SSL Checker
Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.
Report
Hostname: | close Doesn't match Common Name or/and SANs |
Expired: | done No (325 days till expiration) |
Public Key: | done We were unable to find any issues in the public key of end-entity certificate |
Trusted: | close The end-entity certificate is self-signed |
Self-Signed: | close Yes, the end-entity certificate is self-signed |
Chain Issues: | close The chain doesn't contain any intermediate certificates |
Weak signatures: | done No, certificates sent by the server were not signed utilizing a weak hash function |
DNS Information
Resolves To: | 54.37.204.134 |
Reverse IP lookup: | vps-acb7ca4d.vps.ovh.net. |
Nameserver: | ns0.transip.net. |
Nameserver: | ns2.transip.eu. |
Nameserver: | ns1.transip.nl. |
General Information
Common Name: | TRAEFIK DEFAULT CERT |
SANs: | DNS:766d4d46e680b3a91dd9d72d7ddac657.9d1f46698201661edfa9d2986a10c941.traefik.default Total number of SANs: 1 |
Signature Algorithm: | sha256WithRSAEncryption |
Key Type: | RSA |
Key size: | 2048 bits |
Serial Number: | 85ab401c902931eaad050f216f2ab34c |
Not Before: | Mar 15, 2024 18:09:46 GMT |
Not After: | Mar 15, 2025 18:09:46 GMT |
Number of certs: | 1 |
Revocation Status: | Certificate does not supply CA Issuers information |
OCSP Stapling: | Not Supported |
Server: | Not Provided |
HSTS: | Not Supported |
HPKP: | Not Supported |
Chain Information
Certificate # 1 - Common Name: TRAEFIK DEFAULT CERT
Decode this certificate for verbose information → launchSubject Common Name | TRAEFIK DEFAULT CERT |
Issuer Common Name | TRAEFIK DEFAULT CERT |
Not Before: | Mar 15, 2024 18:09:46 GMT |
Not After: | Mar 15, 2025 18:09:46 GMT |
Signature Algorithm: | sha256WithRSAEncryption |
Serial Number: | 85ab401c902931eaad050f216f2ab34c |
SHA1 Fingerprint: | 36:BC:F2:82:16:D7:27:F7:56:4A:60:6C:9B:F6:97:E6:71:12:D3:1C |
MD5 Fingerprint: | 50:BD:2F:A0:08:A5:75:34:2B:3C:CE:F0:11:75:81:43 |
OpenSSL Handshake
depth=0 CN = TRAEFIK DEFAULT CERT verify error:num=18:self signed certificate verify return:1 depth=0 CN = TRAEFIK DEFAULT CERT verify return:1 CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = TRAEFIK DEFAULT CERT i:CN = TRAEFIK DEFAULT CERT -----BEGIN CERTIFICATE----- MIIDXjCCAkagAwIBAgIRAIWrQByQKTHqrQUPIW8qs0wwDQYJKoZIhvcNAQELBQAw HzEdMBsGA1UEAxMUVFJBRUZJSyBERUZBVUxUIENFUlQwHhcNMjQwMzE1MTgwOTQ2 WhcNMjUwMzE1MTgwOTQ2WjAfMR0wGwYDVQQDExRUUkFFRklLIERFRkFVTFQgQ0VS VDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALlYlej/PQhWAzDVv42J 3NgJ9nBa4xaSuIfH8XnimARPjQjBPekpQNH1d3q2/cPKcmbomx1z1flTQI5J05aN bnqG4WTh5XssKtsadvVanzIf9pmXqOopoPMbuOBg98F/PMHJO78Znk4j8jjkCrHL 9ZAU0kNIiCp0kB72lwUThwlS7qn9REw9se+tkQa7zuBHkIQP75kQExncSjpojTd4 x1c8WRwiV7oajkeGdUwI8OZQNUTvpRip/TQSsYcg3/sSqP+q2zqL7QMHqCArESSA OokKi2xBFntB6J7tBFJccz4W0SuOBfipK/Dj8UFyQTGpFqDXWzOpJFmrkSem86ih ij0CAwEAAaOBlDCBkTAOBgNVHQ8BAf8EBAMCA7gwEwYDVR0lBAwwCgYIKwYBBQUH AwEwDAYDVR0TAQH/BAIwADBcBgNVHREEVTBTglE3NjZkNGQ0NmU2ODBiM2E5MWRk OWQ3MmQ3ZGRhYzY1Ny45ZDFmNDY2OTgyMDE2NjFlZGZhOWQyOTg2YTEwYzk0MS50 cmFlZmlrLmRlZmF1bHQwDQYJKoZIhvcNAQELBQADggEBADcqReWDPUzSma/kgT+H rPSCtPZZwz3a7w0Lpu/8Z0Y7DOU0DzYmpds0j5T9otUa7rKoqx59l1CQscvDZag+ +3Qq1Ke7oinbMevrm3T+5t1y+f4fq+QyjlB1K9UzVwaP8BOXv/8FZ8sJNgunJFvC dDSBcEoAN5oullNBt3K53pbwcsKykUud0hrRwEh2AWn3fCkejM8DOY0xOZa7Wd9i Kswq9HHssJKOAHWle8UFkMr5I3Fj0au+SGGCpk4oGoPf6l9uOw8hihjudV3tdUV5 R0J3YoajqmLgPt5RPZ/AYehlpPdHpZzKnzBgXcWP3yPOfbwNgmGuPxNcacEKv+uT 1f4= -----END CERTIFICATE----- --- Server certificate subject=CN = TRAEFIK DEFAULT CERT issuer=CN = TRAEFIK DEFAULT CERT --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1439 bytes and written 420 bytes Verification error: self signed certificate --- New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES128-GCM-SHA256 Session-ID: 5FDAF317EAEED96A5EEB495D7FCC0E0D7018A6C07F30CAF0935171CE0746F9D5 Session-ID-ctx: Master-Key: E17B7A987E1A6504867EC28C6E17AD8AC8F9D267676D3443ADF932608506DE93A04714CA0C1517675250FCD934FFBAA8 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket: 0000 - ea 65 57 55 c7 5a ab ca-1b e1 ce 7d 7e 9d 3e 7e .eWU.Z.....}~.>~ 0010 - 5f 18 d5 dc 0e 38 26 fa-c0 33 e4 d9 30 c1 86 5a _....8&..3..0..Z 0020 - 7e 95 34 77 15 06 5b 76-13 86 98 a8 6e 2d 87 66 ~.4w..[v....n-.f 0030 - eb d2 ca a6 86 8a 8b dc-2b 47 31 90 e1 5f be 96 ........+G1.._.. 0040 - a2 2f 8e 41 95 6e 13 0f-4d 68 2e 47 a2 ce 2d 93 ./.A.n..Mh.G..-. 0050 - 0e 00 a8 9c 86 1c 11 41-2d c2 45 9b 61 e6 e5 f9 .......A-.E.a... 0060 - 9f 79 31 da 38 3c 91 58-8a 95 18 e3 80 57 14 1e .y1.8<.X.....W.. 0070 - d3 56 6a 29 0b d8 b7 3c- .Vj)...< Start Time: 1713947696 Timeout : 7200 (sec) Verify return code: 18 (self signed certificate) Extended master secret: no --- DONE