SSL check results of spdfraktion-heilbronn.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for spdfraktion-heilbronn.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 04 Aug 2024 00:30:22 +0000

We can not guarantee a secure connection to the mailservers of spdfraktion-heilbronn.de!

Please contact the operator of spdfraktion-heilbronn.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/spdfraktion-heilbronn.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @spdfraktion-heilbronn.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.spdfraktion-heilbronn.de
2001:1b60:3:35:5703::1
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
mail.spdfraktion-heilbronn.de
87.118.86.99
10
supported
riker.unaone.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @spdfraktion-heilbronn.de address so far. Test mail delivery

Certificates

First seen at:

CN=riker.unaone.net

Certificate chain
  • riker.unaone.net
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch

      • R10
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • riker.unaone.net
Alternative Names
  • riker.unaone.net
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R10
validity period
Not valid before
2024-07-16
Not valid after
2024-10-14
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
22:C6:79:E6:EB:FA:15:10:46:8A:0A:A5:08:91:21:36:44:2B:CC:3D:EB:CA:B2:7F:B3:7E:3A:27:66:07:2A:F1
SHA1
F8:FD:CB:1D:D7:BC:80:F8:47:4F:02:F9:FC:AF:96:DC:2A:2E:AA:1E
X509v3 extensions
subjectKeyIdentifier
  • 2A:BA:D6:C0:5E:98:47:01:69:26:B4:1D:00:D4:E7:82:12:00:BC:00
authorityKeyIdentifier
  • keyid:BB:BC:C3:47:A5:E4:BC:A9:C6:C3:A4:72:0C:10:8D:A2:35:E1:C8:E8
authorityInfoAccess
  • OCSP - URI:http://r10.o.lencr.org
  • CA Issuers - URI:http://r10.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 48:B0:E3:6B:DA:A6:47:34:0F:E5:6A:02:FA:9D:30:EB:
  • 1C:52:01:CB:56:DD:2C:81:D9:BB:BF:AB:39:D8:84:73
  • Timestamp : Jul 16 22:01:24.882 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:8F:81:42:40:40:32:B0:C7:5F:67:44:
  • 09:51:6A:79:48:74:28:EE:0F:9B:8E:11:E1:1C:BC:9A:
  • BC:7C:67:D9:04:02:21:00:F9:E8:A8:3A:AC:4A:55:6F:
  • 56:EA:9B:09:E6:82:63:71:6D:97:F1:65:47:EB:46:94:
  • 50:B3:04:E7:67:23:0D:E5
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 3F:17:4B:4F:D7:22:47:58:94:1D:65:1C:84:BE:0D:12:
  • ED:90:37:7F:1F:85:6A:EB:C1:BF:28:85:EC:F8:64:6E
  • Timestamp : Jul 16 22:01:24.884 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:89:3F:2F:5B:69:71:DF:CA:8F:B0:78:
  • 7D:65:F7:B1:2C:69:DF:6A:D7:29:AD:BB:A0:DE:22:D0:
  • 95:B6:3E:0F:39:02:21:00:86:88:D1:59:2D:0E:77:66:
  • CB:F1:0A:BA:23:7E:4E:C3:DD:B1:EE:A8:4F:60:53:98:
  • CA:B7:4B:1D:07:5D:89:5F