SSL check results of hohlbaum.koeln

NEW You can also bulk check multiple servers.

Discover if the mail servers for hohlbaum.koeln can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 06 Dec 2019 05:04:30 +0000

We can not guarantee a secure connection to the mailservers of hohlbaum.koeln!

Please contact the operator of hohlbaum.koeln and ask him or her to solve this problem. This result stays accessible under the following address:

https://ssl-tools.net/mailservers/hohlbaum.koeln

Servers

Incoming Mails

These servers are responsible for incoming mails to @hohlbaum.koeln addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.hohlbaum.koeln
2a01:238:4378:a900:dc09:7c86:70b5:66d1
Results incomplete
50 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
mail.hohlbaum.koeln
85.214.28.198
50
supported
familie-hauswald.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @hohlbaum.koeln address so far. Test mail delivery

Certificates

First seen at:

CN=familie-hauswald.de

Certificate chain
Subject
Common Name (CN)
  • familie-hauswald.de
Alternative Names
  • familie-hauswald.de
  • www.familie-hauswald.de
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • RapidSSL RSA CA 2018
validity period
Not valid before
2019-06-16
Not valid after
2020-07-15
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
40:26:D4:53:61:37:56:E1:16:15:B9:17:F7:F4:8C:3E:AB:B7:96:85:FA:EA:4F:27:8D:90:88:3B:47:E1:F0:49
SHA1
5E:C5:6A:DA:D2:3A:86:97:51:EE:81:F7:C1:DD:A8:52:2E:23:01:84
X509v3 extensions
authorityKeyIdentifier
  • keyid:53:CA:17:59:FC:6B:C0:03:21:2F:1A:AE:E4:AA:A8:1C:82:56:DA:75
subjectKeyIdentifier
  • 0E:5E:15:9B:68:55:A1:C6:4C:B5:2A:EC:42:70:F0:1F:0A:0A:31:BF
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.rapidssl.com/RapidSSLRSACA2018.crl
certificatePolicies
  • Policy: 2.16.840.1.114412.1.2
  • CPS: https://www.digicert.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • OCSP - URI:http://status.rapidssl.com
  • CA Issuers - URI:http://cacerts.rapidssl.com/RapidSSLRSACA2018.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : BB:D9:DF:BC:1F:8A:71:B5:93:94:23:97:AA:92:7B:47:
  • 38:57:95:0A:AB:52:E8:1A:90:96:64:36:8E:1E:D1:85
  • Timestamp : Jun 16 17:41:20.625 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:9D:68:DD:59:E4:6D:15:AE:52:B3:CE:
  • 7D:7C:C3:A4:AD:C7:AC:31:D1:F3:7E:F4:6D:B6:1F:21:
  • 74:62:DE:01:B0:02:21:00:F2:A8:C2:FF:F7:B7:42:3E:
  • 3B:F2:BF:CC:8D:93:27:24:69:45:7C:34:3E:8E:FB:DB:
  • 6F:25:56:B5:0C:2F:A1:15
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 87:75:BF:E7:59:7C:F8:8C:43:99:5F:BD:F3:6E:FF:56:
  • 8D:47:56:36:FF:4A:B5:60:C1:B4:EA:FF:5E:A0:83:0F
  • Timestamp : Jun 16 17:41:20.702 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:4B:FA:12:89:A7:72:FC:13:F6:C1:0A:E6:
  • 76:F5:7E:95:FE:5A:9C:D8:F2:7E:F1:12:0C:B1:B6:E1:
  • D6:20:49:82:02:21:00:BB:B2:56:66:FB:C3:7C:E3:CD:
  • 63:4B:C2:EF:3C:49:C2:D6:78:35:14:E1:EB:37:B3:32:
  • C2:C5:BC:75:88:83:A0