SSL check results of passportindia.gov.in

NEW You can also bulk check multiple servers.

Discover if the mail servers for passportindia.gov.in can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 30 Oct 2024 01:31:53 +0000

We can not guarantee a secure connection to the mailservers of passportindia.gov.in!

Please contact the operator of passportindia.gov.in and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/passportindia.gov.in

Servers

Incoming Mails

These servers are responsible for incoming mails to @passportindia.gov.in addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
dc1pzsmtp.passportindia.gov.in
103.106.106.150
1
supported
DDEI.TREND
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
8 s
dc1pzsmtp.passportindia.gov.in
219.65.120.150
1
supported
DDEI.TREND
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
7 s
dc2pzsmtp.passportindia.gov.in
203.200.247.22
2
supported
DDEI.TREND
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
7 s
dc2pzsmtp.passportindia.gov.in
103.106.106.22
2
supported
DDEI.TREND
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
7 s
dc3pzsmtp.passportindia.gov.in
203.200.254.150
3
supported
DDEI.TREND
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
8 s
dc3pzsmtp.passportindia.gov.in
103.106.107.150
3
supported
DDEI.TREND
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
7 s
dcpzsmtp01.passportindia.gov.in
115.113.92.131
5
supported
webmail4.passportindia.gov.in
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.0
  • SSLv3
10 s
dcpzsmtp01.passportindia.gov.in
111.93.222.131
5
supported
webmail4.passportindia.gov.in
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.0
  • SSLv3
12 s
drpzsmtp01.passportindia.gov.in
121.242.123.131
Results incomplete
10
supported
not checked
DANE
missing
PFS
not checked
Heartbleed
not vulnerable
Weak ciphers
not checked
2 s
drpzsmtp01.passportindia.gov.in
111.93.223.131
Results incomplete
10
supported
not checked
DANE
missing
PFS
not checked
Heartbleed
not vulnerable
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @passportindia.gov.in address so far. Test mail delivery

Certificates

First seen at:

CN=webmail4.passportindia.gov.in,L=New Delhi,ST=New Delhi,OU=Class 3 Certificate,OU=CPV,O=MEA,C=IN

Certificate chain
Subject
Country (C)
  • IN
Organization (O)
  • MEA
Organizational Unit (OU)
  • CPV
  • Class 3 Certificate
State (ST)
  • New Delhi
Locality (L)
  • New Delhi
Common Name (CN)
  • webmail4.passportindia.gov.in
Issuer
Country (C)
  • IN
Organization (O)
  • India PKI
Organizational Unit (OU)
  • TCS CA
Common Name (CN)
  • Tata Consultancy Services Certifying Authority
Locality (L)
  • Hyderabad
Email
  • admin@tcs-ca.tcs.co.in
State (ST)
  • AP
validity period
Not valid before
2010-10-01
Not valid after
2011-10-01
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
E0:B0:14:79:FF:9F:0A:18:98:50:B3:E4:11:24:AA:07:CF:1D:A1:1E:E8:ED:3E:B0:D9:FF:DE:2F:04:0F:10:CC
SHA1
BD:BF:AA:AA:15:62:53:5E:77:31:80:71:52:A6:91:4E:E6:3B:84:4B
X509v3 extensions
subjectKeyIdentifier
  • 2B:68:D0:BB:A6:50:4F:A0:7A:18:17:90:13:F0:FD:23:7F:90:01:4A
authorityKeyIdentifier
  • keyid:49:B9:4A:34:59:2C:24:A1
certificatePolicies
  • Policy: 2.16.356.100.1.3.3.3
  • CPS: http://www.tcs-ca.tcs.co.in/relyingparty.html
crlDistributionPoints
  • Full Name:
  • URI:http://www.tcs-ca.tcs.co.in/crl_2785.crl
  • Full Name:
  • URI:http://www.tcs-ca.tcs.com/crl_2785.crl
First seen at:

CN=DDEI.TREND,OU=DDEI,O=TREND,L=CU,ST=CA

Certificate chain
  • DDEI.TREND (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
State (ST)
  • CA
Locality (L)
  • CU
Organization (O)
  • TREND
Organizational Unit (OU)
  • DDEI
Common Name (CN)
  • DDEI.TREND
Issuer

Certificate is self-signed.

validity period
Not valid before
2020-11-20
Not valid after
2040-11-20
Fingerprints
SHA256
39:79:B9:83:BA:C3:A4:A6:28:76:61:32:0B:5C:44:5D:A9:3E:A1:86:52:D6:B9:64:95:9F:4A:05:A9:F1:3B:A0
SHA1
B2:C9:50:AC:07:FF:E4:C2:B8:44:EE:69:C0:9D:C3:AC:4D:11:99:5F
X509v3 extensions
subjectKeyIdentifier
  • D9:32:13:91:7A:CF:1F:55:C8:30:A7:63:3F:83:CC:86:A4:DE:F3:C5
authorityKeyIdentifier
  • keyid:D9:32:13:91:7A:CF:1F:55:C8:30:A7:63:3F:83:CC:86:A4:DE:F3:C5