SSL check results of idns9.com

NEW You can also bulk check multiple servers.

Discover if the mail servers for idns9.com can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 30 Oct 2018 14:16:23 +0000

The mailservers of idns9.com can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @idns9.com addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
idns9.com
80.239.207.134
0
supported
*.idns9.com
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @idns9.com address so far. Test mail delivery

Certificates

First seen at:

CN=*.idns9.com,OU=PositiveSSL Wildcard,OU=Domain Control Validated

Certificate chain
Subject
Organizational Unit (OU)
  • Domain Control Validated
  • PositiveSSL Wildcard
Common Name (CN)
  • *.idns9.com
Alternative Names
  • *.idns9.com
  • idns9.com
Issuer
Country (C)
  • GB
State (ST)
  • Greater Manchester
Locality (L)
  • Salford
Organization (O)
  • COMODO CA Limited
Common Name (CN)
  • COMODO RSA Domain Validation Secure Server CA
validity period
Not valid before
2018-07-07
Not valid after
2020-07-06
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
56:34:89:6E:70:B7:45:AE:0A:CE:F0:64:9F:D6:F6:51:04:59:69:74:11:27:37:79:F1:F3:17:0E:85:C8:15:25
SHA1
0E:81:85:92:9F:1D:B3:66:87:02:54:6C:19:B7:FD:47:40:39:C6:1E
X509v3 extensions
authorityKeyIdentifier
  • keyid:90:AF:6A:3A:94:5A:0B:D8:90:EA:12:56:73:DF:43:B4:3A:28:DA:E7
subjectKeyIdentifier
  • A9:B4:E9:87:D1:3A:BD:31:B3:EA:03:33:93:52:78:A7:9B:1E:63:E5
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.7
  • CPS: https://secure.comodo.com/CPS
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl
authorityInfoAccess
  • CA Issuers - URI:http://crt.comodoca.com/COMODORSADomainValidationSecureServerCA.crt
  • OCSP - URI:http://ocsp.comodoca.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : EE:4B:BD:B7:75:CE:60:BA:E1:42:69:1F:AB:E1:9E:66:
  • A3:0F:7E:5F:B0:72:D8:83:00:C4:7B:89:7A:A8:FD:CB
  • Timestamp : Jul 7 23:38:02.252 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:DA:51:B1:7B:9C:29:30:A7:AD:43:3E:
  • D9:A7:4F:31:74:33:83:12:FC:2B:7D:12:32:D1:15:D3:
  • 99:C7:42:00:82:02:20:76:FC:7E:1B:4D:15:B3:F6:2F:
  • D0:E1:F1:79:09:F6:80:46:9E:D9:3F:F4:CD:51:35:F5:
  • 5B:22:E2:94:52:F4:C7
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5E:A7:73:F9:DF:56:C0:E7:B5:36:48:7D:D0:49:E0:32:
  • 7A:91:9A:0C:84:A1:12:12:84:18:75:96:81:71:45:58
  • Timestamp : Jul 7 23:38:02.216 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:F0:DA:D6:77:0E:9F:BA:02:5E:35:2F:
  • B6:BF:EE:1E:C9:E5:F2:7D:7D:BE:9C:21:D6:5F:E6:2C:
  • CC:A7:13:38:DE:02:21:00:E8:13:9F:2B:CE:3F:50:69:
  • 7A:AC:58:FC:20:9F:44:63:BE:B8:1E:15:1E:F9:4A:29:
  • 6C:BD:A5:D2:C4:E3:A1:60
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 55:81:D4:C2:16:90:36:01:4A:EA:0B:9B:57:3C:53:F0:
  • C0:E4:38:78:70:25:08:17:2F:A3:AA:1D:07:13:D3:0C
  • Timestamp : Jul 7 23:38:02.313 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:75:3A:9A:55:AB:DB:83:D9:8E:CF:47:F0:
  • 8A:9C:E8:20:EE:30:8D:55:F9:29:AF:F4:2A:1D:1D:98:
  • 82:83:13:3D:02:21:00:F3:38:C6:E6:3B:62:2A:51:84:
  • 90:B3:0E:3F:5F:81:C4:7A:79:2B:E1:18:B3:24:75:1E:
  • 30:0C:65:1B:E2:2C:60

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.idns9.com
  • DANE-EE: Domain Issued Certificate
  • Use full certificate
  • SHA-256 Hash
valid