SSL check results of sam-purnam.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for sam-purnam.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 22 Jun 2025 00:30:42 +0000

The mailservers of sam-purnam.net can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @sam-purnam.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
armvps.sam-purnam.net
2603:c021:4005:9c00::7777
1
supported
*.sam-purnam.net
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
8 s
armvps.sam-purnam.net
155.248.254.18
1
supported
*.sam-purnam.net
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
5 s

Outgoing Mails

We have not received any emails from a @sam-purnam.net address so far. Test mail delivery

Certificates

First seen at:

CN=*.sam-purnam.net

Certificate chain
  • *.sam-purnam.net
    • remaining
    • 256 bit
    • ecdsa-with-SHA384

      • E5
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • *.sam-purnam.net
Alternative Names
  • *.sam-purnam.net
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E5
validity period
Not valid before
2025-06-17
Not valid after
2025-09-15
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
F9:5D:18:8D:BB:6C:08:BB:3B:4B:2C:7D:30:41:65:01:67:3B:A9:11:A3:5F:23:59:A3:B0:E1:41:76:76:45:8B
SHA1
30:B1:3D:C0:59:F3:5B:7B:13:D9:18:C0:AC:46:9D:ED:D8:B6:A7:4F
X509v3 extensions
subjectKeyIdentifier
  • 3C:AB:A8:7A:96:DE:D5:CF:AF:87:5D:09:1E:18:5A:7F:50:11:EB:7C
authorityKeyIdentifier
  • keyid:9F:2B:5F:CF:3C:21:4F:9D:04:B7:ED:2B:2C:C4:C6:70:8B:D2:D7:0D
authorityInfoAccess
  • CA Issuers - URI:http://e5.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://e5.c.lencr.org/113.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : ED:3C:4B:D6:E8:06:C2:A4:A2:00:57:DB:CB:24:E2:38:
  • 01:DF:51:2F:ED:C4:86:C5:70:0F:20:DD:B7:3E:3F:E0
  • Timestamp : Jun 17 14:48:11.047 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:D8:A3:DA:B4:86:0B:F2:EB:4C:79:6D:
  • FE:CC:65:32:21:4C:2C:06:E3:F8:9F:9C:29:51:F7:9A:
  • D4:48:6E:1F:03:02:21:00:84:F3:D8:46:9B:95:7C:E8:
  • B9:B4:F2:0B:D4:DC:B9:FC:8E:8E:26:EC:A6:5D:50:49:
  • 59:61:AA:4A:7C:A0:61:FC
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Jun 17 14:48:11.061 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:44:83:5F:30:54:8E:07:95:D4:90:56:EF:
  • EA:F4:64:3D:07:A5:53:DC:62:91:D3:01:0F:4D:26:01:
  • 53:48:AB:AF:02:20:1E:B0:D2:89:14:C6:00:21:7D:B7:
  • 36:AA:96:D6:A7:91:EA:18:AD:97:F1:02:67:6E:87:FF:
  • FB:23:45:3C:0E:68

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.armvps.sam-purnam.net
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid
_25._tcp.armvps.sam-purnam.net
  • DANE-TA: Trust Anchor Assertion
  • Use full certificate
  • SHA-256 Hash
valid
valid