SSL check results of supercomputer321.tk

NEW You can also bulk check multiple servers.

Discover if the mail servers for supercomputer321.tk can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 07 Oct 2019 16:31:09 +0000

We can not guarantee a secure connection to the mailservers of supercomputer321.tk!

Please contact the operator of supercomputer321.tk and ask him or her to solve this problem. This result stays accessible under the following address:

https://ssl-tools.net/mailservers/supercomputer321.tk

Servers

Incoming Mails

These servers are responsible for incoming mails to @supercomputer321.tk addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.supercomputer321.tk
216.195.30.231
Results incomplete
1 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
smtp.supercomputer321.tk
35.188.190.106
2
supported
smtp.supercomputer321.tk
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
6 s

Outgoing Mails

We have not received any emails from a @supercomputer321.tk address so far. Test mail delivery

Certificates

First seen at:

CN=smtp.supercomputer321.tk

Certificate chain
Subject
Common Name (CN)
  • smtp.supercomputer321.tk
Alternative Names
  • smtp.supercomputer321.tk
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2019-03-04
Not valid after
2019-06-02
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
D6:08:D2:9D:3B:00:13:F5:E2:0C:F0:19:A8:E7:2C:3C:CD:FE:A9:62:80:DF:4A:F8:CE:B5:A5:9F:8E:39:68:6E
SHA1
A2:F7:CA:E5:44:6F:F7:A8:7B:8A:51:2C:64:74:6E:CF:27:78:67:DB
X509v3 extensions
subjectKeyIdentifier
  • 3E:58:25:1A:FC:6A:8E:65:BF:7C:01:5E:90:3D:9C:F4:84:C3:93:C5
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 63:F2:DB:CD:E8:3B:CC:2C:CF:0B:72:84:27:57:6B:33:
  • A4:8D:61:77:8F:BD:75:A6:38:B1:C7:68:54:4B:D8:8D
  • Timestamp : Mar 4 09:41:10.578 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:63:FB:1E:D4:F1:D6:AD:37:CF:81:D5:76:
  • DF:1A:68:92:CD:FE:50:CD:9F:27:7B:81:41:B7:06:78:
  • C0:E4:5E:D3:02:21:00:D1:A3:BD:9A:E7:86:E7:E7:E7:
  • 16:9E:2A:99:A6:0F:D0:68:3F:64:6E:11:10:12:B0:F2:
  • E9:B0:B4:61:AE:17:F4
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 74:7E:DA:83:31:AD:33:10:91:21:9C:CE:25:4F:42:70:
  • C2:BF:FD:5E:42:20:08:C6:37:35:79:E6:10:7B:CC:56
  • Timestamp : Mar 4 09:41:10.992 2019 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:9A:17:A3:69:04:8C:91:73:D8:FB:33:
  • 8B:37:AB:1C:AA:C6:6A:2E:4D:3C:6D:04:81:F5:B0:9D:
  • 79:EA:FC:F5:D4:02:20:19:9A:CF:31:A7:6C:2E:DB:2A:
  • 50:1F:98:E5:DA:44:08:0C:FD:40:38:1C:56:C5:2A:F3:
  • 54:2D:08:18:18:F2:FC