SSL check results of standardlife.at

NEW You can also bulk check multiple servers.

Discover if the mail servers for standardlife.at can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 16 Apr 2024 09:15:48 +0000

We can not guarantee a secure connection to the mailservers of standardlife.at!

Please contact the operator of standardlife.at and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/standardlife.at

Servers

Incoming Mails

These servers are responsible for incoming mails to @standardlife.at addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
pluto.standardlife.de
213.206.174.144
10
supported
pluto.standardlife.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
saturn.standardlife.de
213.206.174.145
Results incomplete
20
supported
not checked
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @standardlife.at address so far. Test mail delivery

Certificates

First seen at:

CN=pluto.standardlife.de,O=Standard Life Vers. ZNL Deutschl. Standard Life Int. DAC,L=Frankfurt am Main,ST=Hessen,C=DE

Certificate chain
Subject
Country (C)
  • DE
State (ST)
  • Hessen
Locality (L)
  • Frankfurt am Main
Organization (O)
  • Standard Life Vers. ZNL Deutschl. Standard Life Int. DAC
Common Name (CN)
  • pluto.standardlife.de
Alternative Names
  • pluto.standardlife.de
Issuer
Country (C)
  • DE
Organization (O)
  • Deutsche Telekom Security GmbH
Common Name (CN)
  • Telekom Security ServerID OV Class 2 CA
validity period
Not valid before
2024-01-02
Not valid after
2025-01-06
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Client Authentication
  • TLS Web Server Authentication
Fingerprints
SHA256
3B:7B:F4:30:82:9C:47:74:AB:4E:37:A8:56:E1:41:63:87:E1:3B:FA:10:03:57:4D:A8:49:55:E4:11:4F:7F:8E
SHA1
0E:46:FB:4C:05:29:A5:AF:E5:81:70:4E:79:23:A1:8A:F8:16:BB:EE
X509v3 extensions
authorityKeyIdentifier
  • keyid:1C:05:93:B1:7F:A8:34:30:8C:52:E0:96:40:A0:72:A3:10:5D:E0:FF
subjectKeyIdentifier
  • B4:62:7B:16:6D:59:34:C5:39:91:3D:01:46:93:41:2A:6D:B0:7E:56
certificatePolicies
  • Policy: 2.23.140.1.2.2
  • CPS: http://docs.serverid.telesec.de/cps/serverid.htm
crlDistributionPoints
  • Full Name:
  • URI:http://crl.serverid.telesec.de/rl/Telekom_Security_ServerID_OV_Class_2_CA.crl
authorityInfoAccess
  • OCSP - URI:http://ocsp.serverid.telesec.de/ocspr
  • CA Issuers - URI:http://crt.serverid.telesec.de/crt/Telekom_Security_ServerID_OV_Class_2_CA.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 55:81:D4:C2:16:90:36:01:4A:EA:0B:9B:57:3C:53:F0:
  • C0:E4:38:78:70:25:08:17:2F:A3:AA:1D:07:13:D3:0C
  • Timestamp : Jan 2 08:43:04.429 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:43:07:26:28:83:5D:E2:9B:C7:32:5E:E4:
  • 88:C7:CA:47:4C:28:D8:36:F2:A4:55:4D:93:15:42:C3:
  • 9D:27:61:33:02:20:7B:03:56:B6:B2:EF:05:83:3B:D7:
  • 3B:7F:25:CE:16:A3:FF:A2:86:70:7D:DB:89:2E:90:66:
  • 78:0D:EC:CE:2A:13
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Jan 2 08:43:04.677 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:C4:CF:70:1A:D2:73:0B:08:78:49:6B:
  • 0B:50:10:71:7F:73:A3:A8:3E:94:80:42:77:79:BD:3A:
  • 73:0E:52:1D:C0:02:20:2B:AD:B4:5F:07:7B:98:6B:B2:
  • A9:B9:69:FC:E6:45:16:D4:5A:B3:D4:4C:C2:95:4E:27:
  • 99:76:AA:29:3A:87:3D
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 28:E2:81:38:FD:83:21:45:E9:A9:D6:AA:75:37:6D:83:
  • 77:A8:85:12:B3:C0:7F:72:41:48:21:DC:BD:E9:8C:66
  • Timestamp : Jan 2 08:43:05.278 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:93:B2:C2:B1:86:67:8F:FC:32:FA:83:
  • 72:AF:60:D3:7F:C8:46:8A:86:5F:F8:E0:2D:A0:F8:96:
  • B9:3B:D0:71:D8:02:20:1F:40:F1:BF:86:BC:8A:3B:E1:
  • 11:5A:D1:0A:38:8D:0F:F5:B3:55:E7:C6:B3:6F:5E:12:
  • C0:2B:45:31:D7:9F:75
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CF:11:56:EE:D5:2E:7C:AF:F3:87:5B:D9:69:2E:9B:E9:
  • 1A:71:67:4A:B0:17:EC:AC:01:D2:5B:77:CE:CC:3B:08
  • Timestamp : Jan 2 08:43:04.109 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:58:2F:E1:D6:75:78:13:02:AB:2D:65:4F:
  • 7C:FC:A7:F2:54:75:3C:6B:44:EE:0A:92:A0:D9:79:D7:
  • B3:64:C1:D5:02:20:70:87:E6:7A:2A:07:F1:91:BF:C3:
  • 5A:4B:09:78:3C:FC:EB:51:D7:4A:0E:F4:69:ED:04:AB:
  • BF:45:2E:64:7D:AE
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 4E:75:A3:27:5C:9A:10:C3:38:5B:6C:D4:DF:3F:52:EB:
  • 1D:F0:E0:8E:1B:8D:69:C0:B1:FA:64:B1:62:9A:39:DF
  • Timestamp : Jan 2 08:43:04.161 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:F2:31:70:4F:6F:50:DB:17:B2:E4:6F:
  • 9D:E1:1C:25:09:A0:DB:73:A7:05:CA:0B:A6:EE:1E:F4:
  • 6E:4B:CD:4A:E4:02:20:26:14:78:6B:AC:E8:9C:7D:26:
  • 1F:14:C2:E0:69:CE:78:C2:D6:34:ED:6A:45:37:E6:29:
  • 88:4F:67:60:CA:A1:1D