SSL check results of muehlberger.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for muehlberger.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 17 Jan 2026 21:20:21 +0000

The mailservers of muehlberger.net can be reached through an encrypted connection.

However, we found problems that may affect the security.

Servers

Incoming Mails

These servers are responsible for incoming mails to @muehlberger.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
smtp3.muehlberger.net
78.46.205.72
10
supported
smtp3.muehlberger.net
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
5 s
backup-mx.muehlberger.net
159.48.39.155
50
supported
smtp3.muehlberger.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
5 s

Outgoing Mails

We have not received any emails from a @muehlberger.net address so far. Test mail delivery

Certificates

First seen at:

CN=smtp3.muehlberger.net

Certificate chain
  • smtp3.muehlberger.net
    • remaining
    • 256 bit
    • ecdsa-with-SHA384

      • E7
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • smtp3.muehlberger.net
Alternative Names
  • autoconfig.muehlberger.net
  • autoconfig.smtp3.muehlberger.net
  • autodiscover.muehlberger.net
  • autodiscover.smtp3.muehlberger.net
  • imap.muehlberger.net
  • mail.muehlberger.net
  • smtp.muehlberger.net
  • smtp3.muehlberger.net
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E7
validity period
Not valid before
2026-01-11
Not valid after
2026-04-11
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
00:41:2E:A9:26:FA:AB:B2:3C:77:E0:5B:57:36:33:74:1E:58:A4:54:C3:9C:9D:BB:7B:1F:9B:D7:C9:85:F5:61
SHA1
89:A1:0D:F5:FC:6C:A6:AD:65:A4:6D:AB:3C:43:85:75:37:C1:DE:84
X509v3 extensions
subjectKeyIdentifier
  • 8D:2B:8C:35:B4:4E:FB:70:A4:C1:C0:35:6F:FE:47:EF:29:58:9F:8C
authorityKeyIdentifier
  • keyid:AE:48:9E:DC:87:1D:44:A0:6F:DA:A2:E5:60:74:04:78:C2:9C:00:80
authorityInfoAccess
  • CA Issuers - URI:http://e7.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://e7.c.lencr.org/77.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
  • 4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
  • Timestamp : Jan 12 00:26:27.050 2026 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:19:95:48:14:E8:4D:7A:3C:55:C4:EB:05:
  • B1:F2:06:E5:A0:97:43:03:68:75:83:0A:83:9D:45:40:
  • B3:C6:01:B4:02:21:00:FE:49:24:23:4D:25:75:1B:74:
  • 99:06:CB:32:4F:32:6B:0A:C2:F2:16:4A:FA:86:0A:F5:
  • B4:C2:EE:7E:F5:C0:69
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 16:83:2D:AB:F0:A9:25:0F:0F:F0:3A:A5:45:FF:C8:BF:
  • C8:23:D0:87:4B:F6:04:29:27:F8:E7:1F:33:13:F5:FA
  • Timestamp : Jan 12 00:26:29.126 2026 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:1C:70:F4:43:82:79:78:CB:B3:E6:B5:82:
  • 60:E0:07:13:B8:C7:12:9C:DF:AE:80:A7:38:02:65:30:
  • 30:81:FC:BA:02:21:00:B6:59:51:68:30:A5:59:F7:25:
  • 73:24:FC:2A:60:5B:D0:91:AB:CD:0B:73:5F:0E:95:9F:
  • A8:30:17:FF:96:2D:8D

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.smtp3.muehlberger.net
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.smtp3.muehlberger.net
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.smtp3.muehlberger.net
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.smtp3.muehlberger.net
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.smtp3.muehlberger.net
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.smtp3.muehlberger.net
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.smtp3.muehlberger.net
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.smtp3.muehlberger.net
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
valid
_25._tcp.smtp3.muehlberger.net
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.smtp3.muehlberger.net
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid