SSL check results of koelln.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for koelln.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 28 May 2020 07:47:57 +0000

The mailservers of koelln.de can be reached through an encrypted connection.

However, we found problems that may affect the security.

Servers

Incoming Mails

These servers are responsible for incoming mails to @koelln.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mailrelay.peterkoelln.de
80.66.193.98
10
supported
mailrelay.peterkoelln.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
12 s
mailrelay2.peterkoelln.de
80.66.193.103
90
supported
mailrelay.peterkoelln.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
12 s

Outgoing Mails

We have not received any emails from a @koelln.de address so far. Test mail delivery

Certificates

First seen at:

emailAddress=Administrator@peterkoelln.de,C=DE,ST=Schleswig-Holstein,L=Elmshorn,O=Peter Koelln GmbH & Co. KGaA,OU=IT-Abteilung,CN=mailrelay.peterkoelln.de

Certificate chain
  • mailrelay.peterkoelln.de (Certificate is self-signed.)
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • mailrelay.peterkoelln.de
Organizational Unit (OU)
  • IT-Abteilung
Organization (O)
  • Peter Koelln GmbH & Co. KGaA
Locality (L)
  • Elmshorn
State (ST)
  • Schleswig-Holstein
Country (C)
  • DE
Email
  • Administrator@peterkoelln.de
Alternative Names
  • mailrelay.peterkoelln.de
Issuer

Certificate is self-signed.

validity period
Not valid before
2020-05-11
Not valid after
2022-05-11
Fingerprints
SHA256
AF:3D:38:82:92:F9:C1:B6:5E:A2:D8:AA:B0:D1:97:5F:39:4C:C6:95:B4:3E:28:B5:38:E8:11:63:CB:C8:57:E2
SHA1
04:6E:FF:88:39:26:DA:BE:39:47:BD:4F:32:85:46:F6:66:10:21:6E
X509v3 extensions
subjectKeyIdentifier
  • 4F:B8:F8:0D:01:CE:27:64:E4:01:7F:E1:87:D6:47:A2:13:28:7B:35
nsCertType
  • SSL Server