SSL check results of meddv.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for meddv.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 12 Oct 2018 13:18:24 +0000

The mailservers of meddv.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @meddv.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.meddv.de
87.190.53.138
10
supported
mail.meddv.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s
mx00.kundenserver.de
212.227.15.41
20
supported
mx.kundenserver.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s
mx01.kundenserver.de
217.72.192.67
21
supported
mx.kundenserver.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @meddv.de address so far. Test mail delivery

Certificates

First seen at:

CN=mx.kundenserver.de,L=Montabaur,ST=Rheinland-Pfalz,O=1&1 Internet SE,C=DE

Certificate chain
Subject
Country (C)
  • DE
Organization (O)
  • 1&1 Internet SE
State (ST)
  • Rheinland-Pfalz
Locality (L)
  • Montabaur
Common Name (CN)
  • mx.kundenserver.de
Alternative Names
  • mx.kundenserver.de
  • mx00.kundenserver.de
  • mx01.kundenserver.de
  • mx00.emig.kundenserver.de
  • mx01.emig.kundenserver.de
Issuer
Country (C)
  • DE
Organization (O)
  • T-Systems International GmbH
Organizational Unit (OU)
  • T-Systems Trust Center
State (ST)
  • Nordrhein Westfalen
Postal code
  • 57250
Locality (L)
  • Netphen
Street
  • Untere Industriestr. 20
Common Name (CN)
  • TeleSec ServerPass DE-2
validity period
Not valid before
2017-03-22
Not valid after
2019-03-27
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Client Authentication
  • TLS Web Server Authentication
Fingerprints
SHA256
6B:F2:E0:57:CA:2D:1F:24:5D:54:CD:18:30:A7:A3:8A:2D:FB:A5:7E:01:E7:2E:0B:4C:2A:8E:D3:78:47:88:42
SHA1
BB:92:1D:1B:F3:97:5B:A5:30:ED:80:0B:EF:07:62:C0:D0:72:BE:25
X509v3 extensions
authorityKeyIdentifier
  • keyid:54:04:29:6F:A2:93:C6:90:31:45:C0:3D:DE:2B:E2:0A:69:80:92:5F
subjectKeyIdentifier
  • 73:0F:81:8C:5B:57:8E:9A:F6:9D:20:32:1F:94:D6:55:5B:EA:71:FC
certificatePolicies
  • Policy: 1.3.6.1.4.1.7879.13.2
  • CPS: http://www.telesec.de/serverpass/cps.html
  • Policy: 2.23.140.1.2.2
crlDistributionPoints
  • Full Name:
  • URI:http://crl.serverpass.telesec.de/rl/TeleSec_ServerPass_DE-2.crl
  • Full Name:
  • URI:ldap://ldap.serverpass.telesec.de/cn=TeleSec%20ServerPass%20DE-2,ou=T-Systems%20Trust%20Center,o=T-Systems%20International%20GmbH,c=de?certificateRevocationlist?base?certificateRevocationlist=*
authorityInfoAccess
  • OCSP - URI:http://ocsp.serverpass.telesec.de/ocspr
  • CA Issuers - URI:http://crl.serverpass.telesec.de/crt/TeleSec_ServerPass_DE-2.cer
  • CA Issuers - URI:ldap://ldap.serverpass.telesec.de/cn=TeleSec%20ServerPass%20DE-2,ou=T-Systems%20Trust%20Center,o=T-Systems%20International%20GmbH,c=de?cACertificate
First seen at:

CN=mail.meddv.de,O=medDV GmbH,L=Fernwald,ST=Hessen,C=DE

Certificate chain
Subject
Country (C)
  • DE
State (ST)
  • Hessen
Locality (L)
  • Fernwald
Organization (O)
  • medDV GmbH
Common Name (CN)
  • mail.meddv.de
Alternative Names
  • mail.meddv.de
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • GeoTrust RSA CA 2018
validity period
Not valid before
2018-06-20
Not valid after
2019-06-20
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
66:5F:C4:6E:2F:CD:1B:6C:DE:38:93:19:2E:98:31:33:D5:55:F9:83:28:21:77:50:20:84:E3:78:01:71:78:8C
SHA1
24:E3:5C:CE:7D:B6:15:D3:47:35:9F:59:4C:DC:99:B2:64:59:CD:F6
X509v3 extensions
authorityKeyIdentifier
  • keyid:90:58:FF:B0:9C:75:A8:51:54:77:B1:ED:F2:A3:43:16:38:9E:6C:C5
subjectKeyIdentifier
  • 97:C3:D7:1C:EC:B1:FF:52:B9:F9:C0:F7:46:03:7F:75:0C:FD:70:A7
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.geotrust.com/GeoTrustRSACA2018.crl
certificatePolicies
  • Policy: 2.16.840.1.114412.1.1
  • CPS: https://www.digicert.com/CPS
  • Policy: 2.23.140.1.2.2
authorityInfoAccess
  • OCSP - URI:http://status.geotrust.com
  • CA Issuers - URI:http://cacerts.geotrust.com/GeoTrustRSACA2018.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : BB:D9:DF:BC:1F:8A:71:B5:93:94:23:97:AA:92:7B:47:
  • 38:57:95:0A:AB:52:E8:1A:90:96:64:36:8E:1E:D1:85
  • Timestamp : Jun 20 17:17:25.742 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:D4:5F:94:F0:B3:68:A9:B9:97:66:26:
  • 12:9A:1D:97:33:7E:16:74:AE:CC:88:90:32:75:10:8E:
  • 95:9E:C1:84:17:02:21:00:DF:88:54:0F:19:9E:13:31:
  • 1D:74:9C:1F:AE:C9:C1:68:71:1F:26:FF:84:2A:9A:67:
  • 20:8E:31:D1:A6:9E:AD:E6
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 87:75:BF:E7:59:7C:F8:8C:43:99:5F:BD:F3:6E:FF:56:
  • 8D:47:56:36:FF:4A:B5:60:C1:B4:EA:FF:5E:A0:83:0F
  • Timestamp : Jun 20 17:17:25.726 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:14:C3:7B:76:28:15:77:10:9C:0A:42:FF:
  • 6F:76:EA:0D:1A:33:20:8B:96:50:B9:B5:BA:94:3D:13:
  • EB:2C:7F:2A:02:20:24:DF:61:C0:B4:04:F6:BD:E9:1F:
  • 48:8F:03:16:58:61:8C:50:67:02:55:2D:C3:3F:EA:23:
  • C0:AC:F7:A4:54:52