SSL check results of mail.duda.team

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail.duda.team can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 16 Apr 2024 21:36:38 +0000

The mailservers of mail.duda.team can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail.duda.team addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.duda.team
159.89.29.144
-
supported
mail.duda.team
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @mail.duda.team address so far. Test mail delivery

Certificates

First seen at:

CN=mail.duda.team

Certificate chain
  • mail.duda.team
    • remaining
    • 256 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail.duda.team
Alternative Names
  • imap.duda.team
  • mail.duda.team
  • postfixadmin.duda.team
  • smtp.duda.team
  • spam.duda.team
  • webmail.duda.team
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2024-04-16
Not valid after
2024-07-15
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
37:46:C4:E3:34:3B:4F:40:A9:42:B7:48:F1:0F:7D:EC:F1:8B:2A:E0:E3:A4:AB:22:4D:93:C3:C1:C8:CF:23:1B
SHA1
DB:23:9B:51:CC:EF:D3:FB:CD:92:21:B6:9C:7B:B8:4A:AF:B0:2D:40
X509v3 extensions
subjectKeyIdentifier
  • 75:83:1A:2D:B0:90:15:00:9D:EE:6F:FD:B2:48:5E:EB:96:D0:30:C5
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 48:B0:E3:6B:DA:A6:47:34:0F:E5:6A:02:FA:9D:30:EB:
  • 1C:52:01:CB:56:DD:2C:81:D9:BB:BF:AB:39:D8:84:73
  • Timestamp : Apr 16 21:31:03.737 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:7F:FC:16:39:FA:F6:1B:9E:EA:C8:1E:7E:
  • 0A:3F:E8:E3:22:FA:9D:91:3C:63:F5:29:01:D7:FE:78:
  • D8:C8:7A:EE:02:21:00:80:DD:76:7E:A1:2A:1B:7C:31:
  • A6:49:01:FD:52:B4:FC:3B:AC:E2:8E:D5:C6:B4:E8:2B:
  • 5E:34:7B:F2:CA:70:66
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DF:E1:56:EB:AA:05:AF:B5:9C:0F:86:71:8D:A8:C0:32:
  • 4E:AE:56:D9:6E:A7:F5:A5:6A:01:D1:C1:3B:BE:52:5C
  • Timestamp : Apr 16 21:31:03.929 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:0E:DA:F2:87:B5:5E:AF:5C:1A:54:14:B6:
  • CF:D7:7D:FC:55:ED:28:20:2D:0A:49:6C:BE:EE:E2:0A:
  • 73:B1:04:DE:02:21:00:84:28:57:16:78:2A:13:B5:95:
  • 9E:39:98:47:FB:7F:10:97:15:39:80:62:FC:83:36:74:
  • 14:C2:84:34:80:49:80