SSL check results of hinano.pf

NEW You can also bulk check multiple servers.

Discover if the mail servers for hinano.pf can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 24 Sep 2022 00:55:22 +0000

We can not guarantee a secure connection to the mailservers of hinano.pf!

Please contact the operator of hinano.pf and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/hinano.pf

Servers

Incoming Mails

These servers are responsible for incoming mails to @hinano.pf addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
promx1.vini.pf
202.3.225.157
5
supported
axi-mx1.mana.lan
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
12 s
promx2.vini.pf
202.3.225.158
5
supported
axi-mx1.mana.lan
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
12 s
feedback-smtp.ap-southeast-2.amazonses.com
3.104.183.58
Results incomplete
10
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
feedback-smtp.ap-southeast-2.amazonses.com
3.104.219.174
Results incomplete
10
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
feedback-smtp.ap-southeast-2.amazonses.com
13.238.24.23
Results incomplete
10
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @hinano.pf address so far. Test mail delivery

Certificates

First seen at:

CN=axi-mx1.mana.lan,OU=Automatically-generated SSL key,O=AXIGEN Mail Server

Certificate chain
  • axi-mx1.mana.lan (Certificate is self-signed.)
    • remaining
    • 1024 bit
    • sha1WithRSAEncryption
    • Hostname Mismatch
    • Expired
    • Unknown Authority

Subject
Organization (O)
  • AXIGEN Mail Server
Organizational Unit (OU)
  • Automatically-generated SSL key
Common Name (CN)
  • axi-mx1.mana.lan
Issuer

Certificate is self-signed.

validity period
Not valid before
2012-09-25
Not valid after
2013-09-25
Fingerprints
SHA256
AC:61:D7:96:83:3D:38:11:01:33:0E:B8:19:17:87:E0:5C:77:9F:DB:A2:A3:61:0B:12:92:C1:64:08:8D:FA:04
SHA1
13:30:5C:00:A5:65:AA:0C:83:00:7C:F3:2C:71:30:76:63:EC:1C:8D
X509v3 extensions
nsCertType
  • SSL Server