SSL check results of jff.org

NEW You can also bulk check multiple servers.

Discover if the mail servers for jff.org can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 23 Sep 2024 00:30:34 +0000

The mailservers of jff.org can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @jff.org addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
d158432a.ess.barracudanetworks.com
209.222.82.252
0
supported
*.ess.barracudanetworks.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
15 s
d158432a.ess.barracudanetworks.com
209.222.82.253
0
supported
*.ess.barracudanetworks.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
16 s
d158432a.ess.barracudanetworks.com
209.222.82.255
0
supported
*.ess.barracudanetworks.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
15 s
d158432b.ess.barracudanetworks.com
209.222.82.255
10
supported
*.ess.barracudanetworks.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
15 s
d158432b.ess.barracudanetworks.com
209.222.82.253
10
supported
*.ess.barracudanetworks.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
15 s
d158432b.ess.barracudanetworks.com
209.222.82.252
10
supported
*.ess.barracudanetworks.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
15 s

Outgoing Mails

We have not received any emails from a @jff.org address so far. Test mail delivery

Certificates

First seen at:

CN=*.ess.barracudanetworks.com,O=Barracuda Networks\, Inc.,L=Campbell,ST=California,C=US

Certificate chain
Subject
Country (C)
  • US
State (ST)
  • California
Locality (L)
  • Campbell
Organization (O)
  • Barracuda Networks, Inc.
Common Name (CN)
  • *.ess.barracudanetworks.com
Alternative Names
  • *.ess.barracudanetworks.com
  • *.o.ess.barracudanetworks.com
  • ess.barracudanetworks.com
  • o.ess.barracudanetworks.com
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Common Name (CN)
  • DigiCert Global G2 TLS RSA SHA256 2020 CA1
validity period
Not valid before
2023-10-12
Not valid after
2024-10-29
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
3C:DF:3E:70:1F:19:6B:2F:BF:CD:8A:52:5A:B9:A5:B1:60:DB:25:8A:34:FC:ED:E2:91:D0:59:01:F0:85:67:B2
SHA1
4C:EA:A9:08:95:D4:39:97:5A:7D:19:2E:4B:EA:5A:33:1F:30:C3:0A
X509v3 extensions
authorityKeyIdentifier
  • keyid:74:85:80:C0:66:C7:DF:37:DE:CF:BD:29:37:AA:03:1D:BE:ED:CD:17
subjectKeyIdentifier
  • 4B:68:BE:DE:69:4B:B2:BE:E2:7A:1E:AB:05:35:A0:18:E4:9D:FB:A3
certificatePolicies
  • Policy: 2.23.140.1.2.2
  • CPS: http://www.digicert.com/CPS
crlDistributionPoints
  • Full Name:
  • URI:http://crl3.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crl
  • Full Name:
  • URI:http://crl4.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crl
authorityInfoAccess
  • OCSP - URI:http://ocsp.digicert.com
  • CA Issuers - URI:http://cacerts.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2:
  • 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B
  • Timestamp : Oct 12 22:42:13.161 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:63:FB:8E:55:B7:26:17:5B:EF:65:03:14:
  • 55:71:C2:1F:C5:7F:82:16:32:90:31:D3:57:D0:98:9C:
  • 88:AF:57:69:02:20:2B:A6:8D:C7:D6:24:D0:9F:04:6C:
  • AF:06:A8:B3:B8:73:66:0E:A7:C8:6C:C4:2B:0F:36:3B:
  • 09:97:B9:57:A5:B0
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 48:B0:E3:6B:DA:A6:47:34:0F:E5:6A:02:FA:9D:30:EB:
  • 1C:52:01:CB:56:DD:2C:81:D9:BB:BF:AB:39:D8:84:73
  • Timestamp : Oct 12 22:42:13.141 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:BC:DD:65:AC:49:23:85:55:3C:3A:D4:
  • 6D:B1:73:4E:53:77:4D:C6:1E:A6:12:F6:75:D8:8E:B7:
  • 24:E7:CB:B4:E7:02:21:00:A6:09:EE:A0:34:EC:32:4F:
  • D7:A5:8D:54:E1:0D:F0:DE:E5:FF:FF:43:6F:D6:58:56:
  • 41:3E:9A:F0:97:CB:DF:6C
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DA:B6:BF:6B:3F:B5:B6:22:9F:9B:C2:BB:5C:6B:E8:70:
  • 91:71:6C:BB:51:84:85:34:BD:A4:3D:30:48:D7:FB:AB
  • Timestamp : Oct 12 22:42:13.147 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:3C:2C:45:78:F9:1F:A0:A1:C1:0D:40:9B:
  • 73:CD:7E:E0:B8:EA:92:74:34:D3:77:8E:01:EC:EC:A4:
  • CE:5B:B5:0A:02:20:51:66:1F:C1:D9:5C:DF:A3:F6:01:
  • E9:A6:55:DC:FB:63:5E:7D:C3:DF:44:7A:DA:31:84:9C:
  • A8:E1:33:D4:54:64