SSL check results of kvt-zvk.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for kvt-zvk.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 07 Oct 2019 08:08:58 +0000

We can not guarantee a secure connection to the mailservers of kvt-zvk.de!

Please contact the operator of kvt-zvk.de and ask him or her to solve this problem. This result stays accessible under the following address:

https://ssl-tools.net/mailservers/kvt-zvk.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @kvt-zvk.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail4.cm-system.de
195.145.156.27
10
supported
mail4.cm-system.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.0
  • SSLv3
1 s
mail.kvt-zvk.de
217.91.69.80
Results incomplete
50 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
mail5.cm-system.de
195.145.156.125
Results incomplete
100 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s

Outgoing Mails

We have received emails from these servers with @kvt-zvk.de sender addresses. Test mail delivery

Host TLS Version & Cipher
mail5.cm-system.de (195.145.156.125)
TLSv1 DHE-RSA-AES256-SHA

Certificates

First seen at:

CN=mail4.cm-system.de

Certificate chain
  • mail4.cm-system.de
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Unknown Authority

      RapidSSL RSA CA 2018
Subject
Common Name (CN)
  • mail4.cm-system.de
Alternative Names
  • mail4.cm-system.de
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • RapidSSL RSA CA 2018
validity period
Not valid before
2018-02-12
Not valid after
2021-03-13
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
89:0D:83:1B:0F:58:98:DE:AA:42:5B:3E:2E:77:88:6B:79:85:76:F1:8D:4E:82:8F:3B:97:D5:72:97:54:25:E1
SHA1
1F:C2:56:A3:91:7F:94:A4:C1:24:47:FB:55:CA:A8:DB:2B:8A:FB:8B
X509v3 extensions
authorityKeyIdentifier
  • keyid:53:CA:17:59:FC:6B:C0:03:21:2F:1A:AE:E4:AA:A8:1C:82:56:DA:75
subjectKeyIdentifier
  • 86:26:29:CF:43:99:67:00:5D:36:AF:D0:AA:94:CE:DE:46:0B:48:45
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.rapidssl.com/RapidSSLRSACA2018.crl
certificatePolicies
  • Policy: 2.16.840.1.114412.1.2
  • CPS: https://www.digicert.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • OCSP - URI:http://status.rapidssl.com
  • CA Issuers - URI:http://cacerts.rapidssl.com/RapidSSLRSACA2018.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A4:B9:09:90:B4:18:58:14:87:BB:13:A2:CC:67:70:0A:
  • 3C:35:98:04:F9:1B:DF:B8:E3:77:CD:0E:C8:0D:DC:10
  • Timestamp : Feb 12 09:02:12.798 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:3F:13:0A:21:D5:B5:DB:C5:F8:2E:C4:C3:
  • 9E:4B:E7:9F:7B:F7:F7:0A:43:A7:E3:42:8E:A9:B6:5B:
  • 86:63:D4:6C:02:21:00:E9:58:E5:96:EF:1E:EC:74:ED:
  • 3E:7C:C0:A9:46:C4:07:40:48:EB:61:76:71:BB:E9:DA:
  • 2B:1F:0E:6D:17:1E:8E
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 87:75:BF:E7:59:7C:F8:8C:43:99:5F:BD:F3:6E:FF:56:
  • 8D:47:56:36:FF:4A:B5:60:C1:B4:EA:FF:5E:A0:83:0F
  • Timestamp : Feb 12 09:02:12.974 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:CA:FF:39:D5:58:3F:71:54:29:7D:11:
  • 2B:D8:AE:32:32:7D:ED:AC:55:A6:F7:94:B9:D8:24:F5:
  • 00:27:51:F7:6D:02:20:12:C5:77:C5:B5:F3:E7:92:73:
  • AE:EC:D5:85:8E:10:91:11:45:62:E2:03:B6:D2:8F:DA:
  • 36:74:84:B7:37:3D:45
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : BB:D9:DF:BC:1F:8A:71:B5:93:94:23:97:AA:92:7B:47:
  • 38:57:95:0A:AB:52:E8:1A:90:96:64:36:8E:1E:D1:85
  • Timestamp : Feb 12 09:02:13.006 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:B6:FF:DE:E7:33:B9:B9:B7:F6:D2:23:
  • EB:BD:5F:61:47:B9:11:BC:28:C2:A1:B9:0F:AE:89:62:
  • 15:43:3E:B4:6B:02:21:00:A7:70:1D:A0:19:FE:00:BD:
  • 4A:1F:6D:0C:95:D0:6F:B6:A2:D5:ED:73:88:04:D6:E3:
  • FA:73:BD:7F:11:96:57:67
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : Feb 12 09:02:13.600 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:52:C9:8D:A7:43:CF:E9:ED:AC:F0:11:C5:
  • 7F:18:B8:34:68:24:AC:1F:5B:44:29:72:FD:7B:9E:F9:
  • 89:AD:BA:0F:02:21:00:83:17:03:7D:B3:7C:9F:E7:09:
  • E8:72:F2:E6:6F:7F:BB:F3:5E:F5:DB:10:04:48:97:9B:
  • C4:57:81:B1:63:37:59