SSL Checker
Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.
Report
Hostname: | done Matches Common Name or/and SAN |
Expired: | close Yes (expired 221 days ago) |
Public Key: | done We were unable to find any issues in the public key of end-entity certificate |
Trusted: | close The end-entity certificate is self-signed |
Self-Signed: | close Yes, the end-entity certificate is self-signed |
Chain Issues: | close The chain doesn't contain any intermediate certificates |
Weak signatures: | done No, certificates sent by the server were not signed utilizing a weak hash function |
DNS Information
Resolves To: | 72.167.252.244 |
Reverse IP lookup: | 244.252.167.72.host.secureserver.net. |
Nameserver: | ns71.domaincontrol.com. |
Nameserver: | ns72.domaincontrol.com. |
General Information
Common Name: | gjknas.com |
SANs: | DNS:gjknas.comDNS:mail.gjknas.comDNS:www.gjknas.comDNS:cpanel.gjknas.comDNS:webmail.gjknas.comDNS:webdisk.gjknas.comDNS:cpcontacts.gjknas.comDNS:cpcalendars.gjknas.comDNS:autodiscover.gjknas.com Total number of SANs: 9 |
Signature Algorithm: | sha256WithRSAEncryption |
Key Type: | RSA |
Key size: | 2048 bits |
Serial Number: | 1d4537252 |
Not Before: | Apr 19, 2023 01:06:28 GMT |
Not After: | Apr 18, 2024 01:06:28 GMT |
Number of certs: | 1 |
Revocation Status: | This check is not applicable to expired certificates |
OCSP Stapling: | Not Supported |
Server: | Apache |
HSTS: | Not Supported |
HPKP: | Not Supported |
Chain Information
Certificate # 1 - Common Name: gjknas.com
Decode this certificate for verbose information → launchSubject Common Name | gjknas.com |
Issuer Common Name | gjknas.com |
Not Before: | Apr 19, 2023 01:06:28 GMT |
Not After: | Apr 18, 2024 01:06:28 GMT |
Signature Algorithm: | sha256WithRSAEncryption |
Serial Number: | 1d4537252 |
SHA1 Fingerprint: | 4D:77:C1:AE:0F:BF:46:29:2E:7C:ED:A7:73:9B:04:F6:07:35:8B:B9 |
MD5 Fingerprint: | A7:7A:E9:4F:D7:49:1B:AC:A2:FF:DA:44:3A:28:2A:26 |
OpenSSL Handshake
depth=0 CN = gjknas.com verify error:num=18:self signed certificate verify return:1 depth=0 CN = gjknas.com verify error:num=10:certificate has expired notAfter=Apr 18 01:06:28 2024 GMT verify return:1 depth=0 CN = gjknas.com notAfter=Apr 18 01:06:28 2024 GMT verify return:1 CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = gjknas.com i:CN = gjknas.com -----BEGIN CERTIFICATE----- MIID+TCCAuGgAwIBAgIFAdRTclIwDQYJKoZIhvcNAQELBQAwFTETMBEGA1UEAwwK Z2prbmFzLmNvbTAeFw0yMzA0MTkwMTA2MjhaFw0yNDA0MTgwMTA2MjhaMBUxEzAR BgNVBAMMCmdqa25hcy5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQC0A0Bavqt4VUPqjc+QJTZ2OaTFjHbzq/4eEq0XAmOBeozTatutBI7cq86i155G llKDJf+Y5JBVg+EuBcokDelhe9QRBP2N5myBgltKTOEIBOFmA3CXoImA+tQCUPix JwAyXe4mLKSIhM2d9fpgci77IKyftpdiCxRecDP3/2JmE6qhnVQY0TIHSaFj6WxD eDBJtz/yQ1oKLIoAjdMfrqXK9/SL1O09InkYTzRfDO+y1diSVZ5GLOkDGZPZvtKv GcyLhIWTse61zUPy2E4A64B8fSqnWeH+gKUCcNYA3TtS49NiHz4M1/oI7CkKlNPN aSsCyCCtW7vwuVDcuEYX02P/AgMBAAGjggFOMIIBSjAdBgNVHQ4EFgQUcVgyMI90 vvl74RMdmgFZlTC+zbEwCQYDVR0TBAIwADBBBgNVHSMEOjA4gBRxWDIwj3S++Xvh Ex2aAVmVML7NsaEZpBcwFTETMBEGA1UEAwwKZ2prbmFzLmNvbYIFAdRTclIwHQYD VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMIG7BgNVHREEgbMwgbCCCmdqa25h cy5jb22CD21haWwuZ2prbmFzLmNvbYIOd3d3Lmdqa25hcy5jb22CEWNwYW5lbC5n amtuYXMuY29tghJ3ZWJtYWlsLmdqa25hcy5jb22CEndlYmRpc2suZ2prbmFzLmNv bYIVY3Bjb250YWN0cy5namtuYXMuY29tghZjcGNhbGVuZGFycy5namtuYXMuY29t ghdhdXRvZGlzY292ZXIuZ2prbmFzLmNvbTANBgkqhkiG9w0BAQsFAAOCAQEAStCG e+UkUPDelyRvaTfRDRryYxEwr7rAM92bMH3KyXhF3gw+FpFcxktzJr0uRazGjtkq zpvAEpCRhOsyeEhnW/xNmUBI8AkWYLiHq4FgfthimCHf4sZ/4kq3ygyhP6h5b1+w XNaUjiZYyQdMYoe0+xY0C/agNW5tDjNWGyO5fS+L3GaG9+HJVsE7kbbNVroujdcb 2/cTZA3ZFrEo1+/u13HN8r1o1pmwKGWPaZGx+lq4zWwm2nGfZgvUAwym6pTwVpy+ +59OnqwH2HHgQC6h+7iAIdETlESBwSF1+pDgMT/21eQv/ICI2hP/HinGjwkKCH/r XbJYdObZIimfcezSAA== -----END CERTIFICATE----- --- Server certificate subject=CN = gjknas.com issuer=CN = gjknas.com --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1698 bytes and written 414 bytes Verification error: certificate has expired --- New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: C1E2F4A746F154E3348EADC038AAE62A3174F1D42CE2A54C8FDD04DB21186DB4 Session-ID-ctx: Master-Key: E95595C8B95CC9D7A906AC12EAEB488E2B28FB0D529D06F99351CA7186C925FEC4BCD806C3B8AEB2586BF71BD4C73395 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket: 0000 - ef 4e 5c 6c a1 10 5d 7a-a3 a1 70 8b 9e 8c dd 57 .N\l..]z..p....W 0010 - 89 de 55 a4 61 a6 f0 0b-b9 cc 62 9d 11 5a ef 4d ..U.a.....b..Z.M 0020 - 85 ca b5 d3 a7 8a a8 3f-f2 4d 05 9a bf a6 7b c8 .......?.M....{. 0030 - 7d f9 f8 ea 70 5b d7 11-6d 04 b4 82 8e a0 46 38 }...p[..m.....F8 0040 - 6e 9f 02 06 53 02 18 27-91 6b 70 68 76 2d fa 89 n...S..'.kphv-.. 0050 - a0 63 80 5f 8b b1 66 4e-e4 59 be d3 0e 79 14 4f .c._..fN.Y...y.O 0060 - e1 ba 15 ae 8c a8 c0 f5-2b 54 1e f6 77 bb ab 4f ........+T..w..O 0070 - 0b f1 fb b5 ce 70 82 a1-b6 32 b2 27 e3 34 3d 2a .....p...2.'.4=* 0080 - e8 38 aa 4e 2e 6a f7 e4-fb f8 cf 74 94 aa 95 7d .8.N.j.....t...} 0090 - 8b b3 b9 0b 37 60 a2 a3-bc d2 86 93 71 74 fb fc ....7`......qt.. 00a0 - e9 68 35 76 9f 00 a5 bc-64 1d db 66 a3 a3 dd 35 .h5v....d..f...5 00b0 - 24 fd b7 bd 7d 3d 21 78-a2 92 41 7c 5b 66 ca 9f $...}=!x..A|[f.. 00c0 - 52 43 97 74 c5 75 9b 53-f7 37 df 7a e8 85 20 cc RC.t.u.S.7.z.. . Start Time: 1732459084 Timeout : 7200 (sec) Verify return code: 10 (certificate has expired) Extended master secret: yes --- DONE