SSL check results of hermod.arnested.dk

NEW You can also bulk check multiple servers.

Discover if the mail servers for hermod.arnested.dk can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 09 Jan 2025 21:31:57 +0000

The mailservers of hermod.arnested.dk can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @hermod.arnested.dk addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
hermod.arnested.dk
2a02:c207:2007:7741::1
10
supported
hermod.arnested.dk
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
7 s
hermod.arnested.dk
5.189.168.47
10
supported
hermod.arnested.dk
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have received emails from these servers with @hermod.arnested.dk sender addresses. Test mail delivery

Host TLS Version & Cipher
hermod.arnested.dk (IPv6:2a02:c207:2007:7741::1)
TLSv1.3 TLS_AES_256_GCM_SHA384
unknown (5.189.168.47)
TLSv1.3 TLS_AES_256_GCM_SHA384

Certificates

First seen at:

CN=hermod.arnested.dk

Certificate chain
  • hermod.arnested.dk
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R10
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • hermod.arnested.dk
Alternative Names
  • hermod.arnested.dk
  • status.arnested.dk
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R10
validity period
Not valid before
2024-12-21
Not valid after
2025-03-21
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
86:74:34:F5:C1:B7:60:EE:2A:A5:3F:65:5F:D3:BF:9A:D0:CD:BD:40:DD:F6:C4:C4:6E:32:DF:E9:D0:C7:07:BE
SHA1
66:D6:15:85:D0:8E:BC:2E:3A:8F:A4:C7:DB:A5:7F:7C:EB:A4:A6:E6
X509v3 extensions
subjectKeyIdentifier
  • 81:D5:3B:23:5E:D3:AA:2E:B9:DB:EE:A8:34:A1:03:90:C9:56:F6:8D
authorityKeyIdentifier
  • keyid:BB:BC:C3:47:A5:E4:BC:A9:C6:C3:A4:72:0C:10:8D:A2:35:E1:C8:E8
authorityInfoAccess
  • OCSP - URI:http://r10.o.lencr.org
  • CA Issuers - URI:http://r10.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DE:85:81:D7:50:24:7C:6B:CD:CB:AF:56:37:C5:E7:81:
  • C6:4C:E4:6E:D6:17:63:9F:8F:34:A7:26:C9:E2:BD:37
  • Timestamp : Dec 21 13:22:53.033 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:7C:3F:45:84:9A:1C:9D:85:57:5E:B5:F0:
  • 40:C5:C3:42:8D:28:EF:AC:29:3F:48:D6:7D:2C:E8:13:
  • 62:EB:3A:36:02:21:00:8B:39:6B:4C:1A:E7:A6:EC:E8:
  • 3B:1A:FA:9C:34:33:FD:9D:C6:FB:56:F5:46:BA:8F:53:
  • 28:79:36:B1:39:4E:04
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Dec 21 13:22:53.054 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:80:51:EE:29:4E:89:09:A8:23:63:58:
  • 43:95:96:D2:37:09:98:6B:63:32:7E:DD:B6:91:0D:8B:
  • 14:1C:32:DD:30:02:20:15:99:A4:9A:B6:C2:B9:06:7F:
  • 3D:65:F1:69:F8:7C:17:3F:41:20:3F:1D:F0:F6:A2:34:
  • B5:E3:27:07:A3:2B:9B