SSL check results of spitalzentrum-biel.ch

NEW You can also bulk check multiple servers.

Discover if the mail servers for spitalzentrum-biel.ch can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 28 May 2020 10:40:08 +0000

We can not guarantee a secure connection to the mailservers of spitalzentrum-biel.ch!

Please contact the operator of spitalzentrum-biel.ch and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/spitalzentrum-biel.ch

Servers

Incoming Mails

These servers are responsible for incoming mails to @spitalzentrum-biel.ch addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail1.szb-chb.ch
62.2.44.187
10
supported
mail1.szb-chb.ch
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s
mail2.szb-chb.ch
62.2.44.188
10
supported
mail2.szb-chb.ch
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s
mail3.szb-chb.ch
212.243.177.139
20
supported
mail1.szb-chb.ch
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s
mail4.szb-chb.ch
212.243.177.140
20
supported
mail2.szb-chb.ch
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s
fallback.ip-plus.net
164.128.36.48
Results incomplete
50
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @spitalzentrum-biel.ch address so far. Test mail delivery

Certificates

First seen at:

emailAddress=msp-platform-operations@spie-ics.ch,CN=mail1.szb-chb.ch,OU=MSP,O=SPIE ICS AG,L=Bern,ST=Bern,C=CH

Certificate chain
  • mail1.szb-chb.ch (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Country (C)
  • CH
State (ST)
  • Bern
Locality (L)
  • Bern
Organization (O)
  • SPIE ICS AG
Organizational Unit (OU)
  • MSP
Common Name (CN)
  • mail1.szb-chb.ch
Email
  • msp-platform-operations@spie-ics.ch
Issuer

Certificate is self-signed.

validity period
Not valid before
2017-03-22
Not valid after
2027-03-20
Fingerprints
SHA256
01:CC:B9:72:0F:00:A5:C0:6C:A8:9C:16:05:9B:DD:FE:23:4E:10:3D:7A:D0:C0:6E:7B:30:B0:0D:AA:73:5B:B0
SHA1
75:40:C8:4A:EB:DD:A2:85:12:83:A1:BA:88:18:A1:FA:CB:99:D5:FD
X509v3 extensions
subjectKeyIdentifier
  • 7D:15:28:B5:73:A7:1A:0F:23:DB:C1:14:7A:FA:89:AF:6F:2F:0B:EB
authorityKeyIdentifier
  • keyid:7D:15:28:B5:73:A7:1A:0F:23:DB:C1:14:7A:FA:89:AF:6F:2F:0B:EB
First seen at:

emailAddress=msp-platform-operations@spie-ics.ch,CN=mail2.szb-chb.ch,OU=MSP,O=SPIE ICS AG,L=Bern,ST=Bern,C=CH

Certificate chain
  • mail2.szb-chb.ch (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Country (C)
  • CH
State (ST)
  • Bern
Locality (L)
  • Bern
Organization (O)
  • SPIE ICS AG
Organizational Unit (OU)
  • MSP
Common Name (CN)
  • mail2.szb-chb.ch
Email
  • msp-platform-operations@spie-ics.ch
Issuer

Certificate is self-signed.

validity period
Not valid before
2017-03-22
Not valid after
2027-03-20
Fingerprints
SHA256
26:A1:14:CC:93:82:8A:04:7B:28:93:02:64:30:EF:B6:09:C6:92:18:34:84:43:D3:66:27:13:30:95:EB:BC:B8
SHA1
CF:DA:27:F8:06:29:AC:F2:5C:3B:02:BE:21:61:F2:BF:B4:04:EC:55
X509v3 extensions
subjectKeyIdentifier
  • FB:B4:37:4B:8E:E5:59:FE:72:87:56:A0:6B:3C:04:F0:0F:B7:DA:BE
authorityKeyIdentifier
  • keyid:FB:B4:37:4B:8E:E5:59:FE:72:87:56:A0:6B:3C:04:F0:0F:B7:DA:BE