SSL check results of paulfr.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for paulfr.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 20 Jul 2024 15:24:49 +0000

The mailservers of paulfr.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @paulfr.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.paulfr.de
2a00:6800:3:c79::1
10
supported
paulfr.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
6 s
mail.paulfr.de
195.90.210.166
10
supported
paulfr.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @paulfr.de address so far. Test mail delivery

Certificates

First seen at:

CN=paulfr.de

Certificate chain
  • paulfr.de
    • remaining
    • 384 bit
    • ecdsa-with-SHA384

      • E6
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • paulfr.de
Alternative Names
  • *.paulfr.de
  • paulfr.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E6
validity period
Not valid before
2024-07-12
Not valid after
2024-10-10
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
07:21:29:47:CC:90:F1:2F:E5:4E:98:F3:43:79:AD:78:B4:7B:95:8F:F5:D6:1A:58:09:4F:1B:6E:67:4F:7D:67
SHA1
C6:A8:78:9E:27:73:3A:97:03:C0:FE:E5:FD:2B:D0:17:2C:A3:D7:B2
X509v3 extensions
subjectKeyIdentifier
  • 1E:99:FF:8D:CE:F6:0B:74:D6:1A:96:5C:90:DC:0A:B5:D7:03:A8:0F
authorityKeyIdentifier
  • keyid:93:27:46:98:03:A9:51:68:8E:98:D6:C4:42:48:DB:23:BF:58:94:D2
authorityInfoAccess
  • OCSP - URI:http://e6.o.lencr.org
  • CA Issuers - URI:http://e6.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2:
  • 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B
  • Timestamp : Jul 12 22:07:20.647 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:58:FB:34:1C:13:E9:69:98:46:50:BB:72:
  • 53:DF:3A:C0:0D:EF:A9:CA:C5:20:E5:1D:23:A5:63:20:
  • BC:B5:9D:CA:02:20:5E:A1:57:FD:92:D5:F7:84:F2:D7:
  • 66:03:47:0D:4B:4C:F9:E5:E8:96:D5:7C:8D:CF:17:D8:
  • 40:DD:CA:71:8B:35
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DF:E1:56:EB:AA:05:AF:B5:9C:0F:86:71:8D:A8:C0:32:
  • 4E:AE:56:D9:6E:A7:F5:A5:6A:01:D1:C1:3B:BE:52:5C
  • Timestamp : Jul 12 22:07:20.851 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:EF:99:AE:58:B7:57:1D:51:2C:23:A6:
  • 13:DE:FC:E9:B7:2B:06:83:6C:68:46:B9:51:4C:A7:7B:
  • 07:16:A3:74:17:02:20:46:3A:5A:72:06:6B:16:8A:20:
  • 6B:3B:6A:84:B3:E1:63:0F:89:E6:3B:B1:22:CE:AD:3B:
  • CC:AE:04:4F:4C:56:F3

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.paulfr.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid