SSL check results of rivaben.com.br

NEW You can also bulk check multiple servers.

Discover if the mail servers for rivaben.com.br can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 15 Sep 2021 06:02:34 +0000

We can not guarantee a secure connection to the mailservers of rivaben.com.br!

Please contact the operator of rivaben.com.br and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/rivaben.com.br

Servers

Incoming Mails

These servers are responsible for incoming mails to @rivaben.com.br addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx1.webnow.com.br
2001:19f0::21:215:5dff:fe2d:b322
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
mx1.webnow.com.br
64.237.45.186
10
supported
*.webnow.com.br
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
15 s
mx2.webnow.com.br
2001:19f0::21:3162:a359:af68:87c9
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
mx2.webnow.com.br
216.155.149.153
10
supported
*.webnow.com.br
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
15 s

Outgoing Mails

We have not received any emails from a @rivaben.com.br address so far. Test mail delivery

Certificates

First seen at:

CN=*.webnow.com.br,OU=PositiveSSL Wildcard,OU=Domain Control Validated

Certificate chain
Subject
Organizational Unit (OU)
  • Domain Control Validated
  • PositiveSSL Wildcard
Common Name (CN)
  • *.webnow.com.br
Alternative Names
  • *.webnow.com.br
  • webnow.com.br
Issuer
Country (C)
  • GB
State (ST)
  • Greater Manchester
Locality (L)
  • Salford
Organization (O)
  • COMODO CA Limited
Common Name (CN)
  • COMODO RSA Domain Validation Secure Server CA
validity period
Not valid before
2015-06-01
Not valid after
2018-07-01
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
63:5F:07:63:2B:FD:84:FB:C0:C3:13:B8:2D:29:05:CD:FF:0F:AF:6E:A4:04:CE:AB:FB:B9:E9:9B:BF:89:39:4E
SHA1
2F:11:E4:25:43:0E:CD:40:9B:C0:82:43:1B:AD:69:26:20:2B:C4:39
X509v3 extensions
authorityKeyIdentifier
  • keyid:90:AF:6A:3A:94:5A:0B:D8:90:EA:12:56:73:DF:43:B4:3A:28:DA:E7
subjectKeyIdentifier
  • 5D:F9:10:AD:02:B4:A1:8A:56:B8:4E:CC:DB:50:C3:9A:B9:99:D7:3F
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.7
  • CPS: https://secure.comodo.com/CPS
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl
authorityInfoAccess
  • CA Issuers - URI:http://crt.comodoca.com/COMODORSADomainValidationSecureServerCA.crt
  • OCSP - URI:http://ocsp.comodoca.com