SSL check results of krankenhaus-kiel.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for krankenhaus-kiel.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 12 Apr 2024 09:09:51 +0000

We can not guarantee a secure connection to the mailservers of krankenhaus-kiel.de!

Please contact the operator of krankenhaus-kiel.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/krankenhaus-kiel.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @krankenhaus-kiel.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.krankenhaus-kiel.de
62.54.10.132
10
supported
Default_CA_ftFgGgSht32RDL9
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mx-2.tng.de
213.178.64.14
Results incomplete
20
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @krankenhaus-kiel.de address so far. Test mail delivery

Certificates

First seen at:

emailAddress=na@example.com,CN=Default_CA_ftFgGgSht32RDL9,OU=NA,O=NA,L=NA,ST=NA,C=NA

Certificate chain
  • Default_CA_ftFgGgSht32RDL9 (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Country (C)
  • NA
State (ST)
  • NA
Locality (L)
  • NA
Organization (O)
  • NA
Organizational Unit (OU)
  • NA
Common Name (CN)
  • Default_CA_ftFgGgSht32RDL9
Email
  • na@example.com
Issuer

Certificate is self-signed.

validity period
Not valid before
2021-01-26
Not valid after
2036-12-31
Fingerprints
SHA256
FC:77:31:B3:D1:F8:28:6A:6A:DB:2A:53:8E:52:60:6D:A5:DC:78:8E:3F:7B:BE:FE:98:38:DA:32:62:40:71:07
SHA1
DE:D1:CD:E3:AF:A2:4B:94:70:03:A4:D3:77:39:63:15:96:A2:CB:3B
X509v3 extensions
subjectKeyIdentifier
  • C0:6B:71:92:FF:2F:8C:3B:E0:6A:B0:9F:40:BB:2E:27:BA:20:F3:DA
authorityKeyIdentifier
  • keyid:C0:6B:71:92:FF:2F:8C:3B:E0:6A:B0:9F:40:BB:2E:27:BA:20:F3:DA
  • DirName:/C=NA/ST=NA/L=NA/O=NA/OU=NA/CN=Default_CA_ftFgGgSht32RDL9/emailAddress=na@example.com
  • serial:A1:B8:B0:E5:E5:99:80:C0