SSL check results of zxavier.com

NEW You can also bulk check multiple servers.

Discover if the mail servers for zxavier.com can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 26 Apr 2024 02:10:58 +0000

We can not guarantee a secure connection to the mailservers of zxavier.com!

Please contact the operator of zxavier.com and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/zxavier.com

Servers

Incoming Mails

These servers are responsible for incoming mails to @zxavier.com addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
aspmx1.migadu.com
2001:41d0:303:e16b::
Results incomplete
10
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
16 s
aspmx1.migadu.com
2001:41d0:303:e224::
Results incomplete
10
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
17 s
aspmx1.migadu.com
2001:41d0:403:4876::
Results incomplete
10
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
17 s
aspmx1.migadu.com
2001:41d0:403:58f0::
Results incomplete
10
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
16 s
aspmx1.migadu.com
51.210.222.107
10
supported
aspmx1.migadu.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
aspmx1.migadu.com
57.128.22.240
10
supported
aspmx1.migadu.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
9 s
aspmx1.migadu.com
51.210.223.36
10
supported
aspmx1.migadu.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
13 s
aspmx1.migadu.com
141.94.97.118
10
supported
aspmx1.migadu.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
8 s
aspmx2.migadu.com
2001:41d0:403:58f0::
Results incomplete
20
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
16 s
aspmx2.migadu.com
2001:41d0:303:e16b::
Results incomplete
20
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx2.migadu.com
2001:41d0:403:4876::
Results incomplete
20
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx2.migadu.com
2001:41d0:303:e224::
Results incomplete
20
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx2.migadu.com
51.210.223.36
20
supported
aspmx1.migadu.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
aspmx2.migadu.com
51.210.222.107
20
supported
aspmx1.migadu.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
aspmx2.migadu.com
57.128.22.240
20
supported
aspmx1.migadu.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
aspmx2.migadu.com
141.94.97.118
20
supported
aspmx1.migadu.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @zxavier.com address so far. Test mail delivery

Certificates

First seen at:

CN=aspmx1.migadu.com

Certificate chain
  • aspmx1.migadu.com
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • aspmx1.migadu.com
Alternative Names
  • aspmx1.migadu.com
  • aspmx2.migadu.com
  • mx.migadu.com
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2024-04-23
Not valid after
2024-07-22
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
4B:25:EC:2A:79:10:81:7E:61:A0:31:DC:0D:C2:2E:D9:97:50:C1:2A:8C:18:A7:57:98:BC:74:D9:BE:0D:BA:16
SHA1
57:1E:E6:52:F4:E2:EA:B7:B6:1A:C9:4A:E3:B0:27:A7:CE:D7:15:86
X509v3 extensions
subjectKeyIdentifier
  • 55:88:A3:6D:D5:F0:81:53:E6:AB:AC:0F:3A:69:4D:35:6F:CE:08:36
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 48:B0:E3:6B:DA:A6:47:34:0F:E5:6A:02:FA:9D:30:EB:
  • 1C:52:01:CB:56:DD:2C:81:D9:BB:BF:AB:39:D8:84:73
  • Timestamp : Apr 23 04:08:08.185 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:20:76:17:54:DC:3E:01:80:DB:4B:17:88:
  • 02:AD:8B:0B:91:4C:76:2A:33:1A:2D:C0:7D:14:5F:1D:
  • 8F:34:F2:6D:02:20:3B:F0:80:EA:F4:86:91:6D:77:C3:
  • 0F:66:28:5C:12:2F:1E:DF:B2:FC:2A:8F:1E:56:00:D3:
  • FA:F4:A0:2D:FC:02
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34:
  • B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74
  • Timestamp : Apr 23 04:08:08.251 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:D1:32:DE:94:FF:19:04:56:8D:E7:25:
  • 31:3F:75:26:11:52:56:46:04:9A:F7:8D:BC:DC:AD:28:
  • 53:57:04:61:06:02:21:00:A1:CF:ED:E7:CA:80:E0:9F:
  • B1:10:B5:48:E7:1F:BB:53:CC:4E:DD:06:1B:58:3B:E8:
  • 5A:96:67:5A:7C:81:FA:31

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.aspmx1.migadu.com
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid
_25._tcp.aspmx2.migadu.com
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid