SSL check results of spotler.email

NEW You can also bulk check multiple servers.

Discover if the mail servers for spotler.email can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 25 May 2020 18:28:24 +0000

The mailservers of spotler.email can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @spotler.email addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
hosting01.spotler.net
2a02:23e8:200::50:201
10
supported
hosting01.spotler.net
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
3 s
hosting01.spotler.net
46.31.50.201
10
supported
hosting01.spotler.net
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
3 s

Outgoing Mails

We have not received any emails from a @spotler.email address so far. Test mail delivery

Certificates

First seen at:

CN=hosting01.spotler.net

Certificate chain
Subject
Common Name (CN)
  • hosting01.spotler.net
Alternative Names
  • hosting01.spotler.net
  • www.hosting01.spotler.net
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-05-18
Not valid after
2020-08-16
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
32:05:80:11:C2:16:46:C6:A0:B1:11:DE:D9:B4:97:F3:5F:91:DB:45:82:E4:96:47:6F:07:4A:7E:32:67:E5:9B
SHA1
ED:37:88:25:A0:36:D8:E7:5D:87:A7:F0:9B:D7:02:23:69:2B:25:85
X509v3 extensions
subjectKeyIdentifier
  • FC:2C:70:18:05:5A:6C:62:C9:1C:58:7B:AB:B2:D0:55:F3:53:15:C9
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E7:12:F2:B0:37:7E:1A:62:FB:8E:C9:0C:61:84:F1:EA:
  • 7B:37:CB:56:1D:11:26:5B:F3:E0:F3:4B:F2:41:54:6E
  • Timestamp : May 18 07:19:31.728 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:56:B9:C9:5B:97:AB:98:37:59:E7:E6:7A:
  • 34:FF:5A:89:29:2A:41:42:43:09:C6:03:A2:C3:D5:4C:
  • A6:B2:C0:B4:02:20:65:22:64:6E:8D:42:7B:76:92:1C:
  • F4:8C:44:BE:52:B7:86:FB:12:E9:E3:2B:75:51:ED:62:
  • 00:2C:86:16:AC:5B
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : B2:1E:05:CC:8B:A2:CD:8A:20:4E:87:66:F9:2B:B9:8A:
  • 25:20:67:6B:DA:FA:70:E7:B2:49:53:2D:EF:8B:90:5E
  • Timestamp : May 18 07:19:31.725 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:AA:DA:EA:09:0A:47:93:55:18:63:FE:
  • EF:59:89:8A:03:6B:07:83:47:37:69:C7:45:B7:97:12:
  • 3E:F9:1F:77:1A:02:20:73:5A:DE:76:0B:88:0A:A2:D5:
  • E2:3A:27:02:3C:BE:61:C2:E4:B3:6D:D0:22:54:A6:FB:
  • 12:82:FF:24:21:FD:F2

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.hosting01.spotler.net
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
valid
_25._tcp.hosting01.spotler.net
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid