SSL check results of mail.digitalkr.am

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail.digitalkr.am can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 06 Dec 2018 18:45:15 +0000

The mailservers of mail.digitalkr.am can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail.digitalkr.am addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.digitalkr.am
5.9.2.44
-
supported
mail.digitalkr.am
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @mail.digitalkr.am address so far. Test mail delivery

Certificates

First seen at:

CN=mail.digitalkr.am

Certificate chain
Subject
Common Name (CN)
  • mail.digitalkr.am
Alternative Names
  • mail.digitalkr.am
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2018-09-24
Not valid after
2018-12-23
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
7E:6B:42:29:76:62:E4:59:05:51:7B:51:9E:C1:AF:EE:00:55:B8:BA:FE:A4:A5:69:9F:50:3F:7F:DA:38:0F:06
SHA1
24:62:FF:34:5B:1C:6F:E0:97:CD:00:53:09:5A:B1:47:F8:00:C7:A9
X509v3 extensions
subjectKeyIdentifier
  • 27:60:5E:4E:1E:53:B7:45:54:2A:43:0D:E1:E4:AE:3A:AE:D1:E8:A4
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
  • User Notice:
  • Explicit Text: This Certificate may only be relied upon by Relying Parties and only in accordance with the Certificate Policy found at https://letsencrypt.org/repository/
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 29:3C:51:96:54:C8:39:65:BA:AA:50:FC:58:07:D4:B7:
  • 6F:BF:58:7A:29:72:DC:A4:C3:0C:F4:E5:45:47:F4:78
  • Timestamp : Sep 24 03:00:53.178 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:7A:03:85:41:F9:45:A5:A6:70:6A:C3:47:
  • 13:5D:9D:6F:90:D4:B9:FB:AD:58:E8:32:B8:4A:FF:1F:
  • 00:A0:FB:35:02:21:00:AC:A6:75:40:A5:D2:EC:4B:18:
  • EC:E6:00:E6:99:AE:66:1B:80:73:71:72:33:10:1E:5C:
  • 76:38:39:DF:94:D8:98
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : Sep 24 03:00:53.628 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:7E:AF:5A:F6:F7:E3:B3:FE:D0:06:7B:71:
  • 70:E9:F2:F3:2E:F9:AF:BA:86:D6:C3:B2:CA:EF:4C:D6:
  • 82:A4:DF:7C:02:21:00:94:BB:E4:AC:48:99:31:1F:D3:
  • 5D:FB:15:62:23:95:C7:7C:E4:AC:14:18:F5:2B:DC:4E:
  • 3F:B0:DA:E4:70:55:CB