SSL check results of waldorf.edge-mail.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for waldorf.edge-mail.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 06 Dec 2018 19:11:22 +0000

The mailservers of waldorf.edge-mail.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @waldorf.edge-mail.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
waldorf.edge-mail.de
91.228.53.206
-
supported
edge-mail.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
4 s

Outgoing Mails

We have not received any emails from a @waldorf.edge-mail.de address so far. Test mail delivery

Certificates

First seen at:

CN=edge-mail.de

Certificate chain
Subject
Common Name (CN)
  • edge-mail.de
Alternative Names
  • autoconfig.edge-mail.de
  • autodiscover.edge-mail.de
  • dudle.edge-mail.de
  • edge-mail.de
  • help.edge-mail.de
  • horde7.edge-mail.de
  • lists.edge-mail.de
  • mail.edge-mail.de
  • mta-sts.edge-mail.de
  • sks.edge-mail.de
  • statler.edge-mail.de
  • statler.findst.net
  • support.edge-mail.de
  • tickets.edge-mail.de
  • waldorf.edge-mail.de
  • www.edge-mail.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • Let's Encrypt Authority X3
validity period
Not valid before
2018-09-30
Not valid after
2018-12-29
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
82:74:72:1F:DB:8E:A6:17:26:FD:19:97:DC:73:A1:D3:89:2F:0D:D9:9C:02:A1:41:F6:C0:C5:B7:E0:20:AF:1F
SHA1
F9:9C:44:38:8B:B3:92:81:9A:73:DE:09:94:4B:90:EA:54:31:DB:A1
X509v3 extensions
subjectKeyIdentifier
  • 7B:91:CD:00:16:DF:33:0A:A4:9D:0E:CB:F3:A2:E3:0B:80:5A:AA:10
authorityKeyIdentifier
  • keyid:A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1
authorityInfoAccess
  • OCSP - URI:http://ocsp.int-x3.letsencrypt.org
  • CA Issuers - URI:http://cert.int-x3.letsencrypt.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.44947.1.1.1
  • CPS: http://cps.letsencrypt.org
  • User Notice:
  • Explicit Text: This Certificate may only be relied upon by Relying Parties and only in accordance with the Certificate Policy found at https://letsencrypt.org/repository/
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : C1:16:4A:E0:A7:72:D2:D4:39:2D:C8:0A:C1:07:70:D4:
  • F0:C4:9B:DE:99:1A:48:40:C1:FA:07:51:64:F6:33:60
  • Timestamp : Sep 30 15:10:23.256 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:2D:A6:63:C1:62:C1:0E:EB:96:7D:86:BA:
  • 0C:EF:C2:EE:D2:B8:4D:5F:7D:D1:60:40:2D:D7:C5:B2:
  • 2D:99:7D:3B:02:21:00:B0:12:DA:BD:39:5D:9F:9F:81:
  • A2:82:EC:09:D9:FB:35:81:1B:FA:27:58:57:24:FE:77:
  • 31:26:47:F8:61:FC:AD
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 29:3C:51:96:54:C8:39:65:BA:AA:50:FC:58:07:D4:B7:
  • 6F:BF:58:7A:29:72:DC:A4:C3:0C:F4:E5:45:47:F4:78
  • Timestamp : Sep 30 15:10:23.773 2018 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:23:C2:34:EA:AD:84:82:96:34:28:50:3A:
  • 61:0A:24:D7:71:7E:54:FC:CC:6D:4C:F5:E0:3D:36:CD:
  • 5D:89:B1:77:02:20:05:94:B8:C9:50:F6:21:FD:5A:17:
  • 82:80:98:A6:18:7D:2C:60:A8:21:6A:8A:8F:5A:34:F0:
  • E3:AD:20:04:6F:CC

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.waldorf.edge-mail.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid