SSL check results of readitquk.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for readitquk.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 08 Oct 2019 09:04:05 +0000

We can not guarantee a secure connection to the mailservers of readitquk.net!

Please contact the operator of readitquk.net and ask him or her to solve this problem. This result stays accessible under the following address:

https://ssl-tools.net/mailservers/readitquk.net

Servers

Incoming Mails

These servers are responsible for incoming mails to @readitquk.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
reply.techsnals.com
108.168.255.73
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
mail9329.techsnals.com
129.41.222.239
Results incomplete
20 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
mail9348.signaltechnet.com
129.41.222.244
Results incomplete
20 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
us2.mx1.mailhostbox.com
208.91.199.205
100
supported
us2.mx.mailhostbox.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
22 s
us2.mx2.mailhostbox.com
208.91.199.202
100
supported
us2.mx.mailhostbox.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
22 s
us2.mx3.mailhostbox.com
208.91.199.226
100
supported
us2.mx.mailhostbox.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
21 s

Outgoing Mails

We have not received any emails from a @readitquk.net address so far. Test mail delivery

Certificates

First seen at:

CN=us2.mx.mailhostbox.com,OU=PositiveSSL,OU=Domain Control Validated

Certificate chain
Subject
Organizational Unit (OU)
  • Domain Control Validated
  • PositiveSSL
Common Name (CN)
  • us2.mx.mailhostbox.com
Alternative Names
  • us2.mx.mailhostbox.com
  • www.us2.mx.mailhostbox.com
Issuer
Country (C)
  • GB
State (ST)
  • Greater Manchester
Locality (L)
  • Salford
Organization (O)
  • Sectigo Limited
Common Name (CN)
  • Sectigo RSA Domain Validation Secure Server CA
validity period
Not valid before
2019-03-25
Not valid after
2021-04-02
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
AD:9E:2B:B9:95:8A:B8:38:CB:18:AF:68:5A:B0:A6:6F:FF:55:34:D6:A4:6A:E1:79:47:11:06:52:F3:0B:79:E3
SHA1
92:93:3E:50:3A:33:A0:B3:54:D2:A6:73:89:FC:74:41:85:F1:30:00
X509v3 extensions
authorityKeyIdentifier
  • keyid:8D:8C:5E:C4:54:AD:8A:E1:77:E9:9B:F9:9B:05:E1:B8:01:8D:61:E1
subjectKeyIdentifier
  • 06:19:20:90:BC:17:42:93:6C:77:7A:C0:72:B6:18:21:16:B7:BB:BE
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.7
  • CPS: https://sectigo.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • CA Issuers - URI:http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
  • OCSP - URI:http://ocsp.sectigo.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : BB:D9:DF:BC:1F:8A:71:B5:93:94:23:97:AA:92:7B:47:
  • 38:57:95:0A:AB:52:E8:1A:90:96:64:36:8E:1E:D1:85
  • Timestamp : Mar 25 11:00:04.048 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:06:26:DE:20:68:84:7B:CD:FC:34:92:FC:
  • 2F:2E:7B:32:26:CF:35:B3:47:07:98:90:27:A3:7A:D1:
  • 50:F2:DD:30:02:21:00:D0:D6:6F:A3:E4:4B:40:53:FF:
  • BB:4D:33:F9:BC:D6:FC:FD:4B:E6:96:F6:31:A6:63:59:
  • 6F:9C:3C:26:E4:EC:B7
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 44:94:65:2E:B0:EE:CE:AF:C4:40:07:D8:A8:FE:28:C0:
  • DA:E6:82:BE:D8:CB:31:B5:3F:D3:33:96:B5:B6:81:A8
  • Timestamp : Mar 25 11:00:04.138 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:41:16:1A:AD:29:F3:5D:95:98:6A:23:CA:
  • CC:CD:1D:D7:F3:5E:31:4C:BA:EC:64:F1:B9:9A:4F:2C:
  • DE:EC:08:71:02:20:46:29:86:FA:EE:AE:DB:BC:F1:42:
  • D1:32:B6:B4:CD:EE:4F:59:84:16:62:66:07:26:DF:1D:
  • 18:96:4E:DC:A4:02
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5C:DC:43:92:FE:E6:AB:45:44:B1:5E:9A:D4:56:E6:10:
  • 37:FB:D5:FA:47:DC:A1:73:94:B2:5E:E6:F6:C7:0E:CA
  • Timestamp : Mar 25 11:00:04.145 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:A3:ED:CE:BA:82:27:64:F2:33:E9:D9:
  • 5B:EA:BD:2B:9A:11:03:B2:95:C1:5E:B1:EA:0C:52:6B:
  • 84:C1:65:29:5D:02:20:46:F9:AF:A0:4A:D7:EB:ED:E6:
  • 09:FE:B2:66:D4:34:5C:53:A9:D7:33:8F:98:80:9E:7C:
  • 55:60:07:78:D5:53:1F