SSL check results of xendynastie.at

NEW You can also bulk check multiple servers.

Discover if the mail servers for xendynastie.at can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 30 Nov 2024 00:20:16 +0000

The mailservers of xendynastie.at can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @xendynastie.at addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
yu.xendynastie.at
2a02:c206:2210:9659::1
10
supported
xendynastie.at
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
yu.xendynastie.at
109.199.107.129
10
supported
xendynastie.at
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @xendynastie.at address so far. Test mail delivery

Certificates

First seen at:

CN=xendynastie.at

Certificate chain
  • xendynastie.at
    • remaining
    • 256 bit
    • ecdsa-with-SHA384

      • E5
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • xendynastie.at
Alternative Names
  • auth.xendynastie.at
  • backup.xendynastie.at
  • cloud.xendynastie.at
  • git.xendynastie.at
  • monitor.xendynastie.at
  • photos.xendynastie.at
  • xendynastie.at
  • yu.xendynastie.at
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E5
validity period
Not valid before
2024-11-14
Not valid after
2025-02-12
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
F7:37:32:ED:6A:BD:6A:2C:18:52:66:4E:35:8E:84:6D:90:AF:8B:1D:21:81:1A:B3:BD:1E:5A:5A:A0:BC:65:B4
SHA1
B8:7C:5A:5B:A1:81:EB:B5:0A:52:EA:AB:F8:02:D6:DD:B5:DA:41:5C
X509v3 extensions
subjectKeyIdentifier
  • 04:C3:D4:52:86:31:44:57:6E:A2:31:8F:68:6E:9B:78:BD:13:11:61
authorityKeyIdentifier
  • keyid:9F:2B:5F:CF:3C:21:4F:9D:04:B7:ED:2B:2C:C4:C6:70:8B:D2:D7:0D
authorityInfoAccess
  • OCSP - URI:http://e5.o.lencr.org
  • CA Issuers - URI:http://e5.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 13:4A:DF:1A:B5:98:42:09:78:0C:6F:EF:4C:7A:91:A4:
  • 16:B7:23:49:CE:58:57:6A:DF:AE:DA:A7:C2:AB:E0:22
  • Timestamp : Nov 14 06:09:25.626 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:5A:26:CD:0B:F5:4C:3D:47:21:41:21:76:
  • E5:A1:D6:85:41:55:96:54:AB:49:58:76:1C:B7:10:6C:
  • 4F:6C:66:31:02:20:08:0E:1C:CD:FA:52:51:4C:1C:FC:
  • 1A:35:54:F0:6F:9E:87:F0:8D:A9:D2:D1:34:50:56:C2:
  • 57:15:30:14:96:E6
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53:
  • D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7
  • Timestamp : Nov 14 06:09:27.364 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:8E:2C:88:8A:DC:09:02:94:25:67:BA:
  • 3F:F2:E1:37:34:92:51:56:D7:D8:95:DF:6F:20:F4:7B:
  • 89:86:5D:FD:EC:02:21:00:84:CF:9B:5C:5C:53:8E:01:
  • 7C:C7:FD:2A:28:F1:DF:BB:50:BD:D7:9E:27:EE:6A:22:
  • 92:DE:3B:E3:B1:12:7A:FB

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.yu.xendynastie.at
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.yu.xendynastie.at
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.yu.xendynastie.at
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.yu.xendynastie.at
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
valid
_25._tcp.yu.xendynastie.at
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid