SSL check results of jmwhite.co.uk

NEW You can also bulk check multiple servers.

Discover if the mail servers for jmwhite.co.uk can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 27 May 2020 00:34:28 +0000

The mailservers of jmwhite.co.uk can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @jmwhite.co.uk addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
aspmx.l.google.com
2a00:1450:4013:c00::1a
1
supported
mx.google.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
aspmx.l.google.com
172.217.218.26
1
supported
mx.google.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
alt2.aspmx.l.google.com
2404:6800:4008:c07::1b
5
supported
mx.google.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
alt2.aspmx.l.google.com
64.233.189.27
5
supported
mx.google.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
15 s
alt1.aspmx.l.google.com
2404:6800:4003:c06::1a
5
supported
mx.google.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
16 s
alt1.aspmx.l.google.com
142.250.4.26
5
supported
mx.google.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
17 s
alt3.aspmx.l.google.com
2607:f8b0:400e:c04::1b
10
supported
mx.google.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
8 s
alt3.aspmx.l.google.com
74.125.28.26
10
supported
mx.google.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
7 s
alt4.aspmx.l.google.com
2607:f8b0:4023:c03::1a
10
supported
mx.google.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
8 s
alt4.aspmx.l.google.com
74.125.137.27
10
supported
mx.google.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
8 s

Outgoing Mails

We have not received any emails from a @jmwhite.co.uk address so far. Test mail delivery

Certificates

First seen at:

CN=mx.google.com,O=Google LLC,L=Mountain View,ST=California,C=US

Certificate chain
  • mx.google.com
    • remaining
    • 256 bit
    • sha256WithRSAEncryption

      • GTS CA 1O1
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • GlobalSign (Certificate is self-signed.)
            • remaining
            • 2048 bit
            • sha1WithRSAEncryption

Subject
Country (C)
  • US
State (ST)
  • California
Locality (L)
  • Mountain View
Organization (O)
  • Google LLC
Common Name (CN)
  • mx.google.com
Alternative Names
  • mx.google.com
  • alt1.aspmx.l.google.com
  • alt1.gmail-smtp-in.l.google.com
  • alt1.gmr-smtp-in.l.google.com
  • alt2.aspmx.l.google.com
  • alt2.gmail-smtp-in.l.google.com
  • alt2.gmr-smtp-in.l.google.com
  • alt3.aspmx.l.google.com
  • alt3.gmail-smtp-in.l.google.com
  • alt3.gmr-smtp-in.l.google.com
  • alt4.aspmx.l.google.com
  • alt4.gmail-smtp-in.l.google.com
  • alt4.gmr-smtp-in.l.google.com
  • aspmx.l.google.com
  • aspmx2.googlemail.com
  • aspmx3.googlemail.com
  • aspmx4.googlemail.com
  • aspmx5.googlemail.com
  • gmail-smtp-in.l.google.com
  • gmr-mx.google.com
  • gmr-smtp-in.l.google.com
  • mx1.smtp.goog
  • mx2.smtp.goog
  • mx3.smtp.goog
  • mx4.smtp.goog
Issuer
Country (C)
  • US
Organization (O)
  • Google Trust Services
Common Name (CN)
  • GTS CA 1O1
validity period
Not valid before
2020-05-05
Not valid after
2020-07-28
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
Fingerprints
SHA256
D3:C6:48:D2:51:3E:B7:DB:43:56:51:AB:85:EA:7B:E8:D9:90:B5:A1:0C:7E:53:09:2D:D4:CE:8E:62:59:E5:7F
SHA1
AE:69:7C:26:15:26:0B:E9:9F:25:12:12:2E:A8:AB:C2:4C:20:BF:6C
X509v3 extensions
subjectKeyIdentifier
  • FF:5F:BE:05:4A:BA:F1:62:B3:D9:BF:69:8F:27:B9:C1:3F:01:A0:D4
authorityKeyIdentifier
  • keyid:98:D1:F8:6E:10:EB:CF:9B:EC:60:9F:18:90:1B:A0:EB:7D:09:FD:2B
authorityInfoAccess
  • OCSP - URI:http://ocsp.pki.goog/gts1o1core
  • CA Issuers - URI:http://pki.goog/gsr2/GTS1O1.crt
certificatePolicies
  • Policy: 2.23.140.1.2.2
  • Policy: 1.3.6.1.4.1.11129.2.5.3
crlDistributionPoints
  • Full Name:
  • URI:http://crl.pki.goog/GTS1O1core.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : B2:1E:05:CC:8B:A2:CD:8A:20:4E:87:66:F9:2B:B9:8A:
  • 25:20:67:6B:DA:FA:70:E7:B2:49:53:2D:EF:8B:90:5E
  • Timestamp : May 5 09:36:17.366 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:F2:C3:F5:CB:C4:5D:09:80:9F:A7:68:
  • 44:8B:7C:1B:ED:E9:53:49:C4:FE:49:24:40:F7:82:D0:
  • B9:2F:AC:A3:38:02:21:00:99:9D:B7:F4:93:7D:CC:CE:
  • 37:92:FE:5E:20:F2:E0:B9:16:EF:23:DB:12:10:68:C1:
  • D1:64:E1:62:13:47:06:A3
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5E:A7:73:F9:DF:56:C0:E7:B5:36:48:7D:D0:49:E0:32:
  • 7A:91:9A:0C:84:A1:12:12:84:18:75:96:81:71:45:58
  • Timestamp : May 5 09:36:17.402 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:12:6D:3F:6F:9F:DF:15:31:B9:0E:8D:D2:
  • 69:BD:49:63:DC:0C:43:C6:C0:9E:A9:82:60:11:3B:04:
  • 94:9F:FD:08:02:20:1F:8A:C2:3E:67:61:FA:FE:5F:48:
  • 9E:15:71:3F:9E:13:F2:96:18:DE:AF:7E:5D:16:0F:C4:
  • 2E:95:AB:17:D1:2A