SSL check results of free.at

NEW You can also bulk check multiple servers.

Discover if the mail servers for free.at can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 28 Sep 2020 18:43:57 +0000

We can not guarantee a secure connection to the mailservers of free.at!

Please contact the operator of free.at and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/free.at

Servers

Incoming Mails

These servers are responsible for incoming mails to @free.at addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mg01.advanzia.com
80.92.70.170
10
supported
*.advanzia.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
12 s
mg02.advanzia.com
185.3.46.107
10
supported
*.advanzia.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
12 s
mx02.advanzia.com
80.92.70.171
Results incomplete
15
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mx08.advanzia.com
80.92.70.184
Results incomplete
15
supported
not checked
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • SSLv3
1 s
mx03.advanzia.com
80.92.70.172
Results incomplete
20
supported
not checked
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @free.at address so far. Test mail delivery

Certificates

First seen at:

CN=*.advanzia.com,O=Advanzia Bank S.A.,OU=IT Department,L=Schuttrange,ST=Luxembourg,C=LU

Certificate chain
  • *.advanzia.com
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Unknown Authority

      GlobalSign RSA OV SSL CA 2018
Subject
Country (C)
  • LU
State (ST)
  • Luxembourg
Locality (L)
  • Schuttrange
Organizational Unit (OU)
  • IT Department
Organization (O)
  • Advanzia Bank S.A.
Common Name (CN)
  • *.advanzia.com
Alternative Names
  • *.advanzia.com
  • owa.advanzia.com
  • mail.advanzia.com
  • autodiscover.advanzia.com
  • advanzia.com
Issuer
Country (C)
  • BE
Organization (O)
  • GlobalSign nv-sa
Common Name (CN)
  • GlobalSign RSA OV SSL CA 2018
validity period
Not valid before
2020-05-13
Not valid after
2022-08-06
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
2B:42:28:A3:94:77:4C:13:BA:E8:30:B6:45:EB:00:E7:28:3E:CA:2B:D2:AA:A0:11:0B:DC:36:CA:56:9E:C0:A0
SHA1
FE:64:65:25:AE:D4:BF:2B:54:9C:84:0E:51:1D:DE:E9:3B:BB:0F:F8
X509v3 extensions
authorityInfoAccess
  • CA Issuers - URI:http://secure.globalsign.com/cacert/gsrsaovsslca2018.crt
  • OCSP - URI:http://ocsp.globalsign.com/gsrsaovsslca2018
certificatePolicies
  • Policy: 1.3.6.1.4.1.4146.1.20
  • CPS: https://www.globalsign.com/repository/
  • Policy: 2.23.140.1.2.2
crlDistributionPoints
  • Full Name:
  • URI:http://crl.globalsign.com/gsrsaovsslca2018.crl
authorityKeyIdentifier
  • keyid:F8:EF:7F:F2:CD:78:67:A8:DE:6F:8F:24:8D:88:F1:87:03:02:B3:EB
subjectKeyIdentifier
  • D7:99:B3:CE:A1:FA:EE:38:8D:50:05:A6:4E:22:F8:E1:FF:80:B6:6B
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A4:B9:09:90:B4:18:58:14:87:BB:13:A2:CC:67:70:0A:
  • 3C:35:98:04:F9:1B:DF:B8:E3:77:CD:0E:C8:0D:DC:10
  • Timestamp : May 13 14:59:50.618 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:61:15:ED:67:B4:7F:6A:82:3A:1E:97:2E:
  • 02:75:07:AA:BF:0A:17:48:60:35:DA:8A:9B:B1:76:68:
  • 21:9D:B1:DA:02:21:00:DC:B2:12:60:79:C3:D5:8B:A6:
  • 4B:D5:B4:16:36:4A:3F:E3:B3:45:50:5E:A4:57:52:B4:
  • 5B:51:49:05:DD:7D:2B
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : May 13 14:59:49.724 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:C6:26:03:40:31:D9:EB:9C:10:B3:AC:
  • 52:57:19:F8:79:38:E0:D7:85:61:64:68:5F:4A:6B:B3:
  • 63:25:6F:C1:3B:02:21:00:81:17:64:5C:8F:4C:7F:1C:
  • 02:AB:FD:04:DF:6B:6A:13:82:0B:88:1A:7B:79:4E:5F:
  • A4:CE:25:4C:B4:9E:EF:3B
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 22:45:45:07:59:55:24:56:96:3F:A1:2F:F1:F7:6D:86:
  • E0:23:26:63:AD:C0:4B:7F:5D:C6:83:5C:6E:E2:0F:02
  • Timestamp : May 13 14:59:50.344 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:EA:BB:7E:56:D1:DA:BD:2D:DD:47:65:
  • 54:46:C0:52:15:F8:35:85:F6:3B:EA:B5:90:7F:8D:CE:
  • DD:08:79:0A:EA:02:21:00:F1:C9:B6:FB:44:3B:C4:1E:
  • 6F:CE:16:CC:65:55:BA:01:A0:09:BB:C0:82:BC:2D:8C:
  • 38:A0:EE:AF:3B:0D:38:D7
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 51:A3:B0:F5:FD:01:79:9C:56:6D:B8:37:78:8F:0C:A4:
  • 7A:CC:1B:27:CB:F7:9E:88:42:9A:0D:FE:D4:8B:05:E5
  • Timestamp : May 13 14:59:50.420 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:77:96:B1:82:46:BC:43:87:20:3F:56:62:
  • 7E:30:9F:A5:EA:4F:91:05:77:C6:17:6E:BC:E3:7E:68:
  • 12:51:7F:C7:02:20:05:B9:4A:A1:F3:8E:30:92:0F:CF:
  • E0:33:C4:D5:D2:86:7E:D5:AF:19:84:52:9E:4F:CF:B4:
  • 28:F1:43:A3:96:F8