SSL check results of nomty.life

NEW You can also bulk check multiple servers.

Discover if the mail servers for nomty.life can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 21 Dec 2024 01:30:31 +0000

The mailservers of nomty.life can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @nomty.life addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mailcluster.loopia.se
2a02:250:0:48::14
10
supported
*.loopia.se
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
14 s
mailcluster.loopia.se
2a02:250:0:48::11
10
supported
*.loopia.se
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
14 s
mailcluster.loopia.se
2a02:250:0:48::12
10
supported
*.loopia.se
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
7 s
mailcluster.loopia.se
2a02:250:0:48::13
10
supported
*.loopia.se
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mailcluster.loopia.se
93.188.3.14
10
supported
*.loopia.se
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mailcluster.loopia.se
93.188.3.11
10
supported
*.loopia.se
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mailcluster.loopia.se
93.188.3.13
10
supported
*.loopia.se
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mailcluster.loopia.se
93.188.3.12
10
supported
*.loopia.se
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mail2.loopia.se
93.188.3.12
20
supported
*.loopia.se
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
7 s
mail2.loopia.se
93.188.3.14
20
supported
*.loopia.se
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
8 s
mail2.loopia.se
93.188.3.11
20
supported
*.loopia.se
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
8 s
mail2.loopia.se
93.188.3.13
20
supported
*.loopia.se
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @nomty.life address so far. Test mail delivery

Certificates

First seen at:

CN=*.loopia.se,O=Loopia Aktiebolag,L=Västerås,C=SE

Certificate chain
Subject
Country (C)
  • SE
Locality (L)
  • Västerås
Organization (O)
  • Loopia Aktiebolag
Common Name (CN)
  • *.loopia.se
Alternative Names
  • *.loopia.se
  • loopia.se
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Common Name (CN)
  • DigiCert Global G2 TLS RSA SHA256 2020 CA1
validity period
Not valid before
2024-10-03
Not valid after
2025-10-16
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
3A:4A:B4:28:46:40:6E:08:55:2C:8F:DE:D7:42:12:79:4D:AB:D9:0D:90:63:BA:E1:36:80:17:51:88:5E:05:BC
SHA1
61:3E:22:86:00:AC:FE:83:6A:C7:95:74:82:E0:B8:EB:49:2C:5A:52
X509v3 extensions
authorityKeyIdentifier
  • keyid:74:85:80:C0:66:C7:DF:37:DE:CF:BD:29:37:AA:03:1D:BE:ED:CD:17
subjectKeyIdentifier
  • 05:1D:13:5B:CD:31:32:D0:B6:48:09:68:82:2F:68:1A:65:FC:30:33
certificatePolicies
  • Policy: 2.23.140.1.2.2
  • CPS: http://www.digicert.com/CPS
crlDistributionPoints
  • Full Name:
  • URI:http://crl3.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crl
  • Full Name:
  • URI:http://crl4.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crl
authorityInfoAccess
  • OCSP - URI:http://ocsp.digicert.com
  • CA Issuers - URI:http://cacerts.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
  • F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
  • Timestamp : Oct 3 11:23:55.593 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:BD:12:3C:86:FE:9A:A0:23:3E:B7:90:
  • 1D:E1:F4:DE:8E:DF:26:B8:A8:DC:6F:DA:86:00:F3:B8:
  • A6:FA:EB:39:99:02:20:7B:09:F6:C0:44:47:D0:6D:2E:
  • 47:15:65:69:85:7E:FD:5E:CB:F2:92:40:9D:69:41:14:
  • BA:9C:6C:C7:F3:EA:3C
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 7D:59:1E:12:E1:78:2A:7B:1C:61:67:7C:5E:FD:F8:D0:
  • 87:5C:14:A0:4E:95:9E:B9:03:2F:D9:0E:8C:2E:79:B8
  • Timestamp : Oct 3 11:23:55.656 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:62:E0:F8:FD:F6:33:6D:78:3D:A4:A8:FF:
  • 3D:3E:66:35:81:C0:A3:D7:1C:3D:36:18:67:C9:2D:27:
  • 97:73:8D:52:02:20:51:E2:A8:DB:CA:BA:E9:DC:96:D6:
  • 6E:33:DC:44:60:FB:B3:F5:64:1B:13:03:78:B4:0E:27:
  • 01:05:32:C2:91:52
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E6:D2:31:63:40:77:8C:C1:10:41:06:D7:71:B9:CE:C1:
  • D2:40:F6:96:84:86:FB:BA:87:32:1D:FD:1E:37:8E:50
  • Timestamp : Oct 3 11:23:55.672 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:AA:42:56:21:DA:40:E9:DB:DF:1A:80:
  • B2:CF:5B:81:14:63:C9:D4:AD:C5:8A:FB:E9:32:7F:19:
  • 43:70:D6:5E:2A:02:20:37:96:A8:D1:15:D0:34:BE:1F:
  • CB:20:0D:C6:05:3E:31:C7:A3:DA:D2:17:40:E1:C5:77:
  • 06:FB:E7:E7:32:40:CC

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail2.loopia.se
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid
_25._tcp.mailcluster.loopia.se
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid