Summary of mx2.mail.ovh.net:25 (SMTP) SSL Security Test
Provided "as is" without any warranty of any kind.
This test was made 43 days ago and may be outdated
Refresh Test
Date/Time:Feb 17th, 2026 00:15 GMT+0
Source IP/Port:87.98.160.167:25
Protocol:SMTP
Location:Paris, France
Your final score:
- A
- B
- C
- F
B
Executive Summary for mx2.mail.ovh.net
- The server on the tested port is not currently prepared for post-quantum key exchange. The server’s certificate chain relies entirely on classical signature algorithms without post-quantum support. Show details.
- 2 certificate chain(s) detected. Show details.
- 8 of 25 supported cipher suites are not compliant with PCI DSS. The server supports PCI DSS compliant protocols (TLSv1.2 and TLSv1.3) as well as non-compliant protocols (TLSv1.0 and TLSv1.1). All supported elliptic curves are compliant with PCI DSS: P-256, P-521, P-384, X25519 and X448. There are 1 more issue(s) which make the server non-compliant with PCI DSS: potential Marvin Attack. Show details.
- 11 of 25 supported cipher suites are not compliant with NIST and HIPAA. The server supports NIST and HIPAA compliant protocols (TLSv1.2 and TLSv1.3) as well as non-compliant protocols (TLSv1.0 and TLSv1.1). All supported elliptic curves are compliant with NIST and HIPAA: P-256, P-521, P-384, X25519 and X448. There are 1 more issue(s) which make the server non-compliant with NIST and HIPAA: server does not support OCSP stapling. Show details.
- No issues related to industry best practices were identified. Show details.