SSL check results of fysiotherapiesimons.nl

NEW You can also bulk check multiple servers.

Discover if the mail servers for fysiotherapiesimons.nl can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 01 Aug 2020 20:33:40 +0000

The mailservers of fysiotherapiesimons.nl can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @fysiotherapiesimons.nl addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx2.xel.nl
2001:888:214f::525e:f605
10
supported
*.xel.nl
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mx2.xel.nl
82.94.246.5
10
supported
*.xel.nl
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mx1.xel.nl
2001:888:214f::525e:f604
10
supported
*.xel.nl
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s
mx1.xel.nl
82.94.246.4
10
supported
*.xel.nl
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mx11.xel.nl
2001:888:214f::525e:f619
10
supported
*.xel.nl
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s
mx11.xel.nl
82.94.246.25
10
supported
*.xel.nl
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mx3.xel.nl
2001:888:214f::525e:f603
15
supported
*.xel.nl
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mx3.xel.nl
82.94.246.3
15
supported
*.xel.nl
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s

Outgoing Mails

We have not received any emails from a @fysiotherapiesimons.nl address so far. Test mail delivery

Certificates

First seen at:

CN=*.xel.nl

Certificate chain
Subject
Common Name (CN)
  • *.xel.nl
Alternative Names
  • *.xel.nl
  • xel.nl
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • RapidSSL TLS RSA CA G1
validity period
Not valid before
2019-11-07
Not valid after
2022-01-05
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
15:F3:D4:5A:AA:D2:3A:89:8E:9E:A3:DF:BE:DE:63:C3:AB:7D:0D:C6:32:C9:28:E3:C5:23:9D:CB:F0:B5:6E:3A
SHA1
1E:79:02:19:86:F8:F1:A4:9C:37:2F:32:3F:98:0F:E4:07:06:81:E8
X509v3 extensions
authorityKeyIdentifier
  • keyid:0C:DB:6C:82:49:0F:4A:67:0A:B8:14:EE:7A:C4:48:52:88:EB:56:38
subjectKeyIdentifier
  • 42:DE:21:92:0B:5A:4D:7C:BC:77:71:F7:8E:1B:28:13:DB:7E:01:2F
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.rapidssl.com/RapidSSLTLSRSACAG1.crl
certificatePolicies
  • Policy: 2.16.840.1.114412.1.2
  • CPS: https://www.digicert.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • OCSP - URI:http://status.rapidssl.com
  • CA Issuers - URI:http://cacerts.rapidssl.com/RapidSSLTLSRSACAG1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A4:B9:09:90:B4:18:58:14:87:BB:13:A2:CC:67:70:0A:
  • 3C:35:98:04:F9:1B:DF:B8:E3:77:CD:0E:C8:0D:DC:10
  • Timestamp : Nov 7 12:50:02.630 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:8C:83:EF:BC:57:A6:6F:5F:B3:7B:6B:
  • 37:84:4F:B6:C7:5F:07:65:B1:ED:5C:5D:C6:A5:1A:FB:
  • F4:7F:DF:25:B0:02:20:06:3B:24:C6:A8:E2:A3:4F:01:
  • 0B:E5:E1:1C:8F:72:E0:E3:15:9D:67:54:C4:2E:BF:A3:
  • E4:3F:8A:3A:94:D1:B4
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 56:14:06:9A:2F:D7:C2:EC:D3:F5:E1:BD:44:B2:3E:C7:
  • 46:76:B9:BC:99:11:5C:C0:EF:94:98:55:D6:89:D0:DD
  • Timestamp : Nov 7 12:50:02.821 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:45:CC:91:2F:54:6C:E0:CF:87:C8:25:73:
  • 42:8A:1B:2C:37:BF:F4:DD:2A:CE:43:C2:49:75:00:A0:
  • 07:84:F3:FE:02:21:00:F4:74:AE:2C:1B:C9:04:98:DD:
  • 08:6B:4E:86:E8:6A:C0:E0:C2:4B:F5:DB:55:BB:EE:5C:
  • 6A:7F:C4:20:19:B9:25
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : BB:D9:DF:BC:1F:8A:71:B5:93:94:23:97:AA:92:7B:47:
  • 38:57:95:0A:AB:52:E8:1A:90:96:64:36:8E:1E:D1:85
  • Timestamp : Nov 7 12:50:02.635 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:B1:9E:91:B9:91:24:F6:D9:52:2F:9D:
  • 83:1B:EA:E6:38:1B:05:95:10:E4:0E:DA:95:E2:43:D2:
  • 0D:9F:78:FB:84:02:20:51:BB:96:64:67:97:EB:DF:80:
  • 0D:13:EB:63:F6:A4:A7:69:AD:6C:68:D7:3E:DE:DF:84:
  • E4:3F:3A:0A:DC:6D:4A