IM Observatory server report for null-pointer.eu
Test started 2020-07-20 12:04:30 UTC .
Show client to server result | Permalink to this report
|
xmpp.null-pointer.eu:5269
xmpp.null-pointer.eu:5269
- StartTLS
- REQUIRED
- Peer certificate
- The server requires incoming s2s connections to present a peer certificate.
SRV records
_xmpp-server._tcp.null-pointer.eu DNSSEC
Priority |
Weight |
Port |
Server |
0 |
5 |
5269 |
xmpp.null-pointer.eu |
TLSA records
Certificates
Subject
- commonName
- null-pointer.eu
Details
- Signature algorithm
- sha256WithRSAEncryption
- Public key
- 4096 bit RSA
- Valid from
- 2020-06-09 22:46:14 UTC
- Valid to
- 2020-09-07 22:46:14 UTC
- OCSP
- http://ocsp.int-x3.letsencrypt.org
- Valid for null-pointer.eu
- YES
-
D4:F2:F3:71:F7:CB:0E:73:4E:DB:A7:E4:99:A6:BF:85:E3:79:A3:1E
Subject Alternative Names
- DNSName
- autoconfig.null-pointer.eu
- DNSName
- autodiscover.null-pointer.eu
- DNSName
- cloud.null-pointer.eu
- DNSName
- conference.null-pointer.eu
- DNSName
- git.null-pointer.eu
- DNSName
- mail.null-pointer.eu
- DNSName
- meet.null-pointer.eu
- DNSName
- null-pointer.eu Matches
- DNSName
- upload.null-pointer.eu
- DNSName
- www.null-pointer.eu
- DNSName
- xmpp.null-pointer.eu
Subject
- commonName
- Let's Encrypt Authority X3
- countryName
- US
- organizationName
- Let's Encrypt
Details
- Signature algorithm
- sha256WithRSAEncryption
- Public key
- 2048 bit RSA
- Valid from
- 2016-03-17 16:40:46 UTC
- Valid to
- 2021-03-17 16:40:46 UTC
- CRL
- http://crl.identrust.com/DSTROOTCAX3CRL.crl
- OCSP
- http://isrg.trustid.ocsp.identrust.com
-
E6:A3:B4:5B:06:2D:50:9B:33:82:28:2D:19:6E:FE:97:D5:95:6C:CB
Subject
- commonName
- DST Root CA X3
- organizationName
- Digital Signature Trust Co.
Details
- Signature algorithm
- sha1WithRSAEncryption
- Public key
- 2048 bit RSA
- Valid from
- 2000-09-30 21:12:19 UTC
- Valid to
- 2021-09-30 14:01:15 UTC
-
DA:C9:02:4F:54:D8:F6:DF:94:93:5F:B1:73:26:38:CA:6A:D7:7C:13
Protocols
SSLv2 |
No |
SSLv3 |
No |
TLSv1 |
No |
TLSv1.1 |
No |
TLSv1.2 |
Yes |
Ciphers
Server does not respect the client's cipher ordering.
Cipher suite | Bitsize | Forward secrecy | Info |
ECDHE-RSA-AES256-GCM-SHA384 (0xc030) |
256
|
Yes
|
Curve: secp384r1
|
ECDHE-RSA-AES256-SHA384 (0xc028) |
256
|
Yes
|
Curve: secp384r1
|
ECDHE-RSA-AES256-SHA (0xc014) |
256
|
Yes
|
Curve: secp384r1
|
DHE-RSA-AES256-GCM-SHA384 (0x9f) |
256
|
Yes
|
Diffie-Hellman:
Group: draft-ietf-tls-negotiated-ff-dhe-10 ffdhe4096
Bitsize: 4096
|
DHE-RSA-AES256-SHA256 (0x6b) |
256
|
Yes
|
Diffie-Hellman:
Group: draft-ietf-tls-negotiated-ff-dhe-10 ffdhe4096
Bitsize: 4096
|
DHE-RSA-AES256-SHA (0x39) |
256
|
Yes
|
Diffie-Hellman:
Group: draft-ietf-tls-negotiated-ff-dhe-10 ffdhe4096
Bitsize: 4096
|
Badge
Want to show this result on your webpage? Add this:
<a href='https://xmpp.net/result.php?domain=null-pointer.eu&type=server'><img src='https://xmpp.net/badge.php?domain=null-pointer.eu' alt='xmpp.net score' /></a>