SSL check results of wk12.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for wk12.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 26 Jul 2025 00:30:08 +0000

The mailservers of wk12.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @wk12.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
debian.wk12.de
37.24.121.84
25
supported
debian.wk12.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
7 s

Outgoing Mails

We have not received any emails from a @wk12.de address so far. Test mail delivery

Certificates

First seen at:

CN=debian.wk12.de

Certificate chain
  • debian.wk12.de
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R11
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • debian.wk12.de
Alternative Names
  • debian.wk12.de
  • k12-server.spdns.de
  • www.wk12.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R11
validity period
Not valid before
2025-07-24
Not valid after
2025-10-22
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
60:6D:35:74:F6:B6:1A:D5:7C:EF:56:DC:D0:6D:07:F2:79:4F:31:97:88:BF:8A:C6:A2:20:59:A7:5F:A0:2D:C8
SHA1
7D:E7:07:97:31:6E:7E:B8:C7:1C:7B:8E:66:DC:1E:88:4E:27:D5:A7
X509v3 extensions
subjectKeyIdentifier
  • 00:38:0B:3D:66:D9:CF:ED:6F:53:81:C1:AF:4B:61:8E:20:7B:3B:3F
authorityKeyIdentifier
  • keyid:C5:CF:46:A4:EA:F4:C3:C0:7A:6C:95:C4:2D:B0:5E:92:2F:26:E3:B9
authorityInfoAccess
  • CA Issuers - URI:http://r11.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://r11.c.lencr.org/50.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 0D:E1:F2:30:2B:D3:0D:C1:40:62:12:09:EA:55:2E:FC:
  • 47:74:7C:B1:D7:E9:30:EF:0E:42:1E:B4:7E:4E:AA:34
  • Timestamp : Jul 24 16:01:11.136 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:57:9B:4E:7E:96:72:D4:A3:4B:FE:00:76:
  • CD:A4:8E:F2:73:EE:15:1B:B7:24:0B:FD:32:1E:73:5F:
  • F5:2A:31:82:02:21:00:A4:75:0D:72:C0:13:2F:98:A4:
  • A6:B1:2F:7F:FF:33:35:6D:1E:AC:41:7A:6A:78:37:3F:
  • 74:FC:40:FB:8C:10:D4
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Jul 24 16:01:11.185 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:3F:B7:FE:A0:FC:CC:6E:07:9D:32:EF:81:
  • 45:6C:D6:93:2F:1D:D5:01:2E:77:E2:4E:F1:54:FF:42:
  • 1B:24:1A:CE:02:20:3C:80:A9:FB:90:04:B0:67:50:BE:
  • 9E:BD:C2:6B:C7:41:23:7F:A3:A9:E2:D9:95:11:97:7E:
  • BC:F6:56:1B:1A:DD