SSL check results of willy-fritzsche.de

NEW You can also bulk check multiple servers.

Discover if the webservers of willy-fritzsche.de can be reached through a secure connection.

Summary

Report created Wed, 27 May 2020 21:07:49 +0000

We can not guarantee a secure connection to the webserver of willy-fritzsche.de!

Please contact the operator of willy-fritzsche.de and inform him of this problem. This result stays accessible under the following address:

/webservers/willy-fritzsche.de

Servers

Hostname / IP address Certificates Protocol
willy-fritzsche.de
188.68.57.227
TRAEFIK DEFAULT CERT
HSTS
missing
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
willy-fritzsche.de
2a03:4000:6:f25d::3
Results incomplete
not checked
HSTS
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s

Certificates

First seen at:

CN=TRAEFIK DEFAULT CERT

Certificate chain
  • TRAEFIK DEFAULT CERT (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • TRAEFIK DEFAULT CERT
Common Name is not included in Alternative Names
Alternative Names
  • 6b860ad96f44caca1d9c1419c2c1c577.010651dd3ae82bdb8f724ca382935b50.traefik.default
Issuer

Certificate is self-signed.

validity period
Not valid before
2020-05-12
Not valid after
2021-05-12
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • Data Encipherment
  • Key Agreement
  • TLS Web Server Authentication
Fingerprints
SHA256
C3:AA:8E:76:7B:C8:CF:52:DB:72:18:C9:FE:92:94:BE:3C:FD:B3:81:74:E8:F1:23:84:D7:CB:6F:BB:1B:3A:10
SHA1
A3:45:74:BE:A3:C6:D1:4E:E0:65:09:03:22:2B:81:1F:9E:77:C7:9D

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_443._tcp.willy-fritzsche.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid