SSL check results of mail.gc-eng.com

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail.gc-eng.com can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 05 Dec 2024 01:32:03 +0000

We can not guarantee a secure connection to the mailservers of mail.gc-eng.com!

Please contact the operator of mail.gc-eng.com and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/mail.gc-eng.com

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail.gc-eng.com addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.gc-eng.com
50.28.36.91
-
supported
srv17.softwebdesigners.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
6 s
mail.gc-eng.com
2607:fad0:3101:2:bc7c:1254:fdf8:65a2
Results incomplete
- not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s

Outgoing Mails

We have not received any emails from a @mail.gc-eng.com address so far. Test mail delivery

Certificates

First seen at:

CN=srv17.softwebdesigners.com

Certificate chain
  • srv17.softwebdesigners.com
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch

      • R11
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • srv17.softwebdesigners.com
Alternative Names
  • srv17.softwebdesigners.com
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R11
validity period
Not valid before
2024-11-03
Not valid after
2025-02-01
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
8A:B8:14:D3:4B:8D:85:7D:C0:E2:B0:9A:68:5B:B9:ED:65:9F:0B:6B:15:E0:ED:CB:51:92:07:FF:0F:D9:4B:AE
SHA1
86:EE:70:0D:5D:EB:0D:30:3C:20:F4:36:FB:5E:80:97:76:B7:F7:C0
X509v3 extensions
subjectKeyIdentifier
  • 48:61:E1:85:7F:90:1C:0F:F5:4C:A0:CE:48:18:FB:A1:16:C0:14:0E
authorityKeyIdentifier
  • keyid:C5:CF:46:A4:EA:F4:C3:C0:7A:6C:95:C4:2D:B0:5E:92:2F:26:E3:B9
authorityInfoAccess
  • OCSP - URI:http://r11.o.lencr.org
  • CA Issuers - URI:http://r11.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E6:D2:31:63:40:77:8C:C1:10:41:06:D7:71:B9:CE:C1:
  • D2:40:F6:96:84:86:FB:BA:87:32:1D:FD:1E:37:8E:50
  • Timestamp : Nov 3 13:31:09.868 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:87:28:30:4B:5C:4C:58:7D:0D:5A:69:
  • 86:1C:33:D0:FC:E1:F9:C4:44:29:9D:79:2A:CA:FD:1B:
  • C3:B8:BB:C0:86:02:20:6A:1E:A0:6F:26:82:D1:FB:A0:
  • 26:73:CD:DF:9D:76:5D:BD:37:6C:0D:95:31:67:0F:C8:
  • DF:49:6C:35:20:1C:F0
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CF:11:56:EE:D5:2E:7C:AF:F3:87:5B:D9:69:2E:9B:E9:
  • 1A:71:67:4A:B0:17:EC:AC:01:D2:5B:77:CE:CC:3B:08
  • Timestamp : Nov 3 13:31:09.909 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:93:4F:E8:11:94:EE:9E:5C:56:E2:69:
  • 5D:E2:5D:9B:CD:3D:0E:03:96:7D:6B:25:F8:C3:3B:3E:
  • F5:81:0E:DE:A7:02:21:00:BC:C3:5D:DD:7A:B8:54:F2:
  • 06:E3:25:96:65:40:1B:84:08:A6:C2:BF:15:EB:5E:55:
  • C5:1C:D9:53:C7:35:1C:B0