SSL check results of trustsaude.pt

NEW You can also bulk check multiple servers.

Discover if the mail servers for trustsaude.pt can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 03 Aug 2021 10:33:27 +0000

The mailservers of trustsaude.pt can be reached through an encrypted connection.

However, we found problems that may affect the security.

Servers

Incoming Mails

These servers are responsible for incoming mails to @trustsaude.pt addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.trustsaude.pt
88.157.206.75
5
supported
TSAUDESRV01
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s

Outgoing Mails

We have received emails from these servers with @trustsaude.pt sender addresses. Test mail delivery

Host TLS Version & Cipher
unknown (88.157.206.74)
TLSv1.2 AES128-SHA256

Certificates

First seen at:

CN=TSAUDESRV01

Certificate chain
  • TSAUDESRV01 (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha1WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • TSAUDESRV01
Alternative Names
  • TSAUDESRV01
  • TSAUDESRV01.trustsaude.local
Issuer

Certificate is self-signed.

validity period
Not valid before
2020-04-10
Not valid after
2025-04-10
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
Fingerprints
SHA256
90:FD:11:99:A4:6C:3B:78:12:E4:1D:FB:57:93:E1:82:73:F3:1D:2B:4F:33:7B:A3:D0:36:4E:E8:38:B6:EC:2D
SHA1
94:B8:5D:FF:57:E6:41:58:09:8A:BC:E6:EA:B0:CD:FD:A9:65:3B:8E