SSL check results of uni-koblenz.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for uni-koblenz.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 25 May 2020 10:08:26 +0000

The mailservers of uni-koblenz.de can be reached through an encrypted connection.

However, we found problems that may affect the security.

Servers

Incoming Mails

These servers are responsible for incoming mails to @uni-koblenz.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
nsmtp.uni-koblenz.de
141.26.64.14
5
supported
nsmtp.uni-koblenz.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
17 s
nsmtp.uni-koblenz.de
141.26.64.8
5
supported
nsmtp.uni-koblenz.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
17 s
nsmtp.uni-koblenz.de
141.26.64.10
5
supported
nsmtp.uni-koblenz.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • ECDHE_RSA_WITH_RC4_128_SHA
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
17 s

Outgoing Mails

We have not received any emails from a @uni-koblenz.de address so far. Test mail delivery

Certificates

First seen at:

CN=nsmtp.uni-koblenz.de

Certificate chain
Subject
Common Name (CN)
  • nsmtp.uni-koblenz.de
Alternative Names
  • nsmtp.uni-koblenz.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2020-03-07
Not valid after
2020-06-05
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
C4:94:25:39:DD:16:23:9D:BF:14:CC:ED:CC:44:59:71:F5:32:73:2D:C6:04:85:B9:A1:07:D8:1F:DB:F8:5C:83
SHA1
57:9A:A1:CF:A9:E0:B0:99:17:C5:C6:AA:19:3B:A9:94:F4:81:59:BF
X509v3 extensions
subjectKeyIdentifier
  • 0B:01:8A:2E:5B:47:87:94:C3:6E:FF:5C:39:52:1F:AE:F8:CF:4A:A0
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 07:B7:5C:1B:E5:7D:68:FF:F1:B0:C6:1D:23:15:C7:BA:
  • E6:57:7C:57:94:B7:6A:EE:BC:61:3A:1A:69:D3:A2:1C
  • Timestamp : Mar 8 00:33:32.302 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:7E:F6:9A:6A:3D:7D:1B:D9:AA:AD:80:6D:
  • F6:D0:1C:8F:97:FE:04:57:92:7A:ED:AE:4A:F1:45:FF:
  • DB:17:1F:B3:02:21:00:99:49:45:77:1C:67:DE:B4:C3:
  • 13:E4:A3:CE:D5:12:39:43:5B:A7:C2:00:32:F0:D6:98:
  • 8B:F5:37:CC:13:52:69
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 6F:53:76:AC:31:F0:31:19:D8:99:00:A4:51:15:FF:77:
  • 15:1C:11:D9:02:C1:00:29:06:8D:B2:08:9A:37:D9:13
  • Timestamp : Mar 8 00:33:32.427 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:51:3E:FA:FC:F4:0B:71:F3:02:C9:81:8A:
  • F4:3E:9F:03:3B:7A:33:8A:55:4D:9D:D1:8E:55:20:07:
  • 2C:FF:BD:B1:02:20:06:84:80:31:1E:EE:C4:0A:E5:6D:
  • C1:F5:2E:9A:5C:CE:04:9E:7B:05:02:9B:43:40:2B:32:
  • F1:2E:6F:D5:69:DE