SSL check results of miemus.eu

NEW You can also bulk check multiple servers.

Discover if the mail servers for miemus.eu can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 08 Apr 2021 05:31:31 +0000

The mailservers of miemus.eu can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @miemus.eu addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
sai.miemus.eu
2a03:b0c0:2:d0::4d8:7001
10
supported
miemus.eu
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
12 s
sai.miemus.eu
178.62.225.207
10
supported
miemus.eu
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
12 s

Outgoing Mails

We have not received any emails from a @miemus.eu address so far. Test mail delivery

Certificates

First seen at:

CN=miemus.eu

Certificate chain
  • miemus.eu
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • DST Root CA X3 (Certificate is self-signed.)
            • remaining
            • 2048 bit
            • sha1WithRSAEncryption

Subject
Common Name (CN)
  • miemus.eu
Alternative Names
  • *.miemus.eu
  • miemus.eu
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2021-02-11
Not valid after
2021-05-12
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
99:F6:0F:60:0D:C4:0E:F6:17:80:D7:C1:2A:A2:5E:E4:B2:31:7A:D9:00:2A:58:AF:DF:6C:88:D1:37:A2:2A:E6
SHA1
F7:41:F3:E2:09:25:9F:2A:93:8C:D6:B8:B6:DB:91:8A:94:E2:0E:AD
X509v3 extensions
subjectKeyIdentifier
  • FA:62:FC:08:0D:0D:DC:97:49:48:49:66:9A:5D:65:AC:44:32:76:9F
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 44:94:65:2E:B0:EE:CE:AF:C4:40:07:D8:A8:FE:28:C0:
  • DA:E6:82:BE:D8:CB:31:B5:3F:D3:33:96:B5:B6:81:A8
  • Timestamp : Feb 11 07:53:21.466 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:57:F8:53:D6:D5:2C:85:8E:32:09:19:8B:
  • 14:A6:FE:F1:01:AE:3C:4E:37:F7:1F:39:6D:38:D8:D5:
  • FA:C9:D5:A7:02:20:10:7B:DC:28:22:F1:14:BE:35:2B:
  • FC:34:DE:68:93:86:9E:46:1D:F6:42:63:CB:C6:8E:A5:
  • CF:8F:A3:C9:80:57
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 7D:3E:F2:F8:8F:FF:88:55:68:24:C2:C0:CA:9E:52:89:
  • 79:2B:C5:0E:78:09:7F:2E:6A:97:68:99:7E:22:F0:D7
  • Timestamp : Feb 11 07:53:21.504 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:6D:EE:7B:00:51:A8:CC:7E:D6:68:DA:63:
  • DD:EC:74:CA:87:A1:B0:C1:B2:F5:84:35:62:B9:1F:32:
  • 40:F5:7B:79:02:21:00:83:A1:E4:E1:10:BA:BA:7D:D5:
  • 0A:27:DD:AB:43:33:BB:DA:E5:10:AC:22:64:E5:54:F7:
  • D2:F3:5D:8A:A9:33:92

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.sai.miemus.eu
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid