SSL check results of markus-m.org

NEW You can also bulk check multiple servers.

Discover if the mail servers for markus-m.org can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 13 Apr 2026 00:31:00 +0000

The mailservers of markus-m.org can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @markus-m.org addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.markus-m.org
2003:fa:df0b:9000:243b:f776:8288:6998
Results incomplete
20 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
mail.markus-m.org
91.50.27.245
20
supported
mail.markus-m.org
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
3 s

Outgoing Mails

We have not received any emails from a @markus-m.org address so far. Test mail delivery

Certificates

First seen at:

CN=mail.markus-m.org

Certificate chain
  • mail.markus-m.org
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R13
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail.markus-m.org
Alternative Names
  • autoconfig.markus-m.org
  • autodiscover.markus-m.org
  • mail.markus-m.org
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R13
validity period
Not valid before
2026-02-27
Not valid after
2026-05-28
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
Fingerprints
SHA256
74:EA:B0:33:6D:9B:13:95:00:D9:9F:97:82:7F:B5:FF:10:14:4F:48:AA:56:75:49:AD:24:F2:23:E0:E5:C4:59
SHA1
97:9D:AE:F8:AC:91:B1:F3:D5:3D:D0:B2:1D:AF:BB:18:12:01:51:3D
X509v3 extensions
subjectKeyIdentifier
  • 7B:AC:0A:36:63:4B:A5:4F:4E:6A:03:DD:F5:A6:A7:12:F4:0B:4C:FC
authorityKeyIdentifier
  • keyid:E7:AB:9F:0F:2C:33:A0:53:D3:5E:4F:78:C8:B2:84:0E:3B:D6:92:33
authorityInfoAccess
  • CA Issuers - URI:http://r13.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://r13.c.lencr.org/13.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 16:83:2D:AB:F0:A9:25:0F:0F:F0:3A:A5:45:FF:C8:BF:
  • C8:23:D0:87:4B:F6:04:29:27:F8:E7:1F:33:13:F5:FA
  • Timestamp : Feb 27 14:54:08.762 2026 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:21:29:74:BD:DA:45:6F:85:55:65:1C:B3:
  • 19:D5:A1:DE:B6:7C:3E:32:17:72:15:DE:A9:4D:0F:77:
  • 73:08:1A:C5:02:21:00:E5:C6:42:BA:FF:11:37:DC:E4:
  • B9:B8:C1:74:33:4F:1A:22:DB:A1:60:F8:E1:9F:BA:16:
  • 08:EA:F9:94:7C:F6:C5
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 1A:8B:9D:69:4A:57:98:C8:99:A0:CA:88:BD:F4:8F:C0:
  • B4:56:60:CC:C3:60:0D:1F:71:F4:69:FF:C7:D1:AC:A3
  • Timestamp : Feb 27 14:54:09.747 2026 GMT
  • Extensions: 00:00:05:00:4F:4F:DD:AD
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:F9:D7:D0:7B:DF:46:D0:1E:D3:31:E1:
  • FA:D0:D5:0E:5D:2A:6D:84:C5:D2:7D:02:3E:B4:8E:9B:
  • 1B:03:8C:A5:8D:02:21:00:D2:13:67:E7:3C:0C:95:B1:
  • A5:8F:89:17:09:C0:E4:2D:9D:70:ED:28:BA:BE:06:9B:
  • 56:39:89:A9:76:42:9C:C2