SSL check results of imap.ish.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for imap.ish.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 23 Mar 2021 17:26:34 +0000

The mailservers of imap.ish.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @imap.ish.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
imap.ish.de
213.46.255.70
-
supported
ish.de
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
imap.ish.de
2001:730:3e10::213:46:255:70
-
supported
ish.de
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s

Outgoing Mails

We have not received any emails from a @imap.ish.de address so far. Test mail delivery

Certificates

First seen at:

CN=ish.de

Certificate chain
  • ish.de
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

Subject
Common Name (CN)
  • ish.de
Alternative Names
  • ish.de
  • webmail.ish.de
  • www.webmail.ish.de
  • webmail2.ish.de
  • mail.ish.de
  • mx4.ish.de
  • smtp.ish.de
  • pop.ish.de
  • pop3.ish.de
  • imap.ish.de
Issuer
Country (C)
  • BE
Organization (O)
  • GlobalSign nv-sa
Common Name (CN)
  • GlobalSign GCC R3 DV TLS CA 2020
validity period
Not valid before
2020-08-18
Not valid after
2021-11-01
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
47:24:11:D7:8F:FF:06:13:73:3A:E4:5F:75:37:1D:21:B0:AF:7A:08:94:04:08:B7:30:A5:E0:19:8C:A8:E2:E9
SHA1
8A:6D:A2:FA:7F:5B:68:45:22:5D:64:AF:9C:C1:96:C9:F0:16:67:24
X509v3 extensions
authorityInfoAccess
  • CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3dvtlsca2020.crt
  • OCSP - URI:http://ocsp.globalsign.com/gsgccr3dvtlsca2020
certificatePolicies
  • Policy: 1.3.6.1.4.1.4146.1.10
  • CPS: https://www.globalsign.com/repository/
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://crl.globalsign.com/gsgccr3dvtlsca2020.crl
authorityKeyIdentifier
  • keyid:0D:98:C0:73:7F:AB:BD:BD:D9:47:4B:49:AD:0A:4A:0C:AC:3E:C7:7C
subjectKeyIdentifier
  • 98:90:04:21:D2:2C:FC:6C:82:24:5C:4F:8A:FF:BA:B0:D9:57:81:EC
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : Aug 18 13:33:55.772 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:01:94:16:7B:80:4F:33:3E:C7:6F:23:A7:
  • F6:99:0F:5F:58:25:88:4E:51:2A:1E:94:81:DB:D8:7A:
  • BE:9B:3F:66:02:20:40:B9:F0:DF:07:48:4D:C2:EA:0F:
  • D0:3C:65:47:B9:D1:71:7D:DB:62:7F:88:73:F0:6A:79:
  • 1C:05:4D:7A:E2:03
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : F6:5C:94:2F:D1:77:30:22:14:54:18:08:30:94:56:8E:
  • E3:4D:13:19:33:BF:DF:0C:2F:20:0B:CC:4E:F1:64:E3
  • Timestamp : Aug 18 13:33:55.832 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:BB:19:06:D1:98:03:94:7B:6E:94:B5:
  • AC:6D:CB:9E:60:61:22:0E:A7:FA:C4:92:36:EA:21:53:
  • C6:F6:F6:88:0D:02:21:00:D3:9C:8B:B3:E9:A3:B4:80:
  • 6F:C8:5C:4C:D5:4C:09:44:D0:B1:BF:E0:DA:05:AC:6D:
  • F2:3E:3B:DD:5E:F6:54:47

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.imap.ish.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid