Summary of mx1.mailbox.org:25 (SMTP) SSL Security Test
Provided "as is" without any warranty of any kind.
This test was made 168 days ago and may be outdated
Refresh Test
Date/Time:Nov 12th, 2025 14:14 GMT+0
Source IP/Port:80.241.60.212:25
Protocol:SMTP
Location:Berlin, Germany
Your final score:
- A
- B
- C
- F
B-
Executive Summary for mx1.mailbox.org
- The server on the tested port is not currently prepared for post-quantum key exchange. The server’s certificate chain relies entirely on classical signature algorithms without post-quantum support. Show details.
- 1 SSL/TLS end-entity certificate(s) detected: the first certificate is a a trusted RSA 4096 bits certificate with issuer Thawte TLS RSA CA G1 valid until June 10, 2026. 1 certificate chain(s) detected. Show details.
- 6 of 22 supported cipher suites are not compliant with PCI DSS. The server supports PCI DSS compliant protocols (TLSv1.2 and TLSv1.3) as well as non-compliant protocols (TLSv1.0 and TLSv1.1). All supported elliptic curves are compliant with PCI DSS: P-256, P-521, P-384, X25519 and X448. There are 1 more issue(s) which make the server non-compliant with PCI DSS: potential Marvin Attack. Show details.
- 7 of 22 supported cipher suites are not compliant with NIST and HIPAA. The server supports NIST and HIPAA compliant protocols (TLSv1.2 and TLSv1.3) as well as non-compliant protocols (TLSv1.0 and TLSv1.1). All supported elliptic curves are compliant with NIST and HIPAA: P-256, P-521, P-384, X25519 and X448. There are 1 more issue(s) which make the server non-compliant with NIST and HIPAA: server does not support OCSP stapling. Show details.
- 1 issue(s) related to industry best practices were identified: . Show details.