SSL check results of ziehl-abegg.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for ziehl-abegg.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 31 May 2017 07:20:57 +0000

We can not guarantee a secure connection to the mailservers of ziehl-abegg.de!

Please contact the operator of ziehl-abegg.de and ask him or her to solve this problem. This result stays accessible under the following address:

https://ssl-tools.net/mailservers/ziehl-abegg.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @ziehl-abegg.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mailgate.ziehl-abegg.de
217.6.247.101
Results incomplete
10
unsupported
not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
2.0 s
mx00.kundenserver.de
212.227.15.41
20
supported
mx.kundenserver.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1.0 s
mx01.kundenserver.de
217.72.192.67
21
supported
mx.kundenserver.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2.0 s

Outgoing Mails

We have not received any emails from a @ziehl-abegg.de address so far. Test mail delivery

Certificates

First seen at:

mx.kundenserver.de

Certificate chain
Subject
Country (C)
  • DE
Organization (O)
  • 1&1 Internet SE
State (ST)
  • Rheinland-Pfalz
Locality (L)
  • Montabaur
Common Name (CN)
  • mx.kundenserver.de
Alternative Names
  • mx.kundenserver.de
  • mx00.kundenserver.de
  • mx01.kundenserver.de
  • mx00.emig.kundenserver.de
  • mx01.emig.kundenserver.de
Issuer
Country (C)
  • DE
Organization (O)
  • T-Systems International GmbH
Organizational Unit (OU)
  • T-Systems Trust Center
State (ST)
  • Nordrhein Westfalen
Postal code
  • 57250
Locality (L)
  • Netphen
Street
  • Untere Industriestr. 20
Common Name (CN)
  • TeleSec ServerPass DE-2
validity period
Not valid before
2017-03-22
Not valid after
2019-03-27
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Client Authentication
  • TLS Web Server Authentication
Fingerprints
SHA256
6B:F2:E0:57:CA:2D:1F:24:5D:54:CD:18:30:A7:A3:8A:2D:FB:A5:7E:01:E7:2E:0B:4C:2A:8E:D3:78:47:88:42
SHA1
BB:92:1D:1B:F3:97:5B:A5:30:ED:80:0B:EF:07:62:C0:D0:72:BE:25
X509v3 extensions
authorityKeyIdentifier
  • keyid:54:04:29:6F:A2:93:C6:90:31:45:C0:3D:DE:2B:E2:0A:69:80:92:5F
subjectKeyIdentifier
  • 73:0F:81:8C:5B:57:8E:9A:F6:9D:20:32:1F:94:D6:55:5B:EA:71:FC
certificatePolicies
  • Policy: 1.3.6.1.4.1.7879.13.2
  • CPS: http://www.telesec.de/serverpass/cps.html
  • Policy: 2.23.140.1.2.2
crlDistributionPoints
  • Full Name:
  • URI:http://crl.serverpass.telesec.de/rl/TeleSec_ServerPass_DE-2.crl
  • Full Name:
  • URI:ldap://ldap.serverpass.telesec.de/cn=TeleSec%20ServerPass%20DE-2,ou=T-Systems%20Trust%20Center,o=T-Systems%20International%20GmbH,c=de?certificateRevocationlist?base?certificateRevocationlist=*
authorityInfoAccess
  • OCSP - URI:http://ocsp.serverpass.telesec.de/ocspr
  • CA Issuers - URI:http://crl.serverpass.telesec.de/crt/TeleSec_ServerPass_DE-2.cer
  • CA Issuers - URI:ldap://ldap.serverpass.telesec.de/cn=TeleSec%20ServerPass%20DE-2,ou=T-Systems%20Trust%20Center,o=T-Systems%20International%20GmbH,c=de?cACertificate