SSL check results of larma.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for larma.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 10 Sep 2025 00:30:07 +0000

The mailservers of larma.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @larma.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.ipora.org
2a05:bec0:25:11::97
10
supported
mail.ipora.org
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mail.ipora.org
109.230.233.151
10
supported
mail.ipora.org
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @larma.de address so far. Test mail delivery

Certificates

First seen at:

CN=mail.ipora.org

Certificate chain
  • mail.ipora.org
    • remaining
    • 256 bit
    • ecdsa-with-SHA384

      • E7
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail.ipora.org
Alternative Names
  • mail.ipora.org
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E7
validity period
Not valid before
2025-09-06
Not valid after
2025-12-05
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
61:14:0A:FD:55:CA:B2:48:19:2A:D6:8A:51:D2:4E:00:88:F2:5B:27:54:6B:EF:88:DA:4E:14:19:5C:0E:6E:71
SHA1
C9:EC:81:F5:04:F4:E2:F3:05:EA:0A:4E:BF:8A:09:15:9A:E0:13:13
X509v3 extensions
subjectKeyIdentifier
  • 25:7B:95:9B:94:61:81:B0:01:8F:C3:E2:BC:95:17:19:00:12:61:13
authorityKeyIdentifier
  • keyid:AE:48:9E:DC:87:1D:44:A0:6F:DA:A2:E5:60:74:04:78:C2:9C:00:80
authorityInfoAccess
  • CA Issuers - URI:http://e7.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://e7.c.lencr.org/4.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Sep 6 17:55:39.749 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:47:33:17:57:2F:81:1E:BB:22:C9:2A:68:
  • 36:2C:E4:41:DB:73:76:E1:CD:61:EC:AB:65:0F:10:CC:
  • A6:04:C8:8E:02:20:4C:B1:EE:54:E1:21:1A:D8:8A:E0:
  • 72:C3:07:98:45:DE:17:21:58:3C:6B:3D:22:5C:DE:E9:
  • 46:CC:D7:84:1F:53
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
  • F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
  • Timestamp : Sep 6 17:55:39.727 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:03:25:62:C2:89:EB:48:F3:0E:9B:58:84:
  • 59:27:F3:E0:D9:3E:16:A8:FC:CF:49:D3:91:AF:CB:BD:
  • 14:3A:36:BD:02:21:00:B4:F4:56:8B:2E:03:66:30:66:
  • D0:73:53:F1:17:0A:14:39:9F:DC:40:9F:40:D3:95:89:
  • 49:D9:FF:50:0B:02:22

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.ipora.org
  • DANE-EE: Domain Issued Certificate
  • Use full certificate
  • SHA-512 Hash
valid
_25._tcp.mail.ipora.org
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.mail.ipora.org
  • DANE-EE: Domain Issued Certificate
  • Use full certificate
  • SHA-256 Hash
valid
_25._tcp.mail.ipora.org
  • DANE-TA: Trust Anchor Assertion
  • Use full certificate
  • SHA-256 Hash
valid
_25._tcp.mail.ipora.org
  • DANE-TA: Trust Anchor Assertion
  • Use full certificate
  • SHA-512 Hash
valid
_25._tcp.mail.ipora.org
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-512 Hash
valid
_25._tcp.mail.ipora.org
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-512 Hash
valid
_25._tcp.mail.ipora.org
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid