SSL check results of teleworm.us

NEW You can also bulk check multiple servers.

Discover if the mail servers for teleworm.us can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 10 Jun 2021 19:12:06 +0000

We can not guarantee a secure connection to the mailservers of teleworm.us!

Please contact the operator of teleworm.us and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/teleworm.us

Servers

Incoming Mails

These servers are responsible for incoming mails to @teleworm.us addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
reject1.heluna.com
54.243.45.224
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
fmg-mail-2.fakemailgenerator.com
23.239.30.63
20
supported
*.fakemailgenerator.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
18 s
fmg-mail-1.fakemailgenerator.com
23.239.30.63
20
supported
*.fakemailgenerator.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
18 s
reject2.heluna.com
52.23.67.158
Results incomplete
40 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s

Outgoing Mails

We have received emails from these servers with @teleworm.us sender addresses. Test mail delivery

Host TLS Version & Cipher
unknown (103.125.189.175)
Insecure - not encrypted!

Certificates

First seen at:

CN=*.fakemailgenerator.com,OU=Domain Control Validated

Certificate chain
Subject
Organizational Unit (OU)
  • Domain Control Validated
Common Name (CN)
  • *.fakemailgenerator.com
Alternative Names
  • *.fakemailgenerator.com
  • fakemailgenerator.com
Issuer
Country (C)
  • BE
Organization (O)
  • GlobalSign nv-sa
Common Name (CN)
  • AlphaSSL CA - SHA256 - G2
validity period
Not valid before
2015-03-30
Not valid after
2018-03-30
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
32:71:1F:E8:F1:F8:6E:DB:0F:57:8C:9F:3A:89:DF:9D:02:2C:95:60:1A:E0:CE:2D:D7:40:C9:B2:CC:97:C7:F3
SHA1
34:EE:A5:76:F4:B9:BA:AA:91:28:7E:F4:22:5F:B1:99:24:C8:EA:71
X509v3 extensions
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • CPS: https://www.globalsign.com/repository/
crlDistributionPoints
  • Full Name:
  • URI:http://crl2.alphassl.com/gs/gsalphasha2g2.crl
authorityInfoAccess
  • CA Issuers - URI:http://secure2.alphassl.com/cacert/gsalphasha2g2r1.crt
  • OCSP - URI:http://ocsp2.globalsign.com/gsalphasha2g2
subjectKeyIdentifier
  • 83:16:76:D1:3E:4D:50:DC:32:8E:40:A7:AC:EE:29:28:F4:29:B4:06
authorityKeyIdentifier
  • keyid:F5:CD:D5:3C:08:50:F9:6A:4F:3A:B7:97:DA:56:83:E6:69:D2:68:F7