SSL check results of mail2.fes-ehemalige.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail2.fes-ehemalige.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 08 May 2021 22:47:31 +0000

The mailservers of mail2.fes-ehemalige.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail2.fes-ehemalige.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail2.fes-ehemalige.de
78.47.221.165
-
supported
mail2.fes-ehemalige.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @mail2.fes-ehemalige.de address so far. Test mail delivery

Certificates

First seen at:

CN=mail2.fes-ehemalige.de

Certificate chain
  • mail2.fes-ehemalige.de
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • DST Root CA X3 (Certificate is self-signed.)
            • remaining
            • 2048 bit
            • sha1WithRSAEncryption

Subject
Common Name (CN)
  • mail2.fes-ehemalige.de
Alternative Names
  • imap.fes-ehemalige.de
  • mail2.fes-ehemalige.de
  • pop.fes-ehemalige.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2021-03-25
Not valid after
2021-06-23
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
FE:E6:FC:9C:0D:19:88:50:4D:DC:82:86:96:85:C4:CE:77:E8:0C:4B:80:A2:BD:35:61:03:91:F2:3C:F4:12:B3
SHA1
33:BA:32:A6:D3:73:2D:45:74:F0:95:60:6F:B2:35:BC:81:69:90:D8
X509v3 extensions
subjectKeyIdentifier
  • F7:8A:72:A1:B4:3E:4F:A3:08:8D:43:2E:92:E0:00:55:6B:0C:8F:CD
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 44:94:65:2E:B0:EE:CE:AF:C4:40:07:D8:A8:FE:28:C0:
  • DA:E6:82:BE:D8:CB:31:B5:3F:D3:33:96:B5:B6:81:A8
  • Timestamp : Mar 25 12:31:47.243 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:AC:4D:F7:8D:96:12:87:92:99:44:71:
  • A5:85:48:A3:35:66:A5:EB:00:1F:8D:9D:39:8D:86:24:
  • 37:60:0C:14:1A:02:20:20:E4:E5:BB:48:D7:00:31:CF:
  • E6:D5:A5:C3:53:1E:DE:CA:79:4D:00:03:CD:5C:33:81:
  • 89:43:52:5E:9F:60:76
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 7D:3E:F2:F8:8F:FF:88:55:68:24:C2:C0:CA:9E:52:89:
  • 79:2B:C5:0E:78:09:7F:2E:6A:97:68:99:7E:22:F0:D7
  • Timestamp : Mar 25 12:31:47.296 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:05:9E:11:7E:5D:C0:92:36:E4:CD:E3:08:
  • D0:7C:9C:89:4E:26:47:50:93:EF:3A:95:BF:E1:7F:28:
  • 84:6F:4B:29:02:21:00:DB:D4:A4:61:9E:3B:D8:C5:F6:
  • B1:F1:25:95:2A:27:D1:48:3D:BF:07:7E:26:83:CF:2A:
  • 18:EA:43:34:F3:7B:4D