SSL check results of klinikum-altmuehlfranken.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for klinikum-altmuehlfranken.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 28 Mar 2024 10:28:48 +0000

The mailservers of klinikum-altmuehlfranken.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @klinikum-altmuehlfranken.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
system.klinikum-altmuehlfranken.de
212.114.177.231
100
supported
*.klinikum-altmuehlfranken.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @klinikum-altmuehlfranken.de address so far. Test mail delivery

Certificates

First seen at:

CN=*.klinikum-altmuehlfranken.de

Certificate chain
Subject
Common Name (CN)
  • *.klinikum-altmuehlfranken.de
Alternative Names
  • *.klinikum-altmuehlfranken.de
  • klinikum-altmuehlfranken.de
Issuer
Country (C)
  • GB
State (ST)
  • Greater Manchester
Locality (L)
  • Salford
Organization (O)
  • Sectigo Limited
Common Name (CN)
  • Sectigo RSA Domain Validation Secure Server CA
validity period
Not valid before
2024-03-04
Not valid after
2025-04-04
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
0C:CE:D1:5C:65:EF:71:85:9D:91:1D:0E:B7:9A:B9:68:CE:AF:47:0A:B4:99:29:A6:C0:E0:FB:C7:E9:F3:9D:46
SHA1
5C:CD:F5:56:04:ED:B3:10:E8:6A:20:E2:B1:A1:D8:4D:17:E9:C2:2C
X509v3 extensions
authorityKeyIdentifier
  • keyid:8D:8C:5E:C4:54:AD:8A:E1:77:E9:9B:F9:9B:05:E1:B8:01:8D:61:E1
subjectKeyIdentifier
  • 59:4E:8B:E5:CF:F2:0A:92:2C:FB:83:79:8B:C8:D5:29:B7:0A:8D:7D
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.7
  • CPS: https://sectigo.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • CA Issuers - URI:http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
  • OCSP - URI:http://ocsp.sectigo.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CF:11:56:EE:D5:2E:7C:AF:F3:87:5B:D9:69:2E:9B:E9:
  • 1A:71:67:4A:B0:17:EC:AC:01:D2:5B:77:CE:CC:3B:08
  • Timestamp : Mar 4 06:52:47.954 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:24:20:CF:03:CE:FB:DC:F6:0F:1B:2B:F3:
  • FD:7F:FD:FE:DE:4B:D9:7E:CD:B2:4E:EB:9E:AE:1B:90:
  • 97:A2:54:21:02:20:02:E6:8B:F0:E1:C7:0C:FE:8C:0B:
  • 8D:EA:93:A6:CF:64:E8:89:D6:27:FE:CA:61:56:64:34:
  • B3:72:E0:EF:56:06
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53:
  • D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7
  • Timestamp : Mar 4 06:52:47.880 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:56:D5:1E:55:F1:45:1C:5C:61:00:83:82:
  • 8D:4A:E0:7A:0B:DF:38:FD:C3:0C:11:EB:D7:27:2C:64:
  • 3B:5F:7B:FE:02:21:00:B1:19:56:40:9E:42:25:44:E4:
  • EA:35:3D:23:BB:36:EA:CD:E7:03:FF:8F:60:27:90:C4:
  • 39:2B:F7:F8:69:09:BE
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 4E:75:A3:27:5C:9A:10:C3:38:5B:6C:D4:DF:3F:52:EB:
  • 1D:F0:E0:8E:1B:8D:69:C0:B1:FA:64:B1:62:9A:39:DF
  • Timestamp : Mar 4 06:52:47.878 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:35:3D:95:3C:B4:08:67:85:51:FB:DA:B3:
  • D4:95:7A:D2:5E:78:C2:A9:59:E5:14:C4:50:74:FD:1F:
  • D3:C2:2A:D6:02:21:00:C7:34:4B:A3:24:84:17:5C:47:
  • B5:72:0B:F6:2B:C6:4E:A1:4A:C3:17:4C:46:F4:FE:A5:
  • 43:06:94:9B:96:17:82