SSL check results of teaq.org

NEW You can also bulk check multiple servers.

Discover if the mail servers for teaq.org can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 21 Nov 2025 01:31:21 +0000

The mailservers of teaq.org can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @teaq.org addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
sate.teaq.org
2a01:4f8:192:135b::1
10
supported
sate.teaq.org
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
sate.teaq.org
144.76.86.84
10
supported
sate.teaq.org
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @teaq.org address so far. Test mail delivery

Certificates

First seen at:

CN=sate.teaq.org

Certificate chain
  • sate.teaq.org
    • remaining
    • 384 bit
    • ecdsa-with-SHA384

      • E7
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • sate.teaq.org
Alternative Names
  • sate.teaq.org
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E7
validity period
Not valid before
2025-11-17
Not valid after
2026-02-15
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
67:1A:6C:99:01:19:8A:CD:7F:7F:BC:AB:8E:BB:EE:99:CE:70:77:74:F8:9B:F2:39:9F:E4:5B:8E:04:A5:7D:45
SHA1
31:37:40:42:AA:98:03:7E:CD:86:17:A1:C0:D8:16:8F:00:CF:FA:15
X509v3 extensions
subjectKeyIdentifier
  • E5:9F:72:BA:52:48:21:D3:09:72:12:6E:92:F3:2D:76:D9:16:83:EC
authorityKeyIdentifier
  • keyid:AE:48:9E:DC:87:1D:44:A0:6F:DA:A2:E5:60:74:04:78:C2:9C:00:80
authorityInfoAccess
  • CA Issuers - URI:http://e7.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://e7.c.lencr.org/94.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 19:86:D4:C7:28:AA:6F:FE:BA:03:6F:78:2A:4D:01:91:
  • AA:CE:2D:72:31:0F:AE:CE:5D:70:41:2D:25:4C:C7:D4
  • Timestamp : Nov 17 21:11:10.838 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:7C:DD:E9:D6:91:86:26:DC:9F:A9:2D:25:
  • 21:72:3F:3B:A0:B3:18:5A:2E:C2:DA:49:EC:A8:F8:0D:
  • 97:E2:D5:79:02:21:00:C1:1C:95:01:A3:FB:E2:C6:C2:
  • AE:1E:5E:D9:F7:0A:E0:48:AB:F6:07:BA:62:9D:CD:36:
  • C3:C4:5F:B6:BA:29:25
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CB:38:F7:15:89:7C:84:A1:44:5F:5B:C1:DD:FB:C9:6E:
  • F2:9A:59:CD:47:0A:69:05:85:B0:CB:14:C3:14:58:E7
  • Timestamp : Nov 17 21:11:10.853 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:6E:1A:3B:3F:1A:45:C0:01:41:4C:6D:67:
  • 76:44:38:30:A7:2D:3F:F4:FF:94:AE:7B:4F:D8:5C:07:
  • 4E:5F:52:03:02:21:00:8A:39:C2:24:1C:97:83:3F:AF:
  • F3:A6:E4:C6:A4:F7:E8:D6:D2:14:4C:69:44:74:4C:2A:
  • 4F:60:75:B6:D7:4D:03

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.sate.teaq.org
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid