SSL check results of megafon.ru

NEW You can also bulk check multiple servers.

Discover if the mail servers for megafon.ru can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 16 Mar 2024 09:08:49 +0000

The mailservers of megafon.ru can be reached through an encrypted connection.

However, we found problems that may affect the security.

Servers

Incoming Mails

These servers are responsible for incoming mails to @megafon.ru addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx3.megafon.ru
83.149.0.98
10
supported
*.megafon.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
mx4.megafon.ru
83.149.0.99
10
supported
*.megafon.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
mx.megafon.ru
193.201.228.109
10
supported
*.megafon.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
mx2.megafon.ru
85.26.149.34
10
supported
*.megafon.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
sib-mx01.megafon.ru
83.149.51.98
20
supported
*.megafon.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
16 s
sib-mx02.megafon.ru
83.149.51.99
20
supported
*.megafon.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
16 s
vlg-mx01.megafon.ru
188.162.60.100
20
supported
*.megafon.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
vlg-mx02.megafon.ru
188.162.60.69
20
supported
*.megafon.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
14 s
dv-mx01.megafon.ru
188.162.224.12
20
supported
*.megafon.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
17 s
dv-mx02.megafon.ru
188.162.224.13
20
supported
*.megafon.ru
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
17 s

Outgoing Mails

We have not received any emails from a @megafon.ru address so far. Test mail delivery

Certificates

First seen at:

CN=*.megafon.ru,O=PJSC Megafon,L=Moscow,ST=Moscow,C=RU

Certificate chain
  • *.megafon.ru
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Unknown Authority

      GlobalSign RSA OV SSL CA 2018
Subject
Country (C)
  • RU
State (ST)
  • Moscow
Locality (L)
  • Moscow
Organization (O)
  • PJSC Megafon
Common Name (CN)
  • *.megafon.ru
Alternative Names
  • *.megafon.ru
  • megafon.ru
Issuer
Country (C)
  • BE
Organization (O)
  • GlobalSign nv-sa
Common Name (CN)
  • GlobalSign RSA OV SSL CA 2018
validity period
Not valid before
2023-09-27
Not valid after
2024-10-28
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
55:D6:10:38:9C:F9:08:80:7A:F3:5E:C2:F3:4B:C2:45:4F:7F:52:72:85:19:77:E8:79:83:7E:A3:40:3F:A6:C7
SHA1
2F:35:CA:A9:A1:FA:F2:06:C5:9B:D2:B7:1F:97:A5:B0:DE:5F:51:3D
X509v3 extensions
authorityInfoAccess
  • CA Issuers - URI:http://secure.globalsign.com/cacert/gsrsaovsslca2018.crt
  • OCSP - URI:http://ocsp.globalsign.com/gsrsaovsslca2018
certificatePolicies
  • Policy: 1.3.6.1.4.1.4146.1.20
  • CPS: https://www.globalsign.com/repository/
  • Policy: 2.23.140.1.2.2
crlDistributionPoints
  • Full Name:
  • URI:http://crl.globalsign.com/gsrsaovsslca2018.crl
authorityKeyIdentifier
  • keyid:F8:EF:7F:F2:CD:78:67:A8:DE:6F:8F:24:8D:88:F1:87:03:02:B3:EB
subjectKeyIdentifier
  • 0C:A7:96:09:9A:2A:5D:AF:32:13:64:5D:80:88:26:FA:B8:68:1D:06
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2:
  • 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B
  • Timestamp : Sep 27 15:28:02.443 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:A0:BC:66:2B:75:5E:DB:12:8C:6D:99:
  • 02:AA:3C:2A:CB:DB:88:B5:F5:3A:CD:0A:AC:0E:16:D5:
  • 4A:48:52:E4:72:02:21:00:CC:AD:9D:9E:DC:59:69:7A:
  • 2B:E3:AF:47:26:70:56:30:75:1E:AE:A0:87:41:33:97:
  • 49:05:BF:07:4D:59:27:F5
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 48:B0:E3:6B:DA:A6:47:34:0F:E5:6A:02:FA:9D:30:EB:
  • 1C:52:01:CB:56:DD:2C:81:D9:BB:BF:AB:39:D8:84:73
  • Timestamp : Sep 27 15:28:02.191 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:8F:44:CC:05:A3:DF:EE:79:BA:E5:CC:
  • 02:E4:EB:A5:72:02:35:7D:6D:3F:6A:B6:5E:5F:24:12:
  • CC:70:21:98:44:02:21:00:82:FF:15:5D:59:42:A3:70:
  • 86:83:40:75:9E:70:FD:E3:10:9E:59:78:1B:50:F3:84:
  • 05:50:C8:E9:5D:36:FC:19
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DA:B6:BF:6B:3F:B5:B6:22:9F:9B:C2:BB:5C:6B:E8:70:
  • 91:71:6C:BB:51:84:85:34:BD:A4:3D:30:48:D7:FB:AB
  • Timestamp : Sep 27 15:28:02.273 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:55:E9:B2:5E:42:0B:29:5D:0C:E0:BB:B5:
  • 38:CC:F9:8F:8B:29:C2:20:9A:A5:60:B4:66:10:D0:E9:
  • 77:38:5C:D5:02:20:48:27:2D:2E:89:04:4E:D1:6E:D8:
  • 43:24:6E:E7:02:60:79:A9:9D:46:58:14:F8:73:1C:5E:
  • 8B:49:71:57:33:14