SSL check results of rs-design.at

NEW You can also bulk check multiple servers.

Discover if the mail servers for rs-design.at can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 20 Jul 2025 00:30:19 +0000

The mailservers of rs-design.at can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @rs-design.at addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mailserver.rs-design.at
83.64.203.50
10
supported
mailserver.rs-design.at
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
7 s
smtp-backup1.portunity.de
2a02:a00::2:0:0:54
Results incomplete
20
supported
*.portunity.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
smtp-backup1.portunity.de
217.144.128.54
Results incomplete
20
supported
*.portunity.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
smtp-backup2.portunity.de
2a03:4000:f:5b9::25
Results incomplete
30
supported
*.portunity.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
smtp-backup2.portunity.de
37.120.186.72
Results incomplete
30
supported
*.portunity.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @rs-design.at address so far. Test mail delivery

Certificates

First seen at:

CN=*.portunity.de

Certificate chain
Subject
Common Name (CN)
  • *.portunity.de
Alternative Names
  • *.portunity.de
  • portunity.de
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert, Inc.
Common Name (CN)
  • RapidSSL Global TLS RSA4096 SHA256 2022 CA1
validity period
Not valid before
2025-03-04
Not valid after
2026-04-04
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
EC:85:45:13:97:D4:EA:9C:20:1E:92:38:F0:FB:C5:BF:B0:01:6B:A2:7E:6A:C1:56:41:1F:04:E3:B5:49:19:C2
SHA1
2B:66:A0:D6:C8:78:56:95:7D:A3:68:03:2E:AA:93:6E:0E:02:E4:49
X509v3 extensions
authorityKeyIdentifier
  • keyid:F0:9C:85:FD:A2:9F:7D:8F:C9:68:BB:D5:D4:89:4D:1D:BE:D3:90:FF
subjectKeyIdentifier
  • 6A:A6:B3:D4:29:09:47:18:61:65:A6:3E:98:6D:B2:14:96:4F:F5:F8
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • CPS: http://www.digicert.com/CPS
crlDistributionPoints
  • Full Name:
  • URI:http://crl3.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crl
  • Full Name:
  • URI:http://crl4.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crl
authorityInfoAccess
  • OCSP - URI:http://ocsp.digicert.com
  • CA Issuers - URI:http://cacerts.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:
  • DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21
  • Timestamp : Mar 4 13:15:48.190 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:6A:91:29:D3:D4:97:EB:E9:0D:04:FB:C4:
  • BB:6F:29:8C:CF:24:92:8E:5B:A9:49:73:33:05:45:9F:
  • 1D:4A:38:EE:02:21:00:E1:1B:FE:C6:88:6E:A3:9F:00:
  • 2C:E8:2E:25:2D:6D:16:56:A1:BE:4D:A1:9C:5F:41:8F:
  • 34:6C:E3:69:C8:A6:A0
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
  • 4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
  • Timestamp : Mar 4 13:15:48.094 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:3D:54:4B:9F:B1:37:39:89:09:A9:43:DD:
  • CC:45:56:65:17:6A:B3:90:86:FB:51:FF:CF:6C:85:36:
  • 54:C3:C7:A6:02:20:1B:BB:76:31:71:40:31:A6:93:D7:
  • D7:1D:94:91:FD:FC:98:8A:D1:49:DB:74:B1:98:6F:A1:
  • 06:6D:8A:B3:64:CE
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 49:9C:9B:69:DE:1D:7C:EC:FC:36:DE:CD:87:64:A6:B8:
  • 5B:AF:0A:87:80:19:D1:55:52:FB:E9:EB:29:DD:F8:C3
  • Timestamp : Mar 4 13:15:48.113 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:4F:CB:1E:BE:BA:07:09:B2:C4:3B:09:8D:
  • 4F:F7:41:67:3E:39:48:83:BC:B4:B9:2C:25:0B:EA:DF:
  • C2:44:39:B1:02:20:59:96:BB:C2:47:6B:0C:B2:98:4A:
  • 15:5E:02:6E:87:75:D1:C8:77:FF:61:26:0C:41:E8:E5:
  • 6A:ED:6C:8C:08:DF
First seen at:

CN=mailserver.rs-design.at

Certificate chain
  • mailserver.rs-design.at
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R10
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mailserver.rs-design.at
Alternative Names
  • autoconfig.rs-design.at
  • mailserver.rs-design.at
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R10
validity period
Not valid before
2025-07-19
Not valid after
2025-10-17
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
E5:B6:6C:3E:E2:55:B5:86:C8:9A:F8:5F:EE:B4:B1:F7:11:84:AA:B9:0B:AB:74:39:A4:98:2C:6F:07:26:C0:22
SHA1
F5:28:0A:AD:50:DF:3A:A2:46:AB:31:91:3C:DC:25:2A:80:7F:74:6A
X509v3 extensions
subjectKeyIdentifier
  • A4:64:00:8E:1B:F1:69:46:36:18:FC:4B:7A:84:BB:E6:73:47:9C:DA
authorityKeyIdentifier
  • keyid:BB:BC:C3:47:A5:E4:BC:A9:C6:C3:A4:72:0C:10:8D:A2:35:E1:C8:E8
authorityInfoAccess
  • CA Issuers - URI:http://r10.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://r10.c.lencr.org/73.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Jul 19 10:24:42.366 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:27:CA:BD:8E:0C:09:8B:85:EB:79:81:B4:
  • 6C:16:36:03:83:F0:00:55:A4:92:1C:E0:FB:7C:F0:50:
  • 50:3D:38:B7:02:20:2A:BA:49:79:AA:7D:73:E2:BA:89:
  • 96:04:29:C3:49:6C:54:D2:92:FF:97:78:19:0A:DD:99:
  • 20:64:7F:D2:BE:A0
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DD:DC:CA:34:95:D7:E1:16:05:E7:95:32:FA:C7:9F:F8:
  • 3D:1C:50:DF:DB:00:3A:14:12:76:0A:2C:AC:BB:C8:2A
  • Timestamp : Jul 19 10:24:42.495 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:FD:AC:6B:38:8E:97:40:C0:7A:0C:99:
  • 80:EB:BC:C8:C8:FD:E1:6D:14:9B:FD:7D:1E:0E:CE:35:
  • 60:B8:C9:75:C1:02:20:31:4E:CC:EF:4A:11:C4:D2:A8:
  • DA:4A:C2:7B:1D:9C:C0:B5:C7:4A:53:43:F9:E3:D5:2A:
  • 86:DE:90:6D:93:13:E8