SSL check results of ffbruck.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for ffbruck.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 05 Jul 2025 08:29:11 +0000

The mailservers of ffbruck.net can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @ffbruck.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.ffbruck.net
2a0a:4cc0::20a1:489b:b2ff:fe15:cb6b
10
supported
mail.ffbruck.net
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
6 s
mail.ffbruck.net
152.53.44.13
10
supported
mail.ffbruck.net
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
5 s

Outgoing Mails

We have not received any emails from a @ffbruck.net address so far. Test mail delivery

Certificates

First seen at:

CN=mail.ffbruck.net

Certificate chain
  • mail.ffbruck.net
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R10
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail.ffbruck.net
Alternative Names
  • autoconfig.ffbruck.net
  • autoconfig.frankess.de
  • autodiscover.ffbruck.net
  • autodiscover.frankess.de
  • mail.ffbruck.net
  • mail.frankess.de
  • webmail.ffbruck.net
  • webmail.frankess.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R10
validity period
Not valid before
2025-05-10
Not valid after
2025-08-08
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
BB:E4:DD:71:26:7C:BD:E6:66:38:0D:E6:88:97:FE:8B:6F:5C:B5:63:63:88:56:B6:65:48:B1:03:E6:78:F3:C8
SHA1
B8:26:1B:9C:91:13:5B:50:3E:D6:D3:23:22:F2:A6:A8:7D:F1:EE:44
X509v3 extensions
subjectKeyIdentifier
  • 34:FF:8E:8A:04:36:05:EC:51:43:80:7E:05:3F:81:0C:7C:B6:12:04
authorityKeyIdentifier
  • keyid:BB:BC:C3:47:A5:E4:BC:A9:C6:C3:A4:72:0C:10:8D:A2:35:E1:C8:E8
authorityInfoAccess
  • CA Issuers - URI:http://r10.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://r10.c.lencr.org/17.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 1A:04:FF:49:D0:54:1D:40:AF:F6:A0:C3:BF:F1:D8:C4:
  • 67:2F:4E:EC:EE:23:40:68:98:6B:17:40:2E:DC:89:7D
  • Timestamp : May 10 17:19:35.396 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:C6:D2:57:9D:AC:EB:E1:46:1B:ED:77:
  • A3:F8:F5:62:F7:38:62:42:2C:48:4C:AE:76:06:D8:5E:
  • C7:83:6C:13:9F:02:20:24:6E:CD:11:03:A0:DF:09:65:
  • 1C:59:16:2D:57:75:38:3E:F4:5F:26:84:36:8A:9C:11:
  • 11:34:6D:C4:F0:2F:CB
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 0D:E1:F2:30:2B:D3:0D:C1:40:62:12:09:EA:55:2E:FC:
  • 47:74:7C:B1:D7:E9:30:EF:0E:42:1E:B4:7E:4E:AA:34
  • Timestamp : May 10 17:19:35.257 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:75:5B:29:3A:46:8F:55:A8:3B:C3:F6:C6:
  • CF:F6:1C:E1:72:C7:81:4A:68:57:93:1E:F2:7E:6E:7D:
  • B9:25:74:AA:02:20:0E:80:83:F6:E7:2B:30:0F:11:0E:
  • DD:7A:36:4F:1F:65:7C:09:7E:8B:38:F5:64:3C:49:70:
  • 35:36:70:42:94:90

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.ffbruck.net
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid