SSL check results of rolltorklein.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for rolltorklein.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 25 Jul 2025 08:19:42 +0000

We can not guarantee a secure connection to the mailservers of rolltorklein.de!

Please contact the operator of rolltorklein.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/rolltorklein.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @rolltorklein.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.rolltorklein.de
212.122.130.65
10
supported
reddoxx.appliance
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mail2.rolltorklein.de
88.217.141.0
Results incomplete
20 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
backupmx.domain-robot.org
2001:8d8:580:401:217:160:113:166
30
supported
*.domain-robot.org
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
7 s
backupmx.domain-robot.org
217.160.113.166
30
supported
*.domain-robot.org
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
7 s

Outgoing Mails

We have not received any emails from a @rolltorklein.de address so far. Test mail delivery

Certificates

First seen at:

CN=*.domain-robot.org

Certificate chain
Subject
Common Name (CN)
  • *.domain-robot.org
Alternative Names
  • *.domain-robot.org
  • domain-robot.org
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • RapidSSL TLS RSA CA G1
validity period
Not valid before
2024-08-30
Not valid after
2025-09-30
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
5F:BB:54:E4:0F:7C:83:A6:E4:64:C0:94:CA:42:F0:8A:36:48:93:05:02:7F:F5:9E:2D:01:CE:75:6A:5F:F7:C4
SHA1
F1:87:DB:68:47:4A:A5:6C:E0:36:BC:AD:DC:FA:D7:87:CC:60:17:98
X509v3 extensions
authorityKeyIdentifier
  • keyid:0C:DB:6C:82:49:0F:4A:67:0A:B8:14:EE:7A:C4:48:52:88:EB:56:38
subjectKeyIdentifier
  • 65:78:20:92:DE:B9:78:AC:2E:39:AD:5D:43:A5:F6:9D:B8:19:77:21
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • CPS: http://www.digicert.com/CPS
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.rapidssl.com/RapidSSLTLSRSACAG1.crl
authorityInfoAccess
  • OCSP - URI:http://status.rapidssl.com
  • CA Issuers - URI:http://cacerts.rapidssl.com/RapidSSLTLSRSACAG1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
  • F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
  • Timestamp : Aug 30 11:30:32.962 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:50:B3:BC:F9:C3:78:2A:08:8C:A6:A4:23:
  • 47:56:29:A0:92:88:5C:98:9E:F8:E7:6B:85:AD:B4:35:
  • 87:D6:A8:A1:02:20:2F:B5:C2:67:5B:22:A4:3C:0C:F1:
  • 83:D0:27:9E:FB:BD:F7:55:3E:6B:3F:4B:85:29:7B:72:
  • 23:C8:80:AE:F7:9E
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 7D:59:1E:12:E1:78:2A:7B:1C:61:67:7C:5E:FD:F8:D0:
  • 87:5C:14:A0:4E:95:9E:B9:03:2F:D9:0E:8C:2E:79:B8
  • Timestamp : Aug 30 11:30:32.817 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:0D:6C:9F:82:A6:54:38:A7:45:F6:3B:44:
  • 8C:2E:AE:63:32:E9:2C:D6:10:4A:8D:BC:CA:08:C0:52:
  • 78:46:76:C0:02:20:76:C8:DF:4E:D6:0F:5F:30:CC:D8:
  • 5D:47:42:BA:30:F0:28:35:4B:A1:E4:72:5B:14:C4:1A:
  • 06:33:3C:E1:87:EC
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E6:D2:31:63:40:77:8C:C1:10:41:06:D7:71:B9:CE:C1:
  • D2:40:F6:96:84:86:FB:BA:87:32:1D:FD:1E:37:8E:50
  • Timestamp : Aug 30 11:30:32.843 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:5C:27:BC:D3:86:4A:F8:27:37:0F:1B:76:
  • 9F:C4:72:B9:29:93:FE:79:1B:B1:46:C4:07:91:C2:99:
  • 6F:60:EC:73:02:20:11:11:B5:2A:43:EC:55:97:F8:32:
  • E8:C4:A9:C1:42:31:BC:6A:04:9E:49:94:F5:D5:36:8F:
  • 61:8F:19:0D:20:94
First seen at:

CN=reddoxx.appliance

Certificate chain
  • reddoxx.appliance (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • reddoxx.appliance
Alternative Names
  • reddoxx.appliance
Issuer

Certificate is self-signed.

validity period
Not valid before
2023-06-01
Not valid after
2033-05-29
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
Fingerprints
SHA256
47:AB:C4:EF:85:15:AE:7C:A7:B3:27:2A:28:82:9F:3F:2E:4E:C2:A6:A2:82:C5:9F:B0:9B:3F:E5:A3:50:52:33
SHA1
70:2E:D3:44:7C:15:67:DE:55:9A:CC:E6:E5:66:0C:30:E0:B2:74:36
X509v3 extensions
subjectKeyIdentifier
  • 9B:FD:65:6C:0C:F7:A1:47:5A:8A:19:DF:6B:89:94:E4:73:8E:76:93