailservers of extranet.conplio.ch!

Please contact the operator of extranet.conplio.ch and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/extranet.conplio.ch

Servers

Incoming Mails

These servers are responsible for incoming mails to @extranet.conplio.ch addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
extranet.conplio.ch
91.135.65.185
-
supported
extranet.conplio.ch
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • SSLv3
12 s
extranet.conplio.ch
91.135.71.185
Results incomplete
- not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s

Outgoing Mails

We have not received any emails from a @extranet.conplio.ch address so far. Test mail delivery

Certificates

First seen at:

CN=extranet.conplio.ch

Certificate chain
  • extranet.conplio.ch
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • extranet.conplio.ch
Alternative Names
  • extranet.conplio.ch
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2024-03-04
Not valid after
2024-06-02
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
66:1F:48:12:76:EF:D6:14:EC:D8:08:2C:FE:7C:1C:11:FD:94:4C:31:8F:45:47:57:6C:AE:65:4F:CD:C6:6E:27
SHA1
5D:57:98:C3:FB:E8:3B:D9:E7:0B:19:0B:F4:E3:97:C1:AD:2E:CD:9F
X509v3 extensions
subjectKeyIdentifier
  • 2A:A1:07:6B:62:35:9E:3C:58:51:2C:AF:C7:11:74:0C:06:54:20:D5
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2:
  • 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B
  • Timestamp : Mar 4 13:41:11.794 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:4E:8A:93:2A:CD:56:7F:48:9F:FE:B7:D2:
  • B0:C8:C7:43:CD:4E:B3:EA:50:7A:BB:66:CC:93:5E:FB:
  • C5:C6:0A:E3:02:21:00:C7:B0:F9:F6:F9:86:6C:CA:72:
  • 3C:5A:12:77:5C:B6:D0:7D:1E:F7:8A:63:15:28:67:93:
  • 35:5E:54:60:3C:DA:6A
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 48:B0:E3:6B:DA:A6:47:34:0F:E5:6A:02:FA:9D:30:EB:
  • 1C:52:01:CB:56:DD:2C:81:D9:BB:BF:AB:39:D8:84:73
  • Timestamp : Mar 4 13:41:12.271 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:81:1A:9B:35:15:E0:E6:B1:53:2E:D3:
  • 50:3C:FF:AA:EE:1A:25:AA:EC:3F:CA:DC:45:DB:9D:F0:
  • 07:9E:CD:DE:8E:02:20:45:6F:AA:FC:1E:77:B6:FC:B2:
  • 81:B5:0F:93:8C:A4:76:7D:E3:8B:C3:4B:21:58:82:AE:
  • 72:59:23:73:F9:BA:0B