SSL check results of grupolabor.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for grupolabor.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 15 Jan 2022 01:21:55 +0000

The mailservers of grupolabor.net can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @grupolabor.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.grupolabor.net
67.20.113.110
0
supported
webmail.grupolabor.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
44 s

Outgoing Mails

We have not received any emails from a @grupolabor.net address so far. Test mail delivery

Certificates

First seen at:

CN=webmail.grupolabor.net

Certificate chain
  • webmail.grupolabor.net
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • webmail.grupolabor.net
Alternative Names
  • autodiscover.grupolabor.net
  • cpanel.grupolabor.net
  • cpcalendars.grupolabor.net
  • cpcontacts.grupolabor.net
  • grupolabor.net
  • mail.grupolabor.net
  • webdisk.grupolabor.net
  • webmail.grupolabor.net
  • www.grupolabor.net
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2022-01-09
Not valid after
2022-04-09
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
02:35:A4:9E:96:F4:DD:65:DF:A2:69:67:73:E6:CA:D3:F2:5A:AA:EA:9F:85:D0:C8:39:CF:20:75:46:E2:38:CF
SHA1
4A:22:7A:65:95:5F:B1:CD:15:81:3C:90:F5:71:E6:ED:CE:33:8E:EA
X509v3 extensions
subjectKeyIdentifier
  • 15:3E:D9:F4:5A:2F:B1:58:D0:7E:E8:D3:69:0F:3B:C6:3E:CA:1B:1A
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DF:A5:5E:AB:68:82:4F:1F:6C:AD:EE:B8:5F:4E:3E:5A:
  • EA:CD:A2:12:A4:6A:5E:8E:3B:12:C0:20:44:5C:2A:73
  • Timestamp : Jan 9 13:03:35.022 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:A6:2C:13:61:28:29:D4:64:CE:7C:E4:
  • FD:B4:D1:01:67:B1:34:90:A4:19:7D:62:34:2A:C4:B6:
  • 8B:38:43:18:AE:02:21:00:F8:5A:7F:F4:E4:1B:10:C6:
  • 0F:9E:42:13:48:1E:D0:FF:83:9D:BA:72:43:BB:10:EA:
  • 98:3F:B9:4A:16:B6:1D:48
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 46:A5:55:EB:75:FA:91:20:30:B5:A2:89:69:F4:F3:7D:
  • 11:2C:41:74:BE:FD:49:B8:85:AB:F2:FC:70:FE:6D:47
  • Timestamp : Jan 9 13:03:35.063 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:87:EF:E2:4B:22:8B:0F:FC:75:18:3A:
  • CD:0B:50:E0:49:1A:BB:00:3B:7B:3E:1B:F9:87:A8:98:
  • ED:4B:EC:D5:9B:02:21:00:E4:CF:AB:0E:AB:BC:29:98:
  • 26:F5:08:16:C9:12:09:3C:57:42:0D:F0:4C:71:8C:21:
  • E1:B4:5B:C9:DC:56:3A:53