SSL check results of mmxiv.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for mmxiv.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 29 Nov 2024 04:29:31 +0000

We can not guarantee a secure connection to the mailservers of mmxiv.net!

Please contact the operator of mmxiv.net and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/mmxiv.net

Servers

Incoming Mails

These servers are responsible for incoming mails to @mmxiv.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
epistolas.mmxiv.net
2607:f2f8:a910::9911
Results incomplete
10
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
epistolas.mmxiv.net
174.136.99.11
10
supported
epistolas.mmxiv.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
7 s

Outgoing Mails

We have not received any emails from a @mmxiv.net address so far. Test mail delivery

Certificates

First seen at:

CN=epistolas.mmxiv.net

Certificate chain
  • epistolas.mmxiv.net
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R10
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • epistolas.mmxiv.net
Alternative Names
  • epistolas.mmxiv.net
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R10
validity period
Not valid before
2024-10-21
Not valid after
2025-01-19
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
4F:9F:5C:79:AD:E0:A6:C6:6D:2E:8E:9C:3D:9C:A2:B4:77:28:F9:14:18:F5:12:65:93:EF:48:C9:D3:5F:26:B5
SHA1
78:EF:25:7E:E3:D0:83:DA:B1:9D:69:76:AA:22:88:D8:79:3A:04:AC
X509v3 extensions
subjectKeyIdentifier
  • 9A:A8:66:51:54:DC:B7:4F:96:C3:1D:7F:DD:EA:77:41:1F:07:16:72
authorityKeyIdentifier
  • keyid:BB:BC:C3:47:A5:E4:BC:A9:C6:C3:A4:72:0C:10:8D:A2:35:E1:C8:E8
authorityInfoAccess
  • OCSP - URI:http://r10.o.lencr.org
  • CA Issuers - URI:http://r10.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E6:D2:31:63:40:77:8C:C1:10:41:06:D7:71:B9:CE:C1:
  • D2:40:F6:96:84:86:FB:BA:87:32:1D:FD:1E:37:8E:50
  • Timestamp : Oct 21 07:30:22.362 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:40:F8:46:45:C3:83:58:91:DF:7E:43:DE:
  • 79:31:0C:65:AC:76:C3:EF:3D:4B:0E:F9:36:95:16:ED:
  • 2D:F6:9F:B8:02:20:72:9A:62:C2:B0:9C:9A:74:E0:F3:
  • C0:19:4C:95:FE:6D:38:AA:3F:AA:BF:76:40:3A:DB:4A:
  • 95:55:20:8A:8F:81
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CF:11:56:EE:D5:2E:7C:AF:F3:87:5B:D9:69:2E:9B:E9:
  • 1A:71:67:4A:B0:17:EC:AC:01:D2:5B:77:CE:CC:3B:08
  • Timestamp : Oct 21 07:30:22.428 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:F5:9A:FA:2A:A3:90:64:1A:E4:23:E0:
  • 88:ED:65:6D:2B:8C:6C:03:2F:FB:BE:43:35:28:F0:AE:
  • 17:FB:FB:5C:9B:02:20:30:56:CE:B9:0D:B6:A0:C1:B1:
  • C7:61:E7:CF:39:DE:47:5B:6D:67:C1:AA:BD:48:0C:32:
  • 68:E4:A3:09:4E:97:31