SSL check results of knuddels.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for knuddels.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 17 Jul 2025 09:58:46 +0000

We can not guarantee a secure connection to the mailservers of knuddels.de!

Please contact the operator of knuddels.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/knuddels.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @knuddels.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
knuddels.de
213.61.5.148
10
supported
*.knuddels.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s
mail.knuddels.de
213.61.5.148
20
supported
*.knuddels.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s
mail3.knuddels.de
49.12.205.56
100
supported
mail-h01
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s
mail2.knuddels.de
85.25.226.218
Results incomplete
110 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s

Outgoing Mails

We have not received any emails from a @knuddels.de address so far. Test mail delivery

Certificates

First seen at:

CN=*.knuddels.de

Certificate chain
Subject
Common Name (CN)
  • *.knuddels.de
Alternative Names
  • *.knuddels.de
  • knuddels.de
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • Thawte TLS RSA CA G1
validity period
Not valid before
2024-11-05
Not valid after
2025-11-23
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
38:61:DE:F4:8B:51:38:2A:2E:16:0D:AE:43:36:2F:34:84:1A:B5:B7:8A:51:45:38:37:CC:2E:FE:7E:8E:F1:61
SHA1
B4:12:CC:44:CD:D2:2D:03:68:9D:9F:E0:02:55:EA:DE:54:D0:72:D8
X509v3 extensions
authorityKeyIdentifier
  • keyid:A5:8C:FE:32:CC:EB:0F:2C:D4:19:C6:08:B8:00:24:88:5D:C3:C5:B7
subjectKeyIdentifier
  • 00:9F:80:70:37:15:D6:3B:0E:CD:C7:84:C7:D6:F7:DB:E6:B0:C2:E0
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • CPS: http://www.digicert.com/CPS
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.thawte.com/ThawteTLSRSACAG1.crl
authorityInfoAccess
  • OCSP - URI:http://status.thawte.com
  • CA Issuers - URI:http://cacerts.thawte.com/ThawteTLSRSACAG1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
  • F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
  • Timestamp : Nov 5 10:05:53.060 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:4D:23:1D:68:EE:E2:29:3D:34:FC:2E:40:
  • 44:2A:DB:C0:01:64:9C:A1:B2:E3:A6:5D:58:11:65:E6:
  • 43:CC:67:F9:02:20:40:86:5F:3C:AE:A5:DD:FB:D0:AA:
  • 8A:6D:D5:6C:F1:BF:10:67:D7:87:EE:8A:83:16:DA:FC:
  • F3:7B:6D:ED:77:8A
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 7D:59:1E:12:E1:78:2A:7B:1C:61:67:7C:5E:FD:F8:D0:
  • 87:5C:14:A0:4E:95:9E:B9:03:2F:D9:0E:8C:2E:79:B8
  • Timestamp : Nov 5 10:05:53.090 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:C4:60:FD:40:E3:A6:44:17:0F:44:CA:
  • D7:D5:5B:85:8D:03:89:5D:F5:A4:3D:F8:DD:11:79:D7:
  • 5F:16:75:5C:E2:02:20:2B:3C:C7:28:18:14:1E:1D:F6:
  • 9C:5E:5D:7C:B2:7E:C1:1A:69:7E:11:D6:9E:74:8B:C4:
  • E5:3E:17:20:BB:96:D0
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E6:D2:31:63:40:77:8C:C1:10:41:06:D7:71:B9:CE:C1:
  • D2:40:F6:96:84:86:FB:BA:87:32:1D:FD:1E:37:8E:50
  • Timestamp : Nov 5 10:05:53.135 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:1D:AE:EB:FB:50:CF:37:33:3F:66:B8:D0:
  • C6:E6:C1:8F:7F:C3:66:5C:D4:E7:B1:BA:C8:FB:A6:D5:
  • 58:24:60:AF:02:20:02:E2:B5:8A:8B:69:CF:48:65:6A:
  • 9D:29:02:CD:76:F5:F1:24:8A:5F:4C:3F:39:E7:AC:F7:
  • 83:2D:AE:3F:0C:C8
First seen at:

CN=mail-h01

Certificate chain
  • mail-h01 (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • mail-h01
Alternative Names
  • mail-h01
Issuer

Certificate is self-signed.

validity period
Not valid before
2021-09-01
Not valid after
2031-08-30
Fingerprints
SHA256
0E:87:89:9E:B2:07:3C:E2:44:30:C1:3D:1D:0B:9A:F8:D0:1E:F6:B8:CC:9C:AD:02:C4:C7:B6:D9:FB:7E:A7:F4
SHA1
45:A0:AE:D1:BD:68:CB:7C:24:21:0E:E5:FC:F9:2E:C3:0E:BA:DF:60