SSL check results of serviceteam.at

NEW You can also bulk check multiple servers.

Discover if the mail servers for serviceteam.at can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 03 Feb 2021 09:00:02 +0000

We can not guarantee a secure connection to the mailservers of serviceteam.at!

Please contact the operator of serviceteam.at and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/serviceteam.at

Servers

Incoming Mails

These servers are responsible for incoming mails to @serviceteam.at addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
spamfilter.linznet.at
80.66.39.70
Results incomplete
10
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
mail.serviceteam.at
85.193.141.38
100
supported
stmail01.serviceteam.at
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s

Outgoing Mails

We have not received any emails from a @serviceteam.at address so far. Test mail delivery

Certificates

First seen at:

CN=stmail01.serviceteam.at

Certificate chain
  • stmail01.serviceteam.at
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • DST Root CA X3 (Certificate is self-signed.)
            • remaining
            • 2048 bit
            • sha1WithRSAEncryption

Subject
Common Name (CN)
  • stmail01.serviceteam.at
Alternative Names
  • autodiscover.serviceteam.at
  • mail.serviceteam.at
  • stmail01.serviceteam.at
  • sync.serviceteam.at
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2021-02-02
Not valid after
2021-05-03
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
B0:B5:81:C8:C0:D3:4F:CD:79:70:E0:16:4F:FF:D0:84:28:4D:22:80:36:DF:82:DB:D8:64:CA:CB:55:81:78:F6
SHA1
7A:10:0D:29:48:AA:44:30:A5:E9:5E:EC:9F:E3:3E:D3:EE:BC:D8:4E
X509v3 extensions
subjectKeyIdentifier
  • 2D:B7:4D:0E:EE:B7:C2:6E:C3:A1:E3:90:3E:71:B6:98:D1:46:65:78
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 44:94:65:2E:B0:EE:CE:AF:C4:40:07:D8:A8:FE:28:C0:
  • DA:E6:82:BE:D8:CB:31:B5:3F:D3:33:96:B5:B6:81:A8
  • Timestamp : Feb 2 10:43:04.657 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:F6:94:59:33:6F:1B:2E:C7:20:63:18:
  • 26:9C:BA:E8:E2:9A:8A:2A:D2:2D:04:08:B9:9D:56:CD:
  • DB:3B:A6:08:41:02:20:3B:2E:1A:18:C7:9A:9C:99:FF:
  • FD:87:40:62:77:5E:68:99:E0:27:D5:D6:92:A9:B3:03:
  • 5B:A5:63:36:B3:24:FC
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 7D:3E:F2:F8:8F:FF:88:55:68:24:C2:C0:CA:9E:52:89:
  • 79:2B:C5:0E:78:09:7F:2E:6A:97:68:99:7E:22:F0:D7
  • Timestamp : Feb 2 10:43:04.707 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:B7:9B:2D:87:E7:58:6F:70:6F:BD:10:
  • D6:1E:62:C9:13:16:18:D4:74:67:50:25:60:B2:7F:4B:
  • 53:00:61:65:DB:02:21:00:CC:C9:A2:63:5E:11:60:15:
  • AF:23:31:4F:0D:E6:7A:7D:7A:E8:6B:F5:7B:7B:7D:1E:
  • 61:59:AB:8C:CC:46:4F:6A