SSL check results of sportescort.com

NEW You can also bulk check multiple servers.

Discover if the mail servers for sportescort.com can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 13 Jun 2020 08:42:20 +0000

The mailservers of sportescort.com can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @sportescort.com addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.qusign.net
2001:41d0:701:1100::a26
10
supported
mail.qusign.net
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
10 s
mail.qusign.net
54.37.73.247
10
supported
mail.qusign.net
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
9 s

Outgoing Mails

We have not received any emails from a @sportescort.com address so far. Test mail delivery

Certificates

First seen at:

CN=mail.qusign.net

Certificate chain
Subject
Common Name (CN)
  • mail.qusign.net
Alternative Names
  • imap.qusign.net
  • mail.qusign.net
  • smtp.qusign.net
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-05-16
Not valid after
2020-08-14
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
13:6D:20:2A:3E:88:B1:5D:55:21:F7:77:FA:FF:64:B6:8A:30:88:EB:49:49:5B:17:FD:0E:10:E1:B3:1D:A7:C2
SHA1
04:47:01:23:05:D4:56:AB:5E:65:D4:18:B3:64:50:1D:46:65:93:CD
X509v3 extensions
subjectKeyIdentifier
  • A6:F1:08:D3:1A:66:06:69:3B:57:EB:06:DB:13:0F:67:F8:69:37:B9
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 5E:A7:73:F9:DF:56:C0:E7:B5:36:48:7D:D0:49:E0:32:
  • 7A:91:9A:0C:84:A1:12:12:84:18:75:96:81:71:45:58
  • Timestamp : May 16 21:37:33.153 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:FC:6D:AC:5A:3C:B5:5F:06:BD:2A:D4:
  • DB:4D:AA:AA:1D:E4:D1:FC:E7:83:D9:71:9A:28:FC:F9:
  • CE:EE:C7:82:ED:02:21:00:95:8F:5F:BF:2D:C4:57:90:
  • BE:14:5D:E0:14:1A:A8:12:F3:E6:47:E2:4D:C0:F6:0F:
  • D2:AB:0E:D6:60:5E:DD:76
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 07:B7:5C:1B:E5:7D:68:FF:F1:B0:C6:1D:23:15:C7:BA:
  • E6:57:7C:57:94:B7:6A:EE:BC:61:3A:1A:69:D3:A2:1C
  • Timestamp : May 16 21:37:33.188 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:1F:F9:26:D5:5E:9E:C9:28:FD:3A:A6:28:
  • A2:C6:BA:AE:77:F5:38:D4:AC:01:72:48:F2:97:62:E0:
  • 37:27:E7:66:02:21:00:F4:69:01:7C:C5:89:19:5F:D8:
  • 5F:BE:08:E7:83:EB:83:8A:57:69:18:F6:DF:69:C6:DC:
  • AB:65:A0:DE:17:E0:E6

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.qusign.net
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid