SSL check results of fam-ruiter.eu

NEW You can also bulk check multiple servers.

Discover if the mail servers for fam-ruiter.eu can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 18 Jan 2022 14:02:30 +0000

The mailservers of fam-ruiter.eu can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @fam-ruiter.eu addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx.bhosted.nl
2a02:9e0:8000::10
Results incomplete
10
supported
not checked
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mx.bhosted.nl
2a02:9e0:8000::32
Results incomplete
10
supported
not checked
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mx.bhosted.nl
2a02:9e0:8000::12
Results incomplete
10
supported
not checked
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mx.bhosted.nl
94.124.121.12
Results incomplete
10
supported
not checked
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mx.bhosted.nl
94.124.121.32
Results incomplete
10
supported
not checked
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mx.bhosted.nl
94.124.121.10
Results incomplete
10
supported
not checked
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
fam-ruiter.eu
82.197.214.174
25
supported
fam-ruiter.eu
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have received emails from these servers with @fam-ruiter.eu sender addresses. Test mail delivery

Host TLS Version & Cipher
mail.fam-ruiter.eu (82.197.214.174)
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384

Certificates

First seen at:

CN=fam-ruiter.eu

Certificate chain
Subject
Common Name (CN)
  • fam-ruiter.eu
Alternative Names
  • fam-ruiter.eu
  • mail.fam-ruiter.eu
Issuer
Country (C)
  • GB
State (ST)
  • Greater Manchester
Locality (L)
  • Salford
Organization (O)
  • Sectigo Limited
Common Name (CN)
  • Sectigo RSA Domain Validation Secure Server CA
validity period
Not valid before
2021-09-15
Not valid after
2022-09-15
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
BA:73:6D:31:41:2F:50:5F:19:80:7C:38:86:73:7D:1B:74:6B:9F:FD:C2:E3:30:32:0F:79:6F:6E:ED:69:10:C7
SHA1
83:48:CA:29:F4:6F:A7:4E:54:14:D0:CC:7D:39:58:9A:23:5D:F0:E9
X509v3 extensions
authorityKeyIdentifier
  • keyid:8D:8C:5E:C4:54:AD:8A:E1:77:E9:9B:F9:9B:05:E1:B8:01:8D:61:E1
subjectKeyIdentifier
  • FC:F8:00:A7:6A:9B:E6:46:D6:25:4C:1B:E2:F4:7A:2A:40:C8:55:EA
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.7
  • CPS: https://sectigo.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • CA Issuers - URI:http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
  • OCSP - URI:http://ocsp.sectigo.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 46:A5:55:EB:75:FA:91:20:30:B5:A2:89:69:F4:F3:7D:
  • 11:2C:41:74:BE:FD:49:B8:85:AB:F2:FC:70:FE:6D:47
  • Timestamp : Sep 15 05:10:03.785 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:E6:94:D3:A1:C9:CB:39:99:5A:7F:67:
  • 63:83:36:6C:5F:61:8C:7B:BC:60:C5:83:26:48:81:00:
  • 9E:C4:9E:DE:D3:02:20:14:3A:CB:F0:6B:BC:C6:2E:67:
  • A1:58:8F:C6:A8:26:45:16:8E:E2:C0:7C:99:68:72:D1:
  • 09:B6:C5:F6:05:71:AB
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 41:C8:CA:B1:DF:22:46:4A:10:C6:A1:3A:09:42:87:5E:
  • 4E:31:8B:1B:03:EB:EB:4B:C7:68:F0:90:62:96:06:F6
  • Timestamp : Sep 15 05:10:03.717 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:18:A2:D1:11:34:C1:E2:20:54:E7:1B:54:
  • 64:F9:23:EB:2E:45:5B:19:DC:D0:03:68:98:7A:8D:CB:
  • 57:FD:F8:82:02:21:00:D4:56:6D:F0:8B:96:53:D2:FB:
  • 49:86:8B:05:A5:F1:20:32:1F:35:70:00:AD:49:16:AF:
  • F4:4C:11:34:AF:0E:74
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 29:79:BE:F0:9E:39:39:21:F0:56:73:9F:63:A5:77:E5:
  • BE:57:7D:9C:60:0A:F8:F9:4D:5D:26:5C:25:5D:C7:84
  • Timestamp : Sep 15 05:10:03.680 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:FF:FB:3F:95:CF:0C:92:85:08:9E:9E:
  • A8:71:39:FA:FB:8C:B7:6B:E5:09:83:FC:17:55:12:5F:
  • C6:9F:08:2C:8C:02:20:4E:71:67:C9:D3:D5:D5:4B:53:
  • 0A:3F:B6:8B:56:50:C7:CF:66:FF:C9:88:9F:82:32:3F:
  • 52:DF:C2:02:DB:AE:C1

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.fam-ruiter.eu
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid
_25._tcp.mx.bhosted.nl
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.mx.bhosted.nl
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid