SSL check results of syskom.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for syskom.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 24 Sep 2024 00:30:09 +0000

We can not guarantee a secure connection to the mailservers of syskom.de!

Please contact the operator of syskom.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/syskom.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @syskom.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
fs14.syskom.de
2001:8d8:100f:f000::27d
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
fs14.syskom.de
81.201.155.125
10
supported
fs14.syskom.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @syskom.de address so far. Test mail delivery

Certificates

First seen at:

CN=fs14.syskom.de,OU=IT,O=SysKom,L=Chemnitz,ST=Sachsen,C=DE

Certificate chain
  • fs14.syskom.de
    • remaining
    • 2048 bit
    • sha1WithRSAEncryption
    • Unknown Authority

      syskom-FS11-CA-1
Subject
Country (C)
  • DE
State (ST)
  • Sachsen
Locality (L)
  • Chemnitz
Organization (O)
  • SysKom
Organizational Unit (OU)
  • IT
Common Name (CN)
  • fs14.syskom.de
Issuer
Domain Component (DC)
  • de
  • syskom
Common Name (CN)
  • syskom-FS11-CA-1
validity period
Not valid before
2024-03-25
Not valid after
2026-03-25
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
Fingerprints
SHA256
D0:1E:E1:1A:A0:C9:FC:27:25:6D:8D:F5:1A:39:A0:50:BF:CF:17:53:A2:30:B6:BE:3B:5A:6E:AB:D8:93:53:8E
SHA1
9D:2F:67:AA:99:45:2E:FD:3A:23:ED:66:09:E6:6D:CB:85:2F:79:EE
X509v3 extensions
SMIME-CAPS
  • 0i0...*.H.. ......0...*.H.. ......0...`.H.e...*0...`.H.e...-0...`.H.e....0...`.H.e....0...+....0
  • ..*.H.. ..
1_3_6_1_4_1_311_20_2
  • ...W.e.b.S.e.r.v.e.r
subjectKeyIdentifier
  • A3:9D:4D:9A:57:3B:BD:5C:FF:46:F9:2B:4C:BC:EA:21:3A:77:28:0F
authorityKeyIdentifier
  • keyid:9F:00:18:EF:EF:60:43:B8:16:33:E1:79:7B:D7:72:59:BE:18:21:90
crlDistributionPoints
  • Full Name:
  • URI:ldap:///CN=syskom-FS11-CA-1(1),CN=FS11,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=syskom,DC=de?certificateRevocationList?base?objectClass=cRLDistributionPoint
authorityInfoAccess
  • CA Issuers - URI:ldap:///CN=syskom-FS11-CA-1,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=syskom,DC=de?cACertificate?base?objectClass=certificationAuthority