SSL check results of immelnet.ru

NEW You can also bulk check multiple servers.

Discover if the mail servers for immelnet.ru can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 02 Feb 2025 17:23:21 +0000

We can not guarantee a secure connection to the mailservers of immelnet.ru!

Please contact the operator of immelnet.ru and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/immelnet.ru

Servers

Incoming Mails

These servers are responsible for incoming mails to @immelnet.ru addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx02.nicmail.ru
91.189.116.14
Results incomplete
5
supported
*.nicmail.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
14 s
mx02.nicmail.ru
91.189.116.15
Results incomplete
5
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
13 s
mx02.nicmail.ru
91.189.116.16
Results incomplete
5
supported
*.nicmail.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
14 s
mx02.nicmail.ru
91.189.116.13
Results incomplete
5
supported
*.nicmail.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
14 s
mx01.nicmail.ru
91.189.116.13
10
supported
*.nicmail.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.0
  • SSLv3
47 s
mx01.nicmail.ru
91.189.116.14
Results incomplete
10
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
13 s
mx01.nicmail.ru
91.189.116.15
10
supported
*.nicmail.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • SSLv3
57 s
mx01.nicmail.ru
91.189.116.16
Results incomplete
10
supported
*.nicmail.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
13 s
mx03.nicmail.ru
91.189.116.16
Results incomplete
20
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
13 s

Outgoing Mails

We have not received any emails from a @immelnet.ru address so far. Test mail delivery

Certificates

First seen at:

CN=*.nicmail.ru

Certificate chain
Subject
Common Name (CN)
  • *.nicmail.ru
Alternative Names
  • *.nicmail.ru
  • nicmail.ru
Issuer
Country (C)
  • BE
Organization (O)
  • GlobalSign nv-sa
Common Name (CN)
  • GlobalSign GCC R3 DV TLS CA 2020
validity period
Not valid before
2024-10-16
Not valid after
2025-11-17
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
D8:A5:7D:53:23:4A:AF:FD:A9:32:BA:11:B4:CF:61:F2:05:A4:F3:61:72:F4:0C:8F:44:4C:1F:EA:3C:4D:5A:04
SHA1
84:8B:04:44:8E:2E:DB:E1:3C:2E:12:73:58:63:D1:28:7C:69:E1:6B
X509v3 extensions
authorityInfoAccess
  • CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3dvtlsca2020.crt
  • OCSP - URI:http://ocsp.globalsign.com/gsgccr3dvtlsca2020
certificatePolicies
  • Policy: 1.3.6.1.4.1.4146.1.10
  • CPS: https://www.globalsign.com/repository/
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://crl.globalsign.com/gsgccr3dvtlsca2020.crl
authorityKeyIdentifier
  • keyid:0D:98:C0:73:7F:AB:BD:BD:D9:47:4B:49:AD:0A:4A:0C:AC:3E:C7:7C
subjectKeyIdentifier
  • D2:4D:F6:5A:EE:C5:33:AD:73:4A:68:38:86:43:16:C0:B0:70:40:A3
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : AF:18:1A:28:D6:8C:A3:E0:A9:8A:4C:9C:67:AB:09:F8:
  • BB:BC:22:BA:AE:BC:B1:38:A3:A1:9D:D3:F9:B6:03:0D
  • Timestamp : Oct 16 13:27:46.953 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:0C:BC:96:28:39:0B:F4:28:60:73:5A:7F:
  • ED:B7:51:47:8E:AD:B0:7D:BE:AB:D9:1D:B4:A4:C4:19:
  • C5:96:62:72:02:20:18:AD:41:73:40:6D:AC:C4:83:38:
  • D4:A5:D8:AA:52:DA:37:9A:A5:F9:C8:9E:D5:68:F1:6A:
  • 0B:41:51:C6:56:17
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 1A:04:FF:49:D0:54:1D:40:AF:F6:A0:C3:BF:F1:D8:C4:
  • 67:2F:4E:EC:EE:23:40:68:98:6B:17:40:2E:DC:89:7D
  • Timestamp : Oct 16 13:27:47.165 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:CB:3D:97:31:F4:0B:67:DA:F6:70:9F:
  • A0:2D:07:90:83:A3:DE:25:2B:47:08:FF:18:2C:C6:01:
  • A4:E5:D7:16:35:02:21:00:A4:09:7D:69:39:13:57:D4:
  • 25:0F:55:C3:13:3F:FE:86:16:9F:B2:05:85:1A:25:C8:
  • 91:BD:A0:11:6D:84:ED:64
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
  • F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
  • Timestamp : Oct 16 13:27:47.232 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:70:B6:D4:2F:D9:BA:C6:54:98:16:85:0F:
  • 0A:A5:D1:26:BC:77:1E:23:1B:BE:02:E5:12:6A:DE:D9:
  • 4C:2F:18:75:02:21:00:C7:5A:40:99:03:E5:14:24:9F:
  • 2D:A0:9C:8B:71:98:40:D3:B1:B5:AD:34:5D:61:97:98:
  • A2:9C:68:73:70:C2:A9