SSL check results of mail2.asta-marburg.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail2.asta-marburg.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 14 Apr 2025 22:21:04 +0000

The mailservers of mail2.asta-marburg.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail2.asta-marburg.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail2.asta-marburg.de
89.238.74.162
-
supported
mail2.asta-marburg.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
4 s
mail2.asta-marburg.de
2a00:1828:2000:204::5
-
supported
mail2.asta-marburg.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
3 s

Outgoing Mails

We have not received any emails from a @mail2.asta-marburg.de address so far. Test mail delivery

Certificates

First seen at:

CN=mail2.asta-marburg.de

Certificate chain
  • mail2.asta-marburg.de
    • remaining
    • 256 bit
    • ecdsa-with-SHA384

      • E6
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail2.asta-marburg.de
Alternative Names
  • autoconfig.asta-marburg.de
  • imap.asta-marburg.de
  • mail2.asta-marburg.de
  • smtp.asta-marburg.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E6
validity period
Not valid before
2025-04-14
Not valid after
2025-07-13
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
67:B5:27:6E:06:AC:8D:CB:E8:70:AB:3C:1D:E6:6B:2F:65:E2:49:3E:3C:6E:21:55:00:13:2D:21:57:67:66:F0
SHA1
0D:64:56:42:80:E7:5D:2E:DB:46:29:A8:A8:73:F6:97:3A:C4:10:3C
X509v3 extensions
subjectKeyIdentifier
  • B4:CB:C7:FF:97:30:B6:D8:A3:58:9C:5B:7A:40:7C:B9:F2:06:22:47
authorityKeyIdentifier
  • keyid:93:27:46:98:03:A9:51:68:8E:98:D6:C4:42:48:DB:23:BF:58:94:D2
authorityInfoAccess
  • OCSP - URI:http://e6.o.lencr.org
  • CA Issuers - URI:http://e6.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://e6.c.lencr.org/57.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Apr 14 12:07:43.297 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:80:6E:98:E9:91:91:E9:1E:47:DE:6B:
  • BA:8B:2A:B1:38:9A:7F:AD:9D:51:24:78:3E:B4:2E:51:
  • 9F:74:7E:92:66:02:20:10:73:63:F5:B0:70:52:0E:84:
  • 64:05:EA:8B:3D:49:FD:E7:CC:60:13:41:36:77:AC:6C:
  • 06:5E:FF:72:2F:22:DC
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 1A:04:FF:49:D0:54:1D:40:AF:F6:A0:C3:BF:F1:D8:C4:
  • 67:2F:4E:EC:EE:23:40:68:98:6B:17:40:2E:DC:89:7D
  • Timestamp : Apr 14 12:07:43.670 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:F2:66:26:E2:E3:5B:C3:AC:FA:D4:03:
  • 07:3B:AC:91:70:4B:E8:30:9E:C5:84:69:C4:2F:E5:CE:
  • 87:2F:0B:BD:DF:02:21:00:C4:4F:8E:72:AF:39:68:35:
  • 31:83:05:77:C1:DC:F9:27:33:61:95:CA:69:55:05:60:
  • EA:AB:6A:0B:0D:E1:7B:62

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail2.asta-marburg.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-512 Hash
valid
valid