SSL check results of mail.berlin.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail.berlin.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 19 Apr 2024 12:59:04 +0000

The mailservers of mail.berlin.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail.berlin.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.berlin.de
84.23.254.58
-
supported
mail.berlin.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @mail.berlin.de address so far. Test mail delivery

Certificates

First seen at:

CN=mail.berlin.de

Certificate chain
Subject
Common Name (CN)
  • mail.berlin.de
Alternative Names
  • mail.berlin.de
Issuer
Country (C)
  • BE
Organization (O)
  • GlobalSign nv-sa
Common Name (CN)
  • AlphaSSL CA - SHA256 - G4
validity period
Not valid before
2023-09-19
Not valid after
2024-10-20
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
5E:64:31:17:EB:8F:78:0F:95:06:6D:10:A3:85:AC:E9:4A:DA:15:70:F1:CD:94:A4:24:5B:6A:3E:FA:EF:AD:3C
SHA1
5C:89:FA:31:E3:E8:FE:E2:54:37:E4:E6:62:34:56:10:C1:02:3E:F5
X509v3 extensions
authorityInfoAccess
  • CA Issuers - URI:http://secure.globalsign.com/cacert/alphasslcasha256g4.crt
  • OCSP - URI:http://ocsp.globalsign.com/alphasslcasha256g4
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.4146.10.1.3
  • CPS: https://www.globalsign.com/repository/
crlDistributionPoints
  • Full Name:
  • URI:http://crl.globalsign.com/alphasslcasha256g4.crl
authorityKeyIdentifier
  • keyid:4F:CB:AC:A8:C2:EF:AB:DD:83:6F:6B:BF:CE:98:3D:5C:58:25:76:15
subjectKeyIdentifier
  • 6D:95:3D:F7:F7:1B:A8:A0:0D:F1:8E:8A:92:15:5A:9F:02:95:23:27
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 48:B0:E3:6B:DA:A6:47:34:0F:E5:6A:02:FA:9D:30:EB:
  • 1C:52:01:CB:56:DD:2C:81:D9:BB:BF:AB:39:D8:84:73
  • Timestamp : Sep 19 08:04:30.290 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:AE:C8:57:B2:C8:5F:E4:A7:E8:37:72:
  • 53:1F:32:F8:8A:1A:87:5F:3F:42:F8:DD:F6:C1:DB:79:
  • 0C:79:A5:BF:28:02:20:01:D6:2F:87:F1:45:1C:AD:A6:
  • E9:9E:8A:6D:AB:85:46:EA:0D:1B:21:25:B9:B0:6D:5D:
  • C3:B7:F8:67:E2:53:EC
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34:
  • B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74
  • Timestamp : Sep 19 08:04:30.353 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:FD:09:48:FE:1A:2B:AD:6B:09:01:00:
  • 37:17:9E:DC:D4:94:62:75:1C:1D:5F:7B:9D:2E:03:CA:
  • A4:A3:C3:68:E4:02:21:00:B8:DA:9F:74:2A:CC:8E:A5:
  • 45:45:D2:1E:E3:BA:D2:E5:E4:AD:EF:A8:87:88:BD:5F:
  • 87:69:A3:E3:BC:D2:A2:B7
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DA:B6:BF:6B:3F:B5:B6:22:9F:9B:C2:BB:5C:6B:E8:70:
  • 91:71:6C:BB:51:84:85:34:BD:A4:3D:30:48:D7:FB:AB
  • Timestamp : Sep 19 08:04:30.333 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:A7:BB:D5:4D:71:24:EA:96:70:CD:96:
  • 0B:76:82:67:CC:6B:8D:3C:C1:7A:30:1E:C3:7F:4B:34:
  • E8:C4:55:F9:77:02:20:2D:3E:B9:0C:BC:F3:D7:DF:82:
  • 3A:5C:EC:C9:08:B2:92:65:A4:87:78:C3:C3:25:9A:A0:
  • D3:DF:4A:42:9D:D3:E1