SSL check results of springerreisen.at

NEW You can also bulk check multiple servers.

Discover if the mail servers for springerreisen.at can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 24 Sep 2024 12:57:32 +0000

The mailservers of springerreisen.at can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @springerreisen.at addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
d327607.a.ess.de.barracudanetworks.com
18.185.115.250
10
supported
*.a.ess.de.barracudanetworks.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
11 s
d327607.a.ess.de.barracudanetworks.com
18.185.115.252
10
supported
*.a.ess.de.barracudanetworks.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
11 s
d327607.a.ess.de.barracudanetworks.com
18.185.115.251
10
supported
*.a.ess.de.barracudanetworks.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
11 s
d327607.b.ess.de.barracudanetworks.com
18.185.115.250
50
supported
*.a.ess.de.barracudanetworks.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
11 s
d327607.b.ess.de.barracudanetworks.com
18.185.115.252
50
supported
*.a.ess.de.barracudanetworks.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
11 s
d327607.b.ess.de.barracudanetworks.com
18.185.115.251
50
supported
*.a.ess.de.barracudanetworks.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
11 s

Outgoing Mails

We have not received any emails from a @springerreisen.at address so far. Test mail delivery

Certificates

First seen at:

CN=*.a.ess.de.barracudanetworks.com,O=Barracuda Networks\, Inc.,L=Campbell,ST=California,C=US

Certificate chain
Subject
Country (C)
  • US
State (ST)
  • California
Locality (L)
  • Campbell
Organization (O)
  • Barracuda Networks, Inc.
Common Name (CN)
  • *.a.ess.de.barracudanetworks.com
Alternative Names
  • *.a.ess.de.barracudanetworks.com
  • *.b.ess.de.barracudanetworks.com
  • *.o.ess.de.barracudanetworks.com
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Common Name (CN)
  • DigiCert Global G2 TLS RSA SHA256 2020 CA1
validity period
Not valid before
2024-09-17
Not valid after
2025-10-03
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
B8:57:58:30:35:3C:CF:02:71:F0:AB:2C:48:F4:6D:18:C5:30:07:FD:50:A9:28:E2:13:B1:42:37:9A:10:C2:24
SHA1
6E:FC:72:22:11:57:D0:74:A4:46:3B:9E:C6:D3:29:7F:E2:26:F4:E7
X509v3 extensions
authorityKeyIdentifier
  • keyid:74:85:80:C0:66:C7:DF:37:DE:CF:BD:29:37:AA:03:1D:BE:ED:CD:17
subjectKeyIdentifier
  • 4B:5A:A8:1C:AD:D7:54:66:EA:BD:B0:71:2D:4F:55:82:B4:83:63:E8
certificatePolicies
  • Policy: 2.23.140.1.2.2
  • CPS: http://www.digicert.com/CPS
crlDistributionPoints
  • Full Name:
  • URI:http://crl3.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crl
  • Full Name:
  • URI:http://crl4.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crl
authorityInfoAccess
  • OCSP - URI:http://ocsp.digicert.com
  • CA Issuers - URI:http://cacerts.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DD:DC:CA:34:95:D7:E1:16:05:E7:95:32:FA:C7:9F:F8:
  • 3D:1C:50:DF:DB:00:3A:14:12:76:0A:2C:AC:BB:C8:2A
  • Timestamp : Sep 17 00:06:57.764 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:7C:2F:C5:73:E4:CD:F2:CA:00:D0:DC:70:
  • CE:31:55:F2:AF:F0:4D:00:BB:CD:BE:48:22:5E:26:84:
  • 0C:0B:A7:9D:02:20:3A:A1:E3:55:FB:96:25:6D:4A:87:
  • 7F:13:4D:B0:61:B6:8F:EA:78:BC:7A:36:24:69:35:A4:
  • A4:FA:03:11:B4:E8
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E6:D2:31:63:40:77:8C:C1:10:41:06:D7:71:B9:CE:C1:
  • D2:40:F6:96:84:86:FB:BA:87:32:1D:FD:1E:37:8E:50
  • Timestamp : Sep 17 00:06:57.724 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:B1:6B:11:2F:64:6A:93:5E:82:19:DC:
  • 42:26:DD:C1:D3:26:00:E5:BD:BC:05:10:C8:64:20:EF:
  • 5C:31:DC:D2:DF:02:20:2D:07:6C:F4:26:55:BF:59:84:
  • 4D:D3:3E:B5:76:ED:4B:CE:1D:55:82:8E:79:69:69:D5:
  • 40:63:D8:40:25:C5:D2
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Sep 17 00:06:57.688 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:66:43:97:A6:CD:8A:9F:31:88:29:72:DC:
  • 3E:DA:59:F9:78:99:34:7E:F5:B6:26:4D:1F:43:F9:6C:
  • C4:5A:04:F0:02:20:70:B1:D1:FA:A6:69:27:96:97:97:
  • 7A:FC:23:50:13:9E:8C:80:EE:92:A1:95:E5:A8:AC:10:
  • 8B:2F:5E:49:CD:82