SSL check results of seimann.at

NEW You can also bulk check multiple servers.

Discover if the mail servers for seimann.at can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 20 Nov 2023 19:10:11 +0000

The mailservers of seimann.at can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @seimann.at addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.seimann.at
2a01:4f8:c013:b61::1
10
supported
mail.seimann.at
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
6 s
mail.seimann.at
168.119.177.153
10
supported
mail.seimann.at
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
5 s

Outgoing Mails

We have not received any emails from a @seimann.at address so far. Test mail delivery

Certificates

First seen at:

CN=mail.seimann.at

Certificate chain
  • mail.seimann.at
    • remaining
    • 384 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail.seimann.at
Alternative Names
  • mail.seimann.at
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2023-11-19
Not valid after
2024-02-17
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
23:A1:57:94:53:09:42:D0:9A:47:49:37:12:6D:57:DA:AB:E2:EE:08:F4:9C:AF:E7:75:C3:09:24:6B:8F:D9:28
SHA1
5E:59:21:5E:BC:A2:09:7E:6D:12:60:7E:87:2A:7D:6D:CB:BB:EF:01
X509v3 extensions
subjectKeyIdentifier
  • 64:81:C2:EA:18:18:27:E6:17:1D:02:F1:A5:30:F0:D7:45:CA:0E:1B
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 3B:53:77:75:3E:2D:B9:80:4E:8B:30:5B:06:FE:40:3B:
  • 67:D8:4F:C3:F4:C7:BD:00:0D:2D:72:6F:E1:FA:D4:17
  • Timestamp : Nov 19 10:53:05.150 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:5E:11:36:F5:C2:CA:B7:9A:DD:A7:43:7E:
  • BC:CB:40:5E:5D:DE:45:0C:23:B1:5F:0B:3D:1F:CE:6D:
  • 86:AC:D7:6B:02:20:6C:11:64:92:19:32:98:B6:FC:F4:
  • 5D:C0:D0:6C:FE:98:0E:5F:08:6A:E5:3C:5E:64:4B:D4:
  • 8E:C5:6D:03:60:B7
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2:
  • 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B
  • Timestamp : Nov 19 10:53:05.166 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:B9:1A:BB:85:81:B4:E5:EF:04:91:D5:
  • 39:38:60:61:F1:97:8F:FF:21:B3:CD:56:57:21:51:17:
  • 21:DF:BB:C5:1F:02:21:00:C6:B1:89:A2:2B:36:2A:DE:
  • 4B:4E:DD:DD:B9:B2:9C:9E:58:4E:DD:9E:8B:63:37:F0:
  • F9:19:76:F1:FE:D4:EB:2B

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.seimann.at
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid