SSL check results of mx-in.cablelink.at

NEW You can also bulk check multiple servers.

Discover if the mail servers for mx-in.cablelink.at can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 22 Mar 2021 13:22:11 +0000

The mailservers of mx-in.cablelink.at can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mx-in.cablelink.at addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx-in.cablelink.at
213.153.32.149
-
supported
*.cablelink.at
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
37 s
mx-in.cablelink.at
2a03:c400:11:ffff::149
-
supported
*.cablelink.at
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
38 s

Outgoing Mails

We have not received any emails from a @mx-in.cablelink.at address so far. Test mail delivery

Certificates

First seen at:

CN=*.cablelink.at,O=Salzburg AG für Energie\, Verkehr und Telekommunikation,L=Salzburg,ST=Salzburg,C=AT

Certificate chain
Subject
Country (C)
  • AT
State (ST)
  • Salzburg
Locality (L)
  • Salzburg
Organization (O)
  • Salzburg AG für Energie, Verkehr und Telekommunikation
Common Name (CN)
  • *.cablelink.at
Alternative Names
  • *.cablelink.at
  • cablelink.at
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • GeoTrust RSA CA 2018
validity period
Not valid before
2021-03-15
Not valid after
2022-04-15
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
D7:D2:D7:18:A2:F5:6A:9F:0E:D6:FA:69:93:EE:74:6E:AE:F0:FB:57:B8:71:1E:77:40:80:CA:DE:15:69:C7:04
SHA1
B5:BE:83:53:4D:36:AE:75:78:60:91:27:86:78:0C:46:61:BD:CA:37
X509v3 extensions
authorityKeyIdentifier
  • keyid:90:58:FF:B0:9C:75:A8:51:54:77:B1:ED:F2:A3:43:16:38:9E:6C:C5
subjectKeyIdentifier
  • D1:10:B2:7E:34:27:4B:44:E8:1E:3C:FA:FF:71:29:FC:36:D4:3C:D9
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.geotrust.com/GeoTrustRSACA2018.crl
certificatePolicies
  • Policy: 2.23.140.1.2.2
  • CPS: http://www.digicert.com/CPS
authorityInfoAccess
  • OCSP - URI:http://status.geotrust.com
  • CA Issuers - URI:http://cacerts.geotrust.com/GeoTrustRSACA2018.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 29:79:BE:F0:9E:39:39:21:F0:56:73:9F:63:A5:77:E5:
  • BE:57:7D:9C:60:0A:F8:F9:4D:5D:26:5C:25:5D:C7:84
  • Timestamp : Mar 15 08:25:05.454 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:AB:F8:A3:B1:B3:53:58:0B:F8:A3:4B:
  • 7E:72:B1:A0:97:E7:EC:FF:F6:45:85:0E:3D:4B:63:5A:
  • 4F:5B:91:76:15:02:21:00:B2:03:F5:13:1A:0D:5D:EE:
  • A2:E1:AB:CB:DD:D8:7E:BB:57:D3:00:85:1D:AD:8C:A9:
  • 6F:75:1E:42:F9:48:EC:1F
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 22:45:45:07:59:55:24:56:96:3F:A1:2F:F1:F7:6D:86:
  • E0:23:26:63:AD:C0:4B:7F:5D:C6:83:5C:6E:E2:0F:02
  • Timestamp : Mar 15 08:25:05.466 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:DC:F4:68:1D:C9:C2:59:F5:CE:4D:E2:
  • 68:82:56:DE:EB:C8:34:EF:1F:21:91:78:43:91:71:52:
  • D4:33:F5:BA:7C:02:21:00:8E:C1:81:C8:80:73:F4:30:
  • 29:E1:22:38:23:98:10:11:A4:5C:00:08:33:A5:44:A6:
  • DA:FD:E4:E5:78:2B:67:C5