SSL check results of gzlivre.org

NEW You can also bulk check multiple servers.

Discover if the mail servers for gzlivre.org can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 27 Sep 2022 21:10:08 +0000

We can not guarantee a secure connection to the mailservers of gzlivre.org!

Please contact the operator of gzlivre.org and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/gzlivre.org

Servers

Incoming Mails

These servers are responsible for incoming mails to @gzlivre.org addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.gzlivre.org
82.98.145.3
Results incomplete
10
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
gzlivre.org
212.14.114.243
20
supported
raspberrypi
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s

Outgoing Mails

We have not received any emails from a @gzlivre.org address so far. Test mail delivery

Certificates

First seen at:

CN=raspberrypi

Certificate chain
  • raspberrypi (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • raspberrypi
Alternative Names
  • raspberrypi
Issuer

Certificate is self-signed.

validity period
Not valid before
2019-11-05
Not valid after
2029-11-02
Fingerprints
SHA256
33:62:A4:C7:04:84:45:FC:1A:B9:3E:3E:03:33:F4:A8:25:CE:BC:63:ED:74:C4:DF:9C:D3:E8:E2:49:CD:79:6B
SHA1
42:55:98:51:C2:67:60:16:4B:FC:1B:DE:0B:99:C2:B7:A9:3D:09:B7