SSL check results of softwareloft.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for softwareloft.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 25 Sep 2022 22:10:02 +0000

We can not guarantee a secure connection to the mailservers of softwareloft.de!

Please contact the operator of softwareloft.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/softwareloft.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @softwareloft.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.softwareloft.de
213.128.141.212
Results incomplete
5
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mail2.softwareloft.de
213.128.141.209
Results incomplete
7
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mail3.softwareloft.de
213.128.141.215
Results incomplete
9
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mail-in2.iphh.de
2001:868:0:101::5
10
supported
*.iphh.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mail-in2.iphh.de
2001:868:0:100::1a
10
supported
*.iphh.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mail-in2.iphh.de
213.128.129.70
10
supported
*.iphh.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mail-in2.iphh.de
213.128.129.67
10
supported
*.iphh.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mail-in3.iphh.de
213.128.129.67
15
supported
*.iphh.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @softwareloft.de address so far. Test mail delivery

Certificates

First seen at:

CN=*.iphh.net,O=IPHH Internet Port Hamburg GmbH,L=Hamburg,ST=Hamburg,C=DE

Certificate chain
  • *.iphh.net
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch

Subject
Country (C)
  • DE
State (ST)
  • Hamburg
Locality (L)
  • Hamburg
Organization (O)
  • IPHH Internet Port Hamburg GmbH
Common Name (CN)
  • *.iphh.net
Alternative Names
  • *.iphh.net
  • iphh.net
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • Thawte RSA CA 2018
validity period
Not valid before
2022-02-08
Not valid after
2023-02-08
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
EB:17:8B:79:C0:5B:CA:77:18:73:0C:F8:0A:9E:80:96:27:23:E5:BD:38:FE:11:D4:1B:C6:A4:9D:AF:CE:BB:BA
SHA1
C8:34:C2:6C:7D:BE:64:4A:0D:D0:73:B5:91:DE:AD:10:C2:71:DE:8F
X509v3 extensions
authorityKeyIdentifier
  • keyid:A3:C8:5E:65:54:E5:30:78:C1:05:EA:07:0A:6A:59:CC:B9:FE:DE:5A
subjectKeyIdentifier
  • A3:6B:0E:CA:01:11:BA:F4:38:74:85:C7:8A:DC:41:AE:75:C7:EE:6D
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.thawte.com/ThawteRSACA2018.crl
certificatePolicies
  • Policy: 2.23.140.1.2.2
  • CPS: http://www.digicert.com/CPS
authorityInfoAccess
  • OCSP - URI:http://status.thawte.com
  • CA Issuers - URI:http://cacerts.thawte.com/ThawteRSACA2018.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E8:3E:D0:DA:3E:F5:06:35:32:E7:57:28:BC:89:6B:C9:
  • 03:D3:CB:D1:11:6B:EC:EB:69:E1:77:7D:6D:06:BD:6E
  • Timestamp : Feb 8 10:51:09.409 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:91:39:FA:8F:87:18:E0:E8:E0:60:C2:
  • 04:E3:EE:14:6C:7D:E2:BF:14:F5:6C:81:B7:79:4A:28:
  • ED:B9:ED:56:FD:02:21:00:C3:39:58:99:A7:A7:09:8B:
  • 89:F5:62:4D:90:6E:20:91:1F:00:F8:21:D0:50:50:5E:
  • 00:A3:C2:A5:BA:F8:AE:6E
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 35:CF:19:1B:BF:B1:6C:57:BF:0F:AD:4C:6D:42:CB:BB:
  • B6:27:20:26:51:EA:3F:E1:2A:EF:A8:03:C3:3B:D6:4C
  • Timestamp : Feb 8 10:51:09.314 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:FF:A7:04:1D:7A:94:5B:D9:68:54:38:
  • 6F:FC:C4:A4:06:1F:C8:8E:21:36:62:18:53:01:61:A1:
  • 2A:5B:33:47:80:02:21:00:DC:67:5A:6B:D1:36:4C:8B:
  • C6:E9:EB:74:AB:14:91:87:0F:9D:4D:47:C2:C9:DD:16:
  • 41:98:BE:E9:73:2C:8D:6F
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : B3:73:77:07:E1:84:50:F8:63:86:D6:05:A9:DC:11:09:
  • 4A:79:2D:B1:67:0C:0B:87:DC:F0:03:0E:79:36:A5:9A
  • Timestamp : Feb 8 10:51:09.345 2022 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:33:0C:C2:8C:0A:06:BC:74:BF:7D:D8:D3:
  • D2:2D:49:33:7B:7D:99:51:B3:B2:7F:1E:9F:80:DB:22:
  • 6E:3F:C8:36:02:20:0F:07:9C:31:89:64:85:C5:B9:0F:
  • E0:54:D8:47:5D:5B:E8:39:11:BB:9B:CB:8D:7E:C3:64:
  • D4:C2:9F:DE:06:00