SSL check results of mnet-mail.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for mnet-mail.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 21 Nov 2022 13:00:04 +0000

We can not guarantee a secure connection to the mailservers of mnet-mail.de!

Please contact the operator of mnet-mail.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/mnet-mail.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @mnet-mail.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail-in.m-online.net
2001:a60::29:0:2:25:3
Results incomplete
0
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
mail-in.m-online.net
2001:a60::29:0:2:25:1
Results incomplete
0
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
mail-in.m-online.net
2001:a60::79:0:2:25:2
Results incomplete
0
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
mail-in.m-online.net
2001:a60::79:0:2:25:4
Results incomplete
0
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
mail-in.m-online.net
62.245.181.138
0
supported
mail-in.m-online.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
mail-in.m-online.net
212.114.242.11
0
supported
mail-in.m-online.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
mail-in.m-online.net
62.245.181.139
0
supported
mail-in.m-online.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
mail-in.m-online.net
212.114.242.10
0
supported
mail-in.m-online.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s

Outgoing Mails

We have not received any emails from a @mnet-mail.de address so far. Test mail delivery

Certificates

First seen at:

CN=mail-in.m-online.net

Certificate chain
Subject
Common Name (CN)
  • mail-in.m-online.net
Alternative Names
  • mail-in.m-online.net
  • www.mail-in.m-online.net
Issuer
Country (C)
  • PL
Organization (O)
  • Unizeto Technologies S.A.
Organizational Unit (OU)
  • Certum Certification Authority
Common Name (CN)
  • Certum Domain Validation CA SHA2
validity period
Not valid before
2022-01-24
Not valid after
2023-02-23
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
15:D2:AF:16:10:E7:5C:C6:DD:ED:E4:0E:59:D7:6C:8F:78:1D:DB:5E:19:FB:0F:10:BD:AD:4F:71:25:D4:E4:3B
SHA1
5A:15:FC:84:04:86:24:0D:CC:99:42:3E:D3:DD:7C:F8:13:59:68:86
X509v3 extensions
crlDistributionPoints
  • Full Name:
  • URI:http://crl.certum.pl/dvcasha2.crl
authorityInfoAccess
  • OCSP - URI:http://dvcasha2.ocsp-certum.com
  • CA Issuers - URI:http://repository.certum.pl/dvcasha2.cer
authorityKeyIdentifier
  • keyid:E5:31:AD:BF:3A:11:96:F4:83:BC:50:3C:D4:B7:90:9B:90:EE:DE:25
subjectKeyIdentifier
  • 27:2E:11:E0:0E:06:BC:D1:1C:EB:04:20:3F:7B:AE:41:E0:2A:2F:A9
issuerAltName
  • email:dvcasha2@certum.pl
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.2.616.1.113527.2.5.1.3
  • CPS: https://www.certum.pl/CPS
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : Jan 24 13:05:48.079 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:90:34:52:A3:51:FA:70:7F:19:C4:CA:
  • C0:0A:05:3F:9A:A3:EB:5B:05:11:76:5E:53:1D:15:02:
  • 73:60:96:26:72:02:20:2A:44:27:5A:4D:8C:E5:DF:F2:
  • EA:E8:9B:4B:B9:AC:C5:DE:A3:D8:4F:2E:B9:8C:01:FE:
  • 74:6A:F8:51:D6:17:C4
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : AD:F7:BE:FA:7C:FF:10:C8:8B:9D:3D:9C:1E:3E:18:6A:
  • B4:67:29:5D:CF:B1:0C:24:CA:85:86:34:EB:DC:82:8A
  • Timestamp : Jan 24 13:05:48.075 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:E9:50:80:BE:D0:0C:8A:15:0C:1E:05:
  • AC:07:C4:67:AB:3F:E7:1E:87:EC:08:38:05:35:D1:E5:
  • FB:CA:3B:D6:6F:02:21:00:99:82:94:40:91:DD:06:CB:
  • 89:00:CE:A3:74:B4:8D:B9:38:0D:26:57:1F:EC:73:45:
  • DA:25:35:44:8D:B6:2D:AF
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 55:81:D4:C2:16:90:36:01:4A:EA:0B:9B:57:3C:53:F0:
  • C0:E4:38:78:70:25:08:17:2F:A3:AA:1D:07:13:D3:0C
  • Timestamp : Jan 24 13:05:48.115 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:F8:7C:7E:D1:C8:4C:1D:10:EE:F2:3C:
  • 75:15:13:12:3E:D3:16:CD:A3:7A:E5:B3:5E:74:1D:62:
  • 5F:C8:5F:C1:84:02:21:00:C4:10:F6:2B:E1:4A:71:23:
  • 54:4D:70:AE:EB:B4:37:12:B4:77:8E:C8:36:B2:65:69:
  • 8D:48:04:A1:EE:D0:E2:C6