SSL check results of mail.cike.ws

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail.cike.ws can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 06 Mar 2021 01:21:55 +0000

The mailservers of mail.cike.ws can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail.cike.ws addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.cike.ws
104.140.105.185
-
supported
mail.cike.ws
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
18 s

Outgoing Mails

We have not received any emails from a @mail.cike.ws address so far. Test mail delivery

Certificates

First seen at:

CN=mail.cike.ws

Certificate chain
  • mail.cike.ws
    • remaining
    • 384 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • DST Root CA X3 (Certificate is self-signed.)
            • remaining
            • 2048 bit
            • sha1WithRSAEncryption

Subject
Common Name (CN)
  • mail.cike.ws
Alternative Names
  • mail.cike.ws
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2021-02-06
Not valid after
2021-05-07
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
42:86:20:7E:E0:95:C7:8C:3F:68:0B:38:66:9D:F1:A4:02:94:D7:D5:26:4E:AF:60:48:09:EA:FD:6A:EE:06:93
SHA1
87:44:04:08:02:D2:C4:6B:37:0D:D2:E8:2D:09:C5:60:67:A5:25:BB
X509v3 extensions
subjectKeyIdentifier
  • 73:ED:A9:15:1E:E4:E0:6C:10:7D:41:46:ED:85:8B:38:BF:EA:01:31
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 44:94:65:2E:B0:EE:CE:AF:C4:40:07:D8:A8:FE:28:C0:
  • DA:E6:82:BE:D8:CB:31:B5:3F:D3:33:96:B5:B6:81:A8
  • Timestamp : Feb 6 21:29:31.406 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:A3:14:5F:71:89:D2:E7:C6:D1:ED:87:
  • 5E:20:DF:B1:79:CD:5A:64:4E:86:77:40:BF:CE:09:CC:
  • E0:81:79:00:BD:02:20:43:97:0A:2C:EE:84:3D:74:E4:
  • 25:FF:47:DE:71:A0:60:A6:7C:77:67:D6:1F:30:F2:9F:
  • 82:50:24:04:AC:D5:77
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 7D:3E:F2:F8:8F:FF:88:55:68:24:C2:C0:CA:9E:52:89:
  • 79:2B:C5:0E:78:09:7F:2E:6A:97:68:99:7E:22:F0:D7
  • Timestamp : Feb 6 21:29:31.424 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:7A:2F:C4:86:DE:68:CB:66:C7:72:EC:68:
  • 5F:9A:37:FD:15:12:FF:04:C1:66:E6:92:4E:F7:1F:CB:
  • 98:79:78:17:02:21:00:F9:7A:B5:05:2A:FB:10:2C:BD:
  • C9:2D:E9:B4:5F:86:D5:93:C6:1A:39:BC:A5:D9:38:09:
  • 38:BF:BD:E5:DC:39:AE