SSL check results of snorefreezer.com

NEW You can also bulk check multiple servers.

Discover if the mail servers for snorefreezer.com can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 25 May 2020 15:43:31 +0000

error: Couldn't find Certificate with [WHERE (id=E'\\xd46ffd69d3ca47120112e22588bcf2c75631d68e')]

The mailservers of snorefreezer.com can be reached through an encrypted connection.

However, we found problems that may affect the security.

Servers

Incoming Mails

These servers are responsible for incoming mails to @snorefreezer.com addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx.ym.163.com
59.111.176.23
10
supported
*.ym.163.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
28 s
mx.ym.163.com
59.111.176.24
10
supported
*.ym.163.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
29 s
mx.ym.163.com
59.111.176.26
10
supported
*.ym.163.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
27 s
mx.ym.163.com
59.111.176.25
10
supported
*.ym.163.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
25 s

Outgoing Mails

We have not received any emails from a @snorefreezer.com address so far. Test mail delivery

Certificates

First seen at:

CN=*.ym.163.com,OU=Mail Dept.,O=NetEase (Hangzhou) Network Co.\, Ltd,L=Hangzhou,C=CN

Certificate chain
Subject
Country (C)
  • CN
Locality (L)
  • Hangzhou
Organization (O)
  • NetEase (Hangzhou) Network Co., Ltd
Organizational Unit (OU)
  • Mail Dept.
Common Name (CN)
  • *.ym.163.com
Alternative Names
  • *.ym.163.com
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • GeoTrust RSA CA 2018
validity period
Not valid before
2017-12-21
Not valid after
2020-02-19
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
17:21:E9:20:31:23:AB:13:85:1B:F7:6B:B5:0F:CC:CF:D6:47:B2:38:79:D8:F3:58:A4:42:BB:88:AC:A0:0D:31
SHA1
D4:6F:FD:69:D3:CA:47:12:01:12:E2:25:88:BC:F2:C7:56:31:D6:8E
X509v3 extensions
authorityKeyIdentifier
  • keyid:90:58:FF:B0:9C:75:A8:51:54:77:B1:ED:F2:A3:43:16:38:9E:6C:C5
subjectKeyIdentifier
  • 1C:B8:10:76:FF:60:BB:D1:56:ED:89:8A:EF:7F:D9:57:A3:B3:5F:9E
crlDistributionPoints
  • Full Name:
  • URI:http://cdp1.digicert.com/GeoTrustRSACA2018.crl
certificatePolicies
  • Policy: 2.16.840.1.114412.1.1
  • CPS: https://www.digicert.com/CPS
  • Policy: 2.23.140.1.2.2
authorityInfoAccess
  • OCSP - URI:http://ocsp1.digicert.com
  • CA Issuers - URI:http://cacerts.geotrust.com/GeoTrustRSACA2018.crt