SSL Checker
Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.
Report
It's all good. We have not detected any issues.
Hostname: | done Matches Common Name or/and SAN |
Expired: | done No (88 days till expiration) |
Public Key: | done We were unable to find any issues in the public key of end-entity certificate |
Trusted: | done Yes, we were able to verify the certificate |
Self-Signed: | done No, the end-entity certificate is not self-signed |
Chain Issues: | done No, we were unable to detect any issues in the certificate chain sent by the server |
Weak signatures: | done No, certificates sent by the server were not signed utilizing a weak hash function |
OCSP Status: | done OCSP Responder returned "good" status for the end-entity certificate |
DNS Information
Resolves To: | 3.13.31.214 |
Reverse IP lookup: | ec2-3-13-31-214.us-east-2.compute.amazonaws.com. |
Nameserver: | ns1.dnsimple.com. |
Nameserver: | ns2.dnsimple-edge.net. |
Nameserver: | ns3.dnsimple.com. |
Nameserver: | ns4.dnsimple-edge.org. |
General Information
Common Name: | www.alljoyn.org |
SANs: | DNS:alljoyn.orgDNS:www.alljoyn.org Total number of SANs: 2 |
Signature Algorithm: | sha256WithRSAEncryption |
Key Type: | ECDSA (secp256r1) |
Key size: | 256 bits |
Serial Number: | 3c31fc5f73206aab6dd7d47372d58c8528c |
Not Before: | Mar 28, 2024 14:28:17 GMT |
Not After: | Jun 26, 2024 14:28:16 GMT |
Number of certs: | 2 |
Revocation Status: | good |
OCSP Stapling: | Not Supported |
Server: | Not Provided |
HSTS: | Not Supported |
HPKP: | Not Supported |
Chain Information
Certificate # 1 - Common Name: www.alljoyn.org
Decode this certificate for verbose information → launchSubject Common Name | www.alljoyn.org |
Issuer Common Name | R3 |
Issuer Organization | Let's Encrypt |
Not Before: | Mar 28, 2024 14:28:17 GMT |
Not After: | Jun 26, 2024 14:28:16 GMT |
Signature Algorithm: | sha256WithRSAEncryption |
Serial Number: | 3c31fc5f73206aab6dd7d47372d58c8528c |
SHA1 Fingerprint: | 39:50:77:03:20:D2:A3:58:67:22:D1:B1:29:6B:3B:80:95:B5:D3:D2 |
MD5 Fingerprint: | E0:9C:BA:07:0C:20:59:76:D5:78:1E:BF:A9:38:4D:94 |
Certificate # 2 - Common Name: R3
Decode this certificate for verbose information → launchIn place? | Yes, this certificate directly certifies the preceding one |
Subject Common Name | R3 |
Subject Organization | Let's Encrypt |
Issuer Common Name | ISRG Root X1 |
Issuer Organization | Internet Security Research Group |
Not Before: | Sep 04, 2020 00:00:00 GMT |
Not After: | Sep 15, 2025 16:00:00 GMT |
Signature Algorithm: | sha256WithRSAEncryption |
Serial Number: | 912b084acf0c18a753f6d62e25a75f5a |
SHA1 Fingerprint: | A0:53:37:5B:FE:84:E8:B7:48:78:2C:7C:EE:15:82:7A:6A:F5:A4:05 |
MD5 Fingerprint: | E8:29:E6:5D:7C:43:07:D6:FB:C1:3C:17:9E:03:7A:36 |
OpenSSL Handshake
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1 verify return:1 depth=1 C = US, O = Let's Encrypt, CN = R3 verify return:1 depth=0 CN = www.alljoyn.org verify return:1 CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = www.alljoyn.org i:C = US, O = Let's Encrypt, CN = R3 -----BEGIN CERTIFICATE----- MIIELTCCAxWgAwIBAgISA8MfxfcyBqq23X1HNy1YyFKMMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yNDAzMjgxNDI4MTdaFw0yNDA2MjYxNDI4MTZaMBoxGDAWBgNVBAMT D3d3dy5hbGxqb3luLm9yZzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHBGBVtb UmiwFZjokzgh6bgmfC2X3cbmaz/rzfmsh4MOtoS23eDgvZ6WBnw3S5pgws5eb0PF 8Dl/AljS8CswJK+jggIeMIICGjAOBgNVHQ8BAf8EBAMCB4AwHQYDVR0lBBYwFAYI KwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFCun4aro Le1/tG/hyEvyl57pIGdoMB8GA1UdIwQYMBaAFBQusxe3WFbLrlAJQOYfr52LFMLG MFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL3IzLm8ubGVuY3Iu b3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5vcmcvMCcGA1UdEQQg MB6CC2FsbGpveW4ub3Jngg93d3cuYWxsam95bi5vcmcwEwYDVR0gBAwwCjAIBgZn gQwBAgEwggEEBgorBgEEAdZ5AgQCBIH1BIHyAPAAdgA7U3d1Pi25gE6LMFsG/kA7 Z9hPw/THvQANLXJv4frUFwAAAY6FrRctAAAEAwBHMEUCIEagOnwNR8IzsdU9RCj6 Cufbppd8h/rS+OjxgxJFVK4RAiEAwGji9Qoo2/oIicjdVMz0Gk1gtg8FzDqkCMp4 +3YKxuMAdgB2/4g/Crb7lVHCYcz1h7o0tKTNuyncaEIKn+ZnTFo6dAAAAY6FrRdq AAAEAwBHMEUCIQDhpo6P0v7qw2Tp0cy8g5NKKyWpXsgqMala/7SOeGef5gIge7kA jaWLcG8KS603eioqTukXz8Kqs3xWk6UUeLqA7UkwDQYJKoZIhvcNAQELBQADggEB ABgqvn6a4d8SdI5ABwb1rmFLLTPW3TlDJ0X9E4oU+I6z/iJoPia4Dy6IXMBSz+Bu MOjNzi1aMNTV3nBb9CE35sp6MLLB/FmhkWN3NYIuF6kfmUfU0OtR0QSf9XbGZnpO Z8wou7l5MicARzdq0zninUmKKfIQEHPYE47KW3/boq7J8oQJMDM4KflkuibW1e4U BoldPrCrvMSeG26u2j0zlY/8jV9tkDZ5vRjDCn+3sjXEiqZAkKVmNQfrWq4iqXtc gf8lWGzzCmTM4jikavMJ4zHlCpg4FaEb8ss2O5h/N1alm9R8Ud1SiLAS6ecvIawB frnPiOycrkP7eNQ5JZxctgs= -----END CERTIFICATE----- 1 s:C = US, O = Let's Encrypt, CN = R3 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 -----BEGIN CERTIFICATE----- MIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw WhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg RW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP R5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx sxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm NHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg Z3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG /kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC AYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB Af8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA FHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw AoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw Oi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB gt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W PTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl ikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz CkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm lJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4 avAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2 yJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O yK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids hCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+ HlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv MldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX nLRbwHOoq7hHwg== -----END CERTIFICATE----- --- Server certificate subject=CN = www.alljoyn.org issuer=C = US, O = Let's Encrypt, CN = R3 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 2738 bytes and written 386 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- DONE --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 5628CDFA01ECFCBE95EBD6639A5411E7AAE32934F72FDD9EA3C7EC6FB1897DC4 Session-ID-ctx: Resumption PSK: 10F441F8AC14B9D17B294E00EBC09B0B6DEAA0E62A58686558EA8675F92EA3A0 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - b3 98 d2 35 a7 bc 4c c7-07 10 91 da d6 55 00 9e ...5..L......U.. 0010 - c3 3a 96 f1 54 a8 71 85-c1 ff c5 30 40 83 16 7b .:..T.q....0@..{ 0020 - 39 d2 8b 74 03 76 ad 24-e7 eb 42 94 36 54 a1 4a 9..t.v.$..B.6T.J 0030 - b3 d3 cc e0 d3 76 9f 03-7e 16 a0 80 0e d2 90 2d .....v..~......- 0040 - a6 b0 3e e9 58 1b 51 30-d7 fa a2 6c 13 95 18 c8 ..>.X.Q0...l.... 0050 - 90 04 b3 ad a2 20 c7 7c-8b e3 ad cf 38 b3 18 49 ..... .|....8..I 0060 - a5 02 d4 ea 25 7f a1 44-42 ....%..DB Start Time: 1711726510 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK