SSL check results of mika.solutions

NEW You can also bulk check multiple servers.

Discover if the mail servers for mika.solutions can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 12 Oct 2018 12:34:16 +0000

The mailservers of mika.solutions can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mika.solutions addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.mika.solutions
2607:5300:203:1446::128
5
supported
mail.mika.solutions
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
10.0 s
mail.mika.solutions
142.44.249.128
5
supported
mail.mika.solutions
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
8.0 s

Outgoing Mails

We have not received any emails from a @mika.solutions address so far. Test mail delivery

Certificates

First seen at:

mail.mika.solutions

Certificate chain
Subject
Common Name (CN)
  • mail.mika.solutions
Alternative Names
  • autoconfig.mika.services
  • autoconfig.mika.solutions
  • autodiscover.mika.services
  • autodiscover.mika.solutions
  • mail.mika.solutions
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2018-10-09
Not valid after
2019-01-07
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
B4:41:21:90:71:24:9E:9B:87:BD:E1:AE:83:E5:48:99:6B:9B:ED:6F:69:FE:26:DD:2D:86:22:AF:85:47:F6:75
SHA1
AF:E3:20:93:4A:05:2A:75:50:B5:0B:75:82:21:DF:7A:DF:DE:86:75
X509v3 extensions
subjectKeyIdentifier
  • 42:8B:26:68:08:73:AE:FE:BD:F6:A0:DF:F7:E1:50:68:D2:87:9E:3A
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
  • User Notice:
  • Explicit Text: This Certificate may only be relied upon by Relying Parties and only in accordance with the Certificate Policy found at https://letsencrypt.org/repository/
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1(0)
  • Log ID : E2:69:4B:AE:26:E8:E9:40:09:E8:86:1B:B6:3B:83:D4:
  • 3E:E7:FE:74:88:FB:A4:8F:28:93:01:9D:DD:F1:DB:FE
  • Timestamp : Oct 9 14:18:53.817 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:90:D2:C4:06:24:E1:06:A2:22:25:41:
  • 25:1A:48:64:5E:5B:D2:6A:E7:26:83:78:F4:93:AC:2C:
  • BB:1C:C5:19:95:02:20:20:D7:3B:00:68:E2:09:9D:59:
  • C0:99:6F:8A:BD:96:27:85:8C:9F:0C:E4:C3:82:C5:99:
  • 58:0D:9B:47:74:90:21
  • Signed Certificate Timestamp:
  • Version : v1(0)
  • Log ID : 29:3C:51:96:54:C8:39:65:BA:AA:50:FC:58:07:D4:B7:
  • 6F:BF:58:7A:29:72:DC:A4:C3:0C:F4:E5:45:47:F4:78
  • Timestamp : Oct 9 14:18:53.920 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:FE:9F:6B:27:E3:CD:57:F2:97:27:32:
  • A2:0F:24:38:DF:B4:03:48:65:D6:0F:B8:38:E7:38:D4:
  • 04:69:46:C5:DC:02:21:00:CF:C3:8D:CA:4E:FA:2D:52:
  • 82:91:11:82:98:16:81:45:72:0B:A6:A0:AD:BD:B4:B2:
  • 75:9F:F8:D6:F8:1A:5B:EA

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.mika.solutions
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
error
Debug
valid