SSL check results of hermod.arnested.dk

NEW You can also bulk check multiple servers.

Discover if the mail servers for hermod.arnested.dk can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Checking

Servers

Incoming Mails

These servers are responsible for incoming mails to @hermod.arnested.dk addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
hermod.arnested.dk
2a02:c207:2007:7741::1
Results incomplete
10
supported
hermod.arnested.dk
DANE
not checked
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
15 s
hermod.arnested.dk
5.189.168.47
Results incomplete
10
supported
hermod.arnested.dk
DANE
not checked
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
14 s

Outgoing Mails

We have received emails from these servers with @hermod.arnested.dk sender addresses. Test mail delivery

Host TLS Version & Cipher
hermod.arnested.dk (IPv6:2a02:c207:2007:7741::1)
TLSv1.2 AECDH-AES256-SHA
hermod.arnested.dk (5.189.168.47)
TLSv1.2 AECDH-AES256-SHA

Certificates

First seen at:

CN=hermod.arnested.dk

Certificate chain
Subject
Common Name (CN)
  • hermod.arnested.dk
Alternative Names
  • hermod.arnested.dk
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-05-03
Not valid after
2020-08-01
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
1F:C7:DD:7F:0F:8C:F0:97:38:D5:AC:C4:09:03:DA:4C:26:51:1A:14:10:7E:FC:2F:51:0E:D4:8C:66:58:35:E8
SHA1
D1:7D:E8:54:BC:A2:4D:CA:DB:32:A6:7D:E0:B4:59:B1:CF:44:0F:A3
X509v3 extensions
subjectKeyIdentifier
  • 3E:AD:BB:11:5F:E5:CF:E2:08:91:D6:F6:9D:82:32:BA:78:69:6B:0D
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 07:B7:5C:1B:E5:7D:68:FF:F1:B0:C6:1D:23:15:C7:BA:
  • E6:57:7C:57:94:B7:6A:EE:BC:61:3A:1A:69:D3:A2:1C
  • Timestamp : May 3 11:17:41.079 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:5B:83:58:15:21:43:B9:15:D7:E2:98:47:
  • AA:DB:D5:47:43:F1:12:74:72:08:2B:71:18:99:15:F9:
  • BA:9B:43:28:02:20:0E:7A:BF:AA:AF:97:9B:66:09:1B:
  • 1E:BA:58:05:91:FD:11:E7:82:7E:E4:9A:5C:63:20:68:
  • BD:99:D4:A2:B2:64
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : May 3 11:17:41.255 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:F9:0E:2F:A5:CC:C1:7A:C0:95:3D:1B:
  • 2E:BA:C0:22:57:91:31:23:54:2A:51:A4:1D:FD:AA:69:
  • 00:44:FC:2D:F3:02:20:2A:51:36:2B:24:B0:21:EF:70:
  • C4:19:79:D1:5C:E0:2A:18:77:FF:AC:AF:EB:B9:71:3F:
  • D6:9B:1B:35:75:06:8C

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.hermod.arnested.dk
  • DANE-TA: Trust Anchor Assertion
  • Use full certificate
  • SHA-256 Hash
valid
valid