SSL check results of leadingimage.com.au

NEW You can also bulk check multiple servers.

Discover if the mail servers for leadingimage.com.au can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 19 Oct 2020 10:54:12 +0000

We can not guarantee a secure connection to the mailservers of leadingimage.com.au!

Please contact the operator of leadingimage.com.au and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/leadingimage.com.au

Servers

Incoming Mails

These servers are responsible for incoming mails to @leadingimage.com.au addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.leadingimage.com.au
139.130.84.39
10
supported
mail.leadingimage.com.au
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
15 s
postoffice.telstra.net
203.50.40.137
Results incomplete
20
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
2 s
postoffice.telstra.net
203.50.90.137
Results incomplete
20
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @leadingimage.com.au address so far. Test mail delivery

Certificates

First seen at:

CN=mail.leadingimage.com.au

Certificate chain
Subject
Common Name (CN)
  • mail.leadingimage.com.au
Alternative Names
  • mail.leadingimage.com.au
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-09-13
Not valid after
2020-12-12
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
48:21:B4:32:35:E3:C0:7B:F3:39:4F:2B:A1:CB:8D:11:77:96:D9:0F:D7:22:5C:51:85:13:F8:BA:4F:72:67:D5
SHA1
A0:29:0B:AC:B7:38:EF:4A:28:1F:5A:D4:82:82:25:B3:3D:5A:55:9D
X509v3 extensions
subjectKeyIdentifier
  • D1:EE:FC:7B:A1:D4:FE:AE:FD:33:CD:56:D8:01:A5:D0:6E:D3:2E:2D
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : F0:95:A4:59:F2:00:D1:82:40:10:2D:2F:93:88:8E:AD:
  • 4B:FE:1D:47:E3:99:E1:D0:34:A6:B0:A8:AA:8E:B2:73
  • Timestamp : Sep 13 20:28:58.092 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:D0:DE:45:1D:1F:64:DB:CF:34:AC:E9:
  • C2:40:F7:FB:A3:0A:A9:65:81:72:6F:25:38:4E:AB:12:
  • A9:2C:42:1F:F0:02:21:00:D9:3D:EA:5C:E6:02:80:7C:
  • 38:7F:B7:8C:38:41:EA:21:72:3A:93:AC:57:D2:8E:73:
  • F9:58:6C:F3:75:C5:36:E3
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : B2:1E:05:CC:8B:A2:CD:8A:20:4E:87:66:F9:2B:B9:8A:
  • 25:20:67:6B:DA:FA:70:E7:B2:49:53:2D:EF:8B:90:5E
  • Timestamp : Sep 13 20:28:58.103 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:A6:D9:FB:49:79:DB:34:F7:66:B1:1B:
  • 75:2A:12:A4:C7:7F:4B:E9:CD:96:E2:50:16:F7:E2:43:
  • 21:BA:A1:BA:B1:02:20:30:1A:49:6A:83:6C:03:52:E2:
  • B3:E9:A3:F5:63:96:15:EF:B5:DD:6D:DB:E9:54:CB:E6:
  • C7:9D:04:C5:EC:7B:19