SSL check results of patrick-oehrle.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for patrick-oehrle.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 25 Mar 2023 19:41:29 +0000

We can not guarantee a secure connection to the mailservers of patrick-oehrle.de!

Please contact the operator of patrick-oehrle.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/patrick-oehrle.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @patrick-oehrle.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
patrick-oehrle.ddns.net
79.203.194.137
5
supported
remote.patrick-oehrle.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.0
  • SSLv3
2 s
mail.patrick-oehrle.de
87.118.120.113
Results incomplete
15
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @patrick-oehrle.de address so far. Test mail delivery

Certificates

First seen at:

CN=remote.patrick-oehrle.de

Certificate chain
  • remote.patrick-oehrle.de
    • remaining
    • 2048 bit
    • sha1WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

      oehrle-W2K11SBS-CA
Subject
Common Name (CN)
  • remote.patrick-oehrle.de
Alternative Names
  • patrick-oehrle.de
  • remote.patrick-oehrle.de
  • W2K11SBS.oehrle.local
Issuer
Common Name (CN)
  • oehrle-W2K11SBS-CA
validity period
Not valid before
2023-03-17
Not valid after
2025-03-16
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
Fingerprints
SHA256
52:C4:5C:28:40:20:0B:72:A8:D3:20:86:D7:68:D9:80:E1:F0:A1:26:C4:29:79:F8:36:AD:48:52:2E:13:CC:D2
SHA1
DB:2A:8B:94:11:E6:BA:7E:E5:99:1F:C0:BC:55:2D:39:C6:9A:1E:81
X509v3 extensions
subjectKeyIdentifier
  • 06:7C:B9:9E:E8:2F:CE:09:32:9E:19:C3:39:FC:FF:BA:7C:DB:00:53
authorityKeyIdentifier
  • keyid:4D:83:28:8B:13:D0:8D:0E:B1:93:C6:79:0B:C7:A6:36:FD:7E:3B:70
crlDistributionPoints
  • Full Name:
  • URI:ldap:///CN=oehrle-W2K11SBS-CA(5),CN=W2K11SBS,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=oehrle,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint
authorityInfoAccess
  • CA Issuers - URI:ldap:///CN=oehrle-W2K11SBS-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=oehrle,DC=local?cACertificate?base?objectClass=certificationAuthority
1_3_6_1_4_1_311_20_2
  • ...W.e.b.S.e.r.v.e.r