SSL check results of unionflag.it

NEW You can also bulk check multiple servers.

Discover if the mail servers for unionflag.it can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 06 Dec 2018 15:59:47 +0000

We can not guarantee a secure connection to the mailservers of unionflag.it!

Please contact the operator of unionflag.it and ask him or her to solve this problem. This result stays accessible under the following address:

https://ssl-tools.net/mailservers/unionflag.it

Servers

Incoming Mails

These servers are responsible for incoming mails to @unionflag.it addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
unionflag-it.mail.protection.outlook.com
104.47.10.36
0
supported
mail.protection.outlook.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s
unionflag-it.mail.protection.outlook.com
104.47.8.36
0
supported
mail.protection.outlook.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s
mbox.unionflag.it
94.81.172.42
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
webmail.unionflag.it
93.50.81.39
Results incomplete
20 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
mail.unionflag.it
213.255.69.211
Results incomplete
30 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
purplehat.split.it
212.77.68.6
Results incomplete
40
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @unionflag.it address so far. Test mail delivery

Certificates

First seen at:

CN=mail.protection.outlook.com,O=Microsoft Corporation,L=Redmond,ST=Washington,C=US

Certificate chain
Subject
Country (C)
  • US
State (ST)
  • Washington
Locality (L)
  • Redmond
Organization (O)
  • Microsoft Corporation
Common Name (CN)
  • mail.protection.outlook.com
Alternative Names
  • mail.protection.outlook.com
  • *.mail.eo.outlook.com
  • *.mail.protection.outlook.com
  • mail.messaging.microsoft.com
  • outlook.com
  • *.olc.protection.outlook.com
  • *.pamx1.hotmail.com
Issuer
Country (C)
  • BE
Organization (O)
  • GlobalSign nv-sa
Common Name (CN)
  • GlobalSign Organization Validation CA - SHA256 - G3
validity period
Not valid before
2018-05-18
Not valid after
2020-05-18
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
65:5F:99:7E:80:D2:32:18:1C:03:78:7C:25:A3:71:FF:48:FA:90:7C:6F:FB:07:60:BD:DB:ED:2E:7E:B3:84:22
SHA1
73:B8:97:50:FA:40:6F:7D:4F:7E:43:A9:35:5A:9D:27:10:79:E9:38
X509v3 extensions
authorityInfoAccess
  • CA Issuers - URI:http://secure.globalsign.com/cacert/gsorganizationvalsha2g3.crt
  • OCSP - URI:http://ocsp2.globalsign.com/gsorganizationvalsha2g3
certificatePolicies
  • Policy: 1.3.6.1.4.1.4146.1.20
  • CPS: https://www.globalsign.com/repository/
  • Policy: 2.23.140.1.2.2
crlDistributionPoints
  • Full Name:
  • URI:http://crl.globalsign.com/gsorganizationvalsha2g3.crl
subjectKeyIdentifier
  • F1:E6:6F:79:BB:F4:D1:97:E7:72:08:D4:83:45:F6:C6:33:14:88:00
authorityKeyIdentifier
  • keyid:68:86:B8:7D:7A:D9:6D:49:6B:87:2F:18:8B:15:34:6C:D7:B4:7A:0E
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 87:75:BF:E7:59:7C:F8:8C:43:99:5F:BD:F3:6E:FF:56:
  • 8D:47:56:36:FF:4A:B5:60:C1:B4:EA:FF:5E:A0:83:0F
  • Timestamp : May 18 22:07:02.663 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:36:13:78:9D:44:07:BC:92:52:CC:84:7F:
  • 32:FE:47:82:4D:2A:A0:D7:53:43:F7:2D:06:4D:D9:C0:
  • 73:C2:FD:CA:02:21:00:CD:10:69:BF:F3:DD:03:C6:22:
  • 18:D9:55:5D:1A:E5:FE:F9:62:71:CB:42:7F:A9:E5:20:
  • AF:05:38:C3:07:DD:7C
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 55:81:D4:C2:16:90:36:01:4A:EA:0B:9B:57:3C:53:F0:
  • C0:E4:38:78:70:25:08:17:2F:A3:AA:1D:07:13:D3:0C
  • Timestamp : May 18 22:07:02.705 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:88:19:7B:B6:CE:89:79:06:C2:CE:01:
  • 58:42:FF:0B:4E:6F:F4:A9:72:D6:50:17:0F:3C:F5:9E:
  • F4:04:FD:73:EB:02:20:56:F8:0D:8D:D3:05:45:E0:01:
  • 78:61:F4:8A:3F:9F:9D:ED:7D:25:4E:A7:23:5F:22:9C:
  • 02:EA:5C:40:E1:71:EB
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : BB:D9:DF:BC:1F:8A:71:B5:93:94:23:97:AA:92:7B:47:
  • 38:57:95:0A:AB:52:E8:1A:90:96:64:36:8E:1E:D1:85
  • Timestamp : May 18 22:07:02.966 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:B6:EC:60:68:E5:E0:DD:B5:DE:87:E7:
  • 68:DE:93:36:65:F9:D5:65:E0:DF:04:78:BF:4B:F5:8E:
  • 9E:FE:54:0E:44:02:21:00:82:0A:C2:77:4F:59:45:4C:
  • E6:16:D2:47:AC:21:EA:3A:FD:15:E3:B7:64:6B:9F:1A:
  • 6B:52:23:E1:A6:3D:EF:6E