SSL check results of mailcleaner.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for mailcleaner.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 09 Nov 2021 07:24:44 +0000

The mailservers of mailcleaner.net can be reached through an encrypted connection.

However, we found problems that may affect the security.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mailcleaner.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
gate6.mailcleaner.net
195.176.194.32
5
supported
*.mailcleaner.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
gate2.mailcleaner.net
2001:918:ffd1::2000:0:2000:99
5
supported
*.mailcleaner.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
gate2.mailcleaner.net
193.246.63.99
5
supported
*.mailcleaner.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
gate4.mailcleaner.net
195.176.194.13
5
supported
*.mailcleaner.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s
gate5.mailcleaner.net
193.246.63.102
5
supported
*.mailcleaner.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s
gate3.mailcleaner.net
2001:918:ffd1::2000:0:3000:97
5
supported
*.mailcleaner.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
gate3.mailcleaner.net
193.246.63.97
5
supported
*.mailcleaner.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @mailcleaner.net address so far. Test mail delivery

Certificates

First seen at:

CN=*.mailcleaner.net

Certificate chain
Subject
Common Name (CN)
  • *.mailcleaner.net
Alternative Names
  • *.mailcleaner.net
  • mailcleaner.net
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • RapidSSL TLS RSA CA G1
validity period
Not valid before
2020-04-21
Not valid after
2022-05-21
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
D0:98:19:1F:FD:E6:E7:DE:51:B0:47:2B:84:6B:B6:7A:78:CE:7C:0E:5A:54:23:DB:BF:75:15:69:49:87:C2:C8
SHA1
0B:45:33:50:EE:77:A0:21:76:CA:23:9D:F5:E5:7B:86:2C:FC:CE:0A
X509v3 extensions
authorityKeyIdentifier
  • keyid:0C:DB:6C:82:49:0F:4A:67:0A:B8:14:EE:7A:C4:48:52:88:EB:56:38
subjectKeyIdentifier
  • CF:82:AA:71:8E:A2:48:E3:74:26:C5:0A:1E:12:B0:AE:C5:D2:3D:24
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.rapidssl.com/RapidSSLTLSRSACAG1.crl
certificatePolicies
  • Policy: 2.16.840.1.114412.1.2
  • CPS: https://www.digicert.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • OCSP - URI:http://status.rapidssl.com
  • CA Issuers - URI:http://cacerts.rapidssl.com/RapidSSLTLSRSACAG1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 29:79:BE:F0:9E:39:39:21:F0:56:73:9F:63:A5:77:E5:
  • BE:57:7D:9C:60:0A:F8:F9:4D:5D:26:5C:25:5D:C7:84
  • Timestamp : Apr 21 07:04:14.486 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:F1:B8:9B:93:96:14:ED:88:E0:76:6A:
  • EA:37:EE:3C:95:7D:F7:A9:0C:E2:55:0A:FB:88:28:08:
  • E2:6C:40:12:8B:02:20:4B:0D:D7:20:A4:C1:B9:58:2B:
  • 1D:BD:34:C8:DB:31:C4:B0:3D:2B:BC:10:6A:AF:68:DC:
  • C0:5A:85:5A:C7:EB:95
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 22:45:45:07:59:55:24:56:96:3F:A1:2F:F1:F7:6D:86:
  • E0:23:26:63:AD:C0:4B:7F:5D:C6:83:5C:6E:E2:0F:02
  • Timestamp : Apr 21 07:04:14.523 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:6F:81:B0:03:DF:3E:14:59:CD:DF:F5:75:
  • 42:82:73:70:2D:2F:5D:80:5C:F5:A5:FD:50:30:8E:35:
  • 31:55:4B:99:02:20:20:30:4E:FC:51:B0:79:38:DE:85:
  • 17:DF:30:8D:C8:47:65:F7:9D:23:AE:62:E9:CE:A8:17:
  • AD:8C:BD:1D:21:70
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 51:A3:B0:F5:FD:01:79:9C:56:6D:B8:37:78:8F:0C:A4:
  • 7A:CC:1B:27:CB:F7:9E:88:42:9A:0D:FE:D4:8B:05:E5
  • Timestamp : Apr 21 07:04:14.584 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:D3:30:E3:88:6D:8A:F3:9F:D9:0A:4A:
  • 72:69:D1:AC:34:9B:DA:2D:87:36:EC:16:19:F8:A9:1A:
  • B9:53:9F:26:78:02:20:0C:C6:4F:AA:A7:7F:9F:47:79:
  • 03:CB:9E:7B:13:D6:23:EF:02:AA:D7:97:C6:9E:F7:51:
  • E6:3F:E5:D3:5E:2C:BA