SSL check results of mail.fips.dev

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail.fips.dev can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 25 Jul 2025 11:18:17 +0000

The mailservers of mail.fips.dev can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail.fips.dev addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.fips.dev
49.12.208.242
-
supported
*.fips.dev
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
5 s
mail.fips.dev
2a01:4f8:1c17:c205::1
-
supported
*.fips.dev
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
9 s

Outgoing Mails

We have not received any emails from a @mail.fips.dev address so far. Test mail delivery

Certificates

First seen at:

CN=*.fips.dev

Certificate chain
Subject
Common Name (CN)
  • *.fips.dev
Alternative Names
  • *.fips.dev
  • mail.fips.dev
Issuer
Country (C)
  • AT
Organization (O)
  • ZeroSSL
Common Name (CN)
  • ZeroSSL ECC Domain Secure Site CA
validity period
Not valid before
2025-06-24
Not valid after
2025-09-22
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
BC:EA:F9:99:01:4A:74:ED:54:EE:2E:E0:95:DB:07:5D:33:3F:A4:70:53:7F:08:9B:05:33:4F:33:D1:A7:ED:8B
SHA1
D6:DA:26:23:B4:00:E5:23:2C:90:B4:40:48:4E:1A:6A:AC:4A:7E:7D
X509v3 extensions
authorityKeyIdentifier
  • keyid:0F:6B:E6:4B:CE:39:47:AE:F6:7E:90:1E:79:F0:30:91:92:C8:5F:A3
subjectKeyIdentifier
  • AA:88:25:90:05:41:39:D1:52:DB:30:AF:D5:ED:7F:59:D9:3F:D4:CB
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.78
  • CPS: https://sectigo.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • CA Issuers - URI:http://zerossl.crt.sectigo.com/ZeroSSLECCDomainSecureSiteCA.crt
  • OCSP - URI:http://zerossl.ocsp.sectigo.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DD:DC:CA:34:95:D7:E1:16:05:E7:95:32:FA:C7:9F:F8:
  • 3D:1C:50:DF:DB:00:3A:14:12:76:0A:2C:AC:BB:C8:2A
  • Timestamp : Jun 24 03:28:11.467 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:C7:E5:B6:3F:2C:84:90:5A:F0:EE:6D:
  • A2:FD:25:52:C4:07:E4:13:63:16:D9:90:3B:45:5D:28:
  • 40:CA:3D:30:11:02:21:00:82:25:0D:7F:B1:5B:8E:87:
  • 38:D5:95:92:DC:C4:EA:3E:E1:E5:A9:ED:D8:3E:7B:D1:
  • FD:5F:61:AB:79:9A:DF:83
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 0D:E1:F2:30:2B:D3:0D:C1:40:62:12:09:EA:55:2E:FC:
  • 47:74:7C:B1:D7:E9:30:EF:0E:42:1E:B4:7E:4E:AA:34
  • Timestamp : Jun 24 03:28:11.498 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:E3:01:6D:7A:EA:AD:60:C5:4E:FC:87:
  • BE:F3:9C:40:BF:22:34:76:CC:B0:46:21:EC:30:F3:B1:
  • 98:0B:4C:E6:CB:02:20:13:E5:D9:2F:F2:EC:16:BB:F2:
  • 6B:B8:C1:32:18:D7:80:6D:DD:B5:67:89:26:10:31:FA:
  • 95:31:42:4B:EA:96:F7

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.fips.dev
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
error
Debug
valid