SSL check results of mainclain.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for mainclain.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 16 Apr 2025 00:30:25 +0000

The mailservers of mainclain.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mainclain.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.snowway-design.de
2a01:4f8:172:19d4::2
10
supported
mail.snowway-design.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
6 s
mail.snowway-design.de
49.12.145.194
10
supported
mail.snowway-design.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @mainclain.de address so far. Test mail delivery

Certificates

First seen at:

CN=mail.snowway-design.de

Certificate chain
  • mail.snowway-design.de
    • remaining
    • 384 bit
    • ecdsa-with-SHA384

      • E5
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail.snowway-design.de
Alternative Names
  • mail.snowway-design.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E5
validity period
Not valid before
2025-04-11
Not valid after
2025-07-10
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
4A:FE:0E:70:09:6A:84:4B:C5:9A:C7:DD:AB:A0:4B:23:73:A2:BB:99:2D:A5:84:FF:5D:05:73:23:B9:21:C0:EE
SHA1
AA:5F:67:2C:47:16:32:07:AD:0A:37:33:E5:1E:16:7B:D6:C5:E8:9A
X509v3 extensions
subjectKeyIdentifier
  • AA:4A:1A:4E:67:45:5A:8B:07:1B:F5:B1:34:1D:16:DD:2F:21:0D:87
authorityKeyIdentifier
  • keyid:9F:2B:5F:CF:3C:21:4F:9D:04:B7:ED:2B:2C:C4:C6:70:8B:D2:D7:0D
authorityInfoAccess
  • OCSP - URI:http://e5.o.lencr.org
  • CA Issuers - URI:http://e5.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://e5.c.lencr.org/8.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Apr 11 09:38:03.925 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:12:88:85:7E:41:CD:3C:02:BB:94:2A:5C:
  • AB:8E:9F:54:1D:FB:64:16:46:AD:DC:F6:4A:7C:9D:A6:
  • 23:53:28:EF:02:21:00:DB:D5:16:4B:1B:85:C3:73:32:
  • 44:F3:E1:9C:ED:B5:FB:DF:CC:11:30:2C:5F:01:58:B1:
  • 14:BD:D5:31:5A:A3:1B
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DD:DC:CA:34:95:D7:E1:16:05:E7:95:32:FA:C7:9F:F8:
  • 3D:1C:50:DF:DB:00:3A:14:12:76:0A:2C:AC:BB:C8:2A
  • Timestamp : Apr 11 09:38:03.966 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:86:57:4E:81:98:3B:E2:90:2D:0F:30:
  • B5:48:E2:41:89:A8:53:61:B4:97:60:C8:F4:B2:90:A8:
  • E8:7A:52:B3:E1:02:21:00:80:F9:9F:FF:8F:F0:AC:04:
  • F1:51:2A:18:1E:64:FD:3B:EB:78:E3:7D:13:EA:A1:1D:
  • BE:33:BF:A1:81:D0:CA:BB

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.snowway-design.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
error
Debug
valid