SSL check results of mxfilter01.netic.dk

NEW You can also bulk check multiple servers.

Discover if the mail servers for mxfilter01.netic.dk can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 23 Sep 2024 00:30:36 +0000

The mailservers of mxfilter01.netic.dk can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mxfilter01.netic.dk addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mxfilter01.netic.dk
77.243.50.207
-
supported
*.netic.dk
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mxfilter01.netic.dk
2a03:dc80:0:f136::207
-
supported
*.netic.dk
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @mxfilter01.netic.dk address so far. Test mail delivery

Certificates

First seen at:

CN=*.netic.dk

Certificate chain
Subject
Common Name (CN)
  • *.netic.dk
Alternative Names
  • *.netic.dk
  • netic.dk
Issuer
Country (C)
  • BE
Organization (O)
  • GlobalSign nv-sa
Common Name (CN)
  • GlobalSign GCC R3 DV TLS CA 2020
validity period
Not valid before
2023-10-25
Not valid after
2024-11-25
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
8A:6D:CB:73:4E:26:75:A5:F1:2C:44:9F:60:F1:23:A1:33:9B:51:A0:C7:17:70:C8:50:0D:03:61:B0:8A:10:C8
SHA1
78:44:07:D2:4A:27:06:A4:9F:DE:B1:76:70:67:66:5A:EE:98:98:5B
X509v3 extensions
authorityInfoAccess
  • CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3dvtlsca2020.crt
  • OCSP - URI:http://ocsp.globalsign.com/gsgccr3dvtlsca2020
certificatePolicies
  • Policy: 1.3.6.1.4.1.4146.1.10
  • CPS: https://www.globalsign.com/repository/
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://crl.globalsign.com/gsgccr3dvtlsca2020.crl
authorityKeyIdentifier
  • keyid:0D:98:C0:73:7F:AB:BD:BD:D9:47:4B:49:AD:0A:4A:0C:AC:3E:C7:7C
subjectKeyIdentifier
  • A4:0D:DD:8E:BD:19:49:A0:24:A6:E1:4F:E1:5F:DA:84:C3:EE:CA:CE
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2:
  • 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B
  • Timestamp : Oct 25 11:31:17.197 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:06:18:24:DD:9E:FE:B7:BA:9B:98:8E:C1:
  • 98:E1:7D:69:71:00:B8:03:D2:DF:83:EF:49:B6:8D:98:
  • 45:95:12:27:02:20:29:EB:D4:25:80:C0:8D:49:98:D9:
  • CE:A3:F0:5E:DC:5C:AA:E3:BE:10:40:38:09:87:EA:9A:
  • 00:CD:E8:6A:BE:81
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 48:B0:E3:6B:DA:A6:47:34:0F:E5:6A:02:FA:9D:30:EB:
  • 1C:52:01:CB:56:DD:2C:81:D9:BB:BF:AB:39:D8:84:73
  • Timestamp : Oct 25 11:31:16.444 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:AA:5C:F3:61:07:76:53:BF:81:FF:CE:
  • C8:34:DD:4C:A9:CC:D0:3F:07:67:48:A1:24:76:12:DF:
  • D4:53:51:98:E7:02:20:20:09:52:8F:1C:16:56:23:BC:
  • F4:1B:84:FE:9B:EB:C5:36:B4:34:E5:05:99:33:63:10:
  • 63:A7:5F:A6:80:A4:17
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DA:B6:BF:6B:3F:B5:B6:22:9F:9B:C2:BB:5C:6B:E8:70:
  • 91:71:6C:BB:51:84:85:34:BD:A4:3D:30:48:D7:FB:AB
  • Timestamp : Oct 25 11:31:16.590 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:10:D1:8F:2B:A4:28:87:13:3E:52:BE:6B:
  • 2B:C4:15:76:72:CD:EB:DB:CF:4F:7F:71:D9:AB:A4:29:
  • B4:6E:04:A0:02:20:29:70:C6:DC:38:A1:E1:2A:3E:76:
  • B6:F1:26:9B:BD:DD:73:82:D7:15:1A:01:D5:25:45:66:
  • 67:D5:15:6D:47:42

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mxfilter01.netic.dk
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-512 Hash
valid
valid