SSL check results of sepia.dynpc.net

NEW You can also bulk check multiple servers.

Discover if the mail servers for sepia.dynpc.net can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 29 May 2023 01:01:05 +0000

We can not guarantee a secure connection to the mailservers of sepia.dynpc.net!

Please contact the operator of sepia.dynpc.net and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/sepia.dynpc.net

Servers

Incoming Mails

These servers are responsible for incoming mails to @sepia.dynpc.net addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
sepia.dynpc.net
2003:e0:9fff:16b8:e228:6dff:fe67:93ca
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
sepia.dynpc.net
87.154.124.207
10
supported
Win10
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
12 s

Outgoing Mails

We have not received any emails from a @sepia.dynpc.net address so far. Test mail delivery

Certificates

First seen at:

C=US,CN=Win10

Certificate chain
  • Win10 (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • Win10
Country (C)
  • US
Issuer

Certificate is self-signed.

validity period
Not valid before
2019-08-15
Not valid after
2024-08-13
Fingerprints
SHA256
73:56:48:EE:AD:52:64:D6:8A:08:95:82:B8:0E:97:1F:FB:8B:90:C1:65:CF:2E:8A:3E:EA:FE:2C:83:C5:F4:5B
SHA1
0B:0C:27:E0:D2:73:9A:6B:89:A0:44:C8:EF:36:AF:C8:13:45:2D:59
X509v3 extensions
1_3_6_1_4_1_10311_1_2_325
  • 1.