SSL check results of lagodny.eu

NEW You can also bulk check multiple servers.

Discover if the mail servers for lagodny.eu can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 06 May 2021 14:04:01 +0000

We can not guarantee a secure connection to the mailservers of lagodny.eu!

Please contact the operator of lagodny.eu and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/lagodny.eu

Servers

Incoming Mails

These servers are responsible for incoming mails to @lagodny.eu addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx1.lagodny.eu
2a01:4f8:c2c:9265::1
Results incomplete
0
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
mx1.lagodny.eu
168.119.116.178
0
supported
mx1.lagodny.eu
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
41 s

Outgoing Mails

We have received emails from these servers with @lagodny.eu sender addresses. Test mail delivery

Host TLS Version & Cipher
alpha.lagodny.eu (168.119.116.178)
TLSv1.3 TLS_AES_256_GCM_SHA384

Certificates

First seen at:

CN=mx1.lagodny.eu

Certificate chain
  • mx1.lagodny.eu
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • DST Root CA X3 (Certificate is self-signed.)
            • remaining
            • 2048 bit
            • sha1WithRSAEncryption

Subject
Common Name (CN)
  • mx1.lagodny.eu
Alternative Names
  • mx1.lagodny.eu
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2021-04-08
Not valid after
2021-07-07
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
54:43:CE:63:3C:B7:31:52:FE:3C:15:A4:C5:71:F5:D5:45:3A:07:74:69:E0:54:22:A3:43:DF:68:69:77:B6:99
SHA1
26:07:DD:8D:C7:B8:EA:FC:C1:8F:BA:79:17:DE:2B:C3:EA:55:70:12
X509v3 extensions
subjectKeyIdentifier
  • 78:F1:C7:8B:15:9A:CE:24:BB:C1:FF:5A:CB:AC:77:10:CC:00:A5:9B
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5C:DC:43:92:FE:E6:AB:45:44:B1:5E:9A:D4:56:E6:10:
  • 37:FB:D5:FA:47:DC:A1:73:94:B2:5E:E6:F6:C7:0E:CA
  • Timestamp : Apr 8 12:00:46.656 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:52:AF:C4:96:AD:50:73:B4:43:C0:7D:5F:
  • C8:71:DB:BC:AF:6D:3C:21:B7:FC:5E:F5:FB:A7:36:64:
  • F7:D4:1B:21:02:21:00:83:10:ED:7A:6F:11:6E:99:AE:
  • DC:9A:6D:06:5C:40:B3:71:64:22:B6:DE:53:54:C2:EA:
  • 8E:22:66:19:29:07:7C
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 7D:3E:F2:F8:8F:FF:88:55:68:24:C2:C0:CA:9E:52:89:
  • 79:2B:C5:0E:78:09:7F:2E:6A:97:68:99:7E:22:F0:D7
  • Timestamp : Apr 8 12:00:46.739 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:C1:8C:8A:4A:03:46:81:1C:AB:86:B6:
  • 7D:7A:1B:32:9D:64:D6:75:4C:B3:05:65:EA:A0:64:2D:
  • 2F:F0:0E:B5:9E:02:21:00:E0:32:49:1D:36:34:22:32:
  • 26:98:04:B4:5E:26:5C:3B:3E:19:59:2F:4B:EF:B0:BB:
  • A1:FC:1C:B7:46:CF:B9:A2