SSL check results of mvi.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for mvi.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 03 Mar 2021 10:55:11 +0000

No connection to the mailservers of mvi.de could be established.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mvi.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.mvi.de
212.18.14.164
Results incomplete
10
supported
mail.mvi.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @mvi.de address so far. Test mail delivery

Certificates

First seen at:

CN=mail.mvi.de

Certificate chain
Subject
Common Name (CN)
  • mail.mvi.de
Alternative Names
  • mail.mvi.de
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • RapidSSL TLS RSA CA G1
validity period
Not valid before
2021-01-06
Not valid after
2022-01-06
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
58:49:18:26:6B:06:6D:15:86:CE:36:0D:D4:8A:CE:2F:6F:80:6B:5D:F4:0D:7E:79:24:84:3B:E2:8E:D9:2F:29
SHA1
D6:5E:BF:86:1C:12:E1:32:C0:C1:AF:E1:97:85:CF:C6:A8:06:40:73
X509v3 extensions
authorityKeyIdentifier
  • keyid:0C:DB:6C:82:49:0F:4A:67:0A:B8:14:EE:7A:C4:48:52:88:EB:56:38
subjectKeyIdentifier
  • 0F:C8:03:CF:B3:E5:8F:17:A7:0F:E9:4A:01:D6:EB:A4:AB:29:A3:1A
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.rapidssl.com/RapidSSLTLSRSACAG1.crl
certificatePolicies
  • Policy: 2.16.840.1.114412.1.2
  • CPS: http://www.digicert.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • OCSP - URI:http://status.rapidssl.com
  • CA Issuers - URI:http://cacerts.rapidssl.com/RapidSSLTLSRSACAG1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 29:79:BE:F0:9E:39:39:21:F0:56:73:9F:63:A5:77:E5:
  • BE:57:7D:9C:60:0A:F8:F9:4D:5D:26:5C:25:5D:C7:84
  • Timestamp : Jan 6 11:57:29.092 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:C1:16:7B:04:AA:42:FA:4E:C9:FE:CE:
  • FF:4C:98:4B:4C:CA:C4:21:8F:A1:2D:78:78:DC:5F:9C:
  • 94:A7:E8:1C:62:02:21:00:85:E4:CD:03:2E:91:69:4D:
  • 76:80:08:9C:3B:32:FA:BB:7F:0D:9D:82:FB:CC:F7:98:
  • BF:A0:5F:4F:3E:AF:88:DE
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 22:45:45:07:59:55:24:56:96:3F:A1:2F:F1:F7:6D:86:
  • E0:23:26:63:AD:C0:4B:7F:5D:C6:83:5C:6E:E2:0F:02
  • Timestamp : Jan 6 11:57:29.167 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:D2:03:36:AD:E4:52:23:B2:D3:20:5F:
  • 60:E6:FD:64:F4:86:8D:E8:99:63:9B:A4:2E:C2:26:E0:
  • 8B:8C:3D:3B:F1:02:21:00:A9:AD:D6:86:C8:01:9D:C6:
  • BB:A1:58:53:1A:4B:62:D2:30:4F:20:18:AA:A9:DA:F9:
  • 62:E4:48:3E:D2:8A:90:17

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.mvi.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid