SSL check results of smtp.cityweb.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for smtp.cityweb.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 20 Jan 2025 15:01:25 +0000

The mailservers of smtp.cityweb.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @smtp.cityweb.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
smtp.cityweb.de
5.9.41.16
-
supported
mail.cityweb.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
smtp.cityweb.de
2a01:4f8:161:3003::2
-
supported
mail.cityweb.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @smtp.cityweb.de address so far. Test mail delivery

Certificates

First seen at:

CN=mail.cityweb.de

Certificate chain
  • mail.cityweb.de
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R11
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail.cityweb.de
Alternative Names
  • autoconfig.cityweb.de
  • autodiscover.cityweb.de
  • imap.cityweb.de
  • login.cityweb.de
  • mail.cityweb.de
  • mail.ipv4.cityweb.de
  • mail.ipv6.cityweb.de
  • mailmanager.cityweb.de
  • pop3.cityweb.de
  • smtp.cityweb.de
  • webmail.cityweb.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R11
validity period
Not valid before
2025-01-15
Not valid after
2025-04-15
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
34:17:40:ED:65:1A:3F:32:FB:2A:39:7C:E7:A6:DC:C3:47:CE:62:B2:0C:37:6C:AD:7C:65:DE:7F:BC:00:C2:11
SHA1
EE:EF:43:53:D4:4D:D0:D4:21:FF:0B:65:15:47:DA:73:8F:30:51:D3
X509v3 extensions
subjectKeyIdentifier
  • 45:85:21:CB:D3:21:BC:42:41:83:4F:18:D8:BC:1E:DC:18:05:D4:32
authorityKeyIdentifier
  • keyid:C5:CF:46:A4:EA:F4:C3:C0:7A:6C:95:C4:2D:B0:5E:92:2F:26:E3:B9
authorityInfoAccess
  • OCSP - URI:http://r11.o.lencr.org
  • CA Issuers - URI:http://r11.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53:
  • D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7
  • Timestamp : Jan 15 22:25:04.156 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:54:AC:E9:F1:FF:F1:DD:4B:20:F2:F7:37:
  • D0:CA:19:DE:3F:31:BE:48:BC:FA:8F:F2:CE:00:F6:C8:
  • F7:94:C1:71:02:21:00:ED:7A:62:89:99:E5:8B:B3:16:
  • 9A:9B:6B:30:C5:4F:38:72:3A:6D:0B:81:95:D5:86:90:
  • 63:E4:47:27:22:EF:12
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Jan 15 22:25:04.167 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:2D:15:BE:BC:02:B9:B6:5F:91:33:17:5E:
  • 88:92:8A:54:DD:E6:04:17:7E:D3:4F:39:39:9B:CC:BB:
  • 37:D7:63:ED:02:20:4C:F6:CF:FB:E1:F1:01:69:93:22:
  • 69:DB:4F:F5:73:3B:01:0B:16:E1:33:7E:70:38:1D:90:
  • 00:5D:4E:44:D0:4E