SSL check results of stadium.com

NEW You can also bulk check multiple servers.

Discover if the mail servers for stadium.com can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 01 Jun 2020 00:30:25 +0000

We can not guarantee a secure connection to the mailservers of stadium.com!

Please contact the operator of stadium.com and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/stadium.com

Servers

Incoming Mails

These servers are responsible for incoming mails to @stadium.com addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
oakmail.stadium.se
82.196.180.140
10
supported
Cisco ESA Certificate
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
13 s
mail2.stadium.se
82.196.180.141
20
supported
Cisco ESA Certificate
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
12 s
stadium-com.mail.protection.outlook.com
104.47.8.36
Results incomplete
30
supported
not checked
DANE
missing
PFS
not checked
Heartbleed
not vulnerable
Weak ciphers
not checked
1 s
stadium-com.mail.protection.outlook.com
104.47.10.36
Results incomplete
30
supported
not checked
DANE
missing
PFS
not checked
Heartbleed
not vulnerable
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @stadium.com address so far. Test mail delivery

Certificates

First seen at:

CN=Cisco ESA Certificate,O=Cisco Systems,L=San Jose,ST=California,C=US

Certificate chain
  • Cisco ESA Certificate (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Country (C)
  • US
State (ST)
  • California
Locality (L)
  • San Jose
Organization (O)
  • Cisco Systems
Common Name (CN)
  • Cisco ESA Certificate
Issuer

Certificate is self-signed.

validity period
Not valid before
2019-06-26
Not valid after
2022-06-25
Fingerprints
SHA256
BE:FD:A1:EB:D2:AF:9E:4C:5D:2B:30:0D:F8:6F:3E:AF:D5:DA:13:F1:F3:62:5A:8B:74:77:38:33:F2:31:1F:51
SHA1
A7:C1:0F:A0:2B:0F:A5:D9:9A:35:4E:55:E3:D5:02:C4:6A:95:FA:CD
First seen at:

CN=Cisco ESA Certificate,O=Cisco Systems,L=San Jose,ST=California,C=US

Certificate chain
  • Cisco ESA Certificate (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Country (C)
  • US
State (ST)
  • California
Locality (L)
  • San Jose
Organization (O)
  • Cisco Systems
Common Name (CN)
  • Cisco ESA Certificate
Issuer

Certificate is self-signed.

validity period
Not valid before
2019-06-28
Not valid after
2022-06-27
Fingerprints
SHA256
97:DA:B5:0F:53:8E:8B:A5:C7:81:1F:B4:20:82:68:5D:EF:BE:75:08:92:45:EE:73:9A:74:80:38:D9:5B:07:DE
SHA1
9C:0F:26:74:B2:1C:03:5B:CA:94:C8:FD:09:E3:63:15:3E:F6:3C:B1