SSL Checker
Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.
Report
Hostname: | done Matches Common Name or/and SAN |
Expired: | close Yes (expired 3 days ago) |
Public Key: | done We were unable to find any issues in the public key of end-entity certificate |
Trusted: | close The end-entity certificate is self-signed |
Self-Signed: | close Yes, the end-entity certificate is self-signed |
Chain Issues: | close The chain doesn't contain any intermediate certificates |
Weak signatures: | done No, certificates sent by the server were not signed utilizing a weak hash function |
DNS Information
Resolves To: | 72.167.252.244 |
Reverse IP lookup: | 244.252.167.72.host.secureserver.net. |
Nameserver: | ns71.domaincontrol.com. |
Nameserver: | ns72.domaincontrol.com. |
General Information
Common Name: | gjknas.com |
SANs: | DNS:gjknas.comDNS:mail.gjknas.comDNS:www.gjknas.comDNS:cpanel.gjknas.comDNS:webmail.gjknas.comDNS:webdisk.gjknas.comDNS:cpcontacts.gjknas.comDNS:cpcalendars.gjknas.comDNS:autodiscover.gjknas.com Total number of SANs: 9 |
Signature Algorithm: | sha256WithRSAEncryption |
Key Type: | RSA |
Key size: | 2048 bits |
Serial Number: | 1d4537252 |
Not Before: | Apr 19, 2023 01:06:28 GMT |
Not After: | Apr 18, 2024 01:06:28 GMT |
Number of certs: | 1 |
Revocation Status: | This check is not applicable to expired certificates |
OCSP Stapling: | Not Supported |
Server: | Apache |
HSTS: | Not Supported |
HPKP: | Not Supported |
Chain Information
Certificate # 1 - Common Name: gjknas.com
Decode this certificate for verbose information → launchSubject Common Name | gjknas.com |
Issuer Common Name | gjknas.com |
Not Before: | Apr 19, 2023 01:06:28 GMT |
Not After: | Apr 18, 2024 01:06:28 GMT |
Signature Algorithm: | sha256WithRSAEncryption |
Serial Number: | 1d4537252 |
SHA1 Fingerprint: | 4D:77:C1:AE:0F:BF:46:29:2E:7C:ED:A7:73:9B:04:F6:07:35:8B:B9 |
MD5 Fingerprint: | A7:7A:E9:4F:D7:49:1B:AC:A2:FF:DA:44:3A:28:2A:26 |
OpenSSL Handshake
depth=0 CN = gjknas.com verify error:num=18:self signed certificate verify return:1 depth=0 CN = gjknas.com verify error:num=10:certificate has expired notAfter=Apr 18 01:06:28 2024 GMT verify return:1 depth=0 CN = gjknas.com notAfter=Apr 18 01:06:28 2024 GMT verify return:1 CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = gjknas.com i:CN = gjknas.com -----BEGIN CERTIFICATE----- MIID+TCCAuGgAwIBAgIFAdRTclIwDQYJKoZIhvcNAQELBQAwFTETMBEGA1UEAwwK Z2prbmFzLmNvbTAeFw0yMzA0MTkwMTA2MjhaFw0yNDA0MTgwMTA2MjhaMBUxEzAR BgNVBAMMCmdqa25hcy5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQC0A0Bavqt4VUPqjc+QJTZ2OaTFjHbzq/4eEq0XAmOBeozTatutBI7cq86i155G llKDJf+Y5JBVg+EuBcokDelhe9QRBP2N5myBgltKTOEIBOFmA3CXoImA+tQCUPix JwAyXe4mLKSIhM2d9fpgci77IKyftpdiCxRecDP3/2JmE6qhnVQY0TIHSaFj6WxD eDBJtz/yQ1oKLIoAjdMfrqXK9/SL1O09InkYTzRfDO+y1diSVZ5GLOkDGZPZvtKv GcyLhIWTse61zUPy2E4A64B8fSqnWeH+gKUCcNYA3TtS49NiHz4M1/oI7CkKlNPN aSsCyCCtW7vwuVDcuEYX02P/AgMBAAGjggFOMIIBSjAdBgNVHQ4EFgQUcVgyMI90 vvl74RMdmgFZlTC+zbEwCQYDVR0TBAIwADBBBgNVHSMEOjA4gBRxWDIwj3S++Xvh Ex2aAVmVML7NsaEZpBcwFTETMBEGA1UEAwwKZ2prbmFzLmNvbYIFAdRTclIwHQYD VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMIG7BgNVHREEgbMwgbCCCmdqa25h cy5jb22CD21haWwuZ2prbmFzLmNvbYIOd3d3Lmdqa25hcy5jb22CEWNwYW5lbC5n amtuYXMuY29tghJ3ZWJtYWlsLmdqa25hcy5jb22CEndlYmRpc2suZ2prbmFzLmNv bYIVY3Bjb250YWN0cy5namtuYXMuY29tghZjcGNhbGVuZGFycy5namtuYXMuY29t ghdhdXRvZGlzY292ZXIuZ2prbmFzLmNvbTANBgkqhkiG9w0BAQsFAAOCAQEAStCG e+UkUPDelyRvaTfRDRryYxEwr7rAM92bMH3KyXhF3gw+FpFcxktzJr0uRazGjtkq zpvAEpCRhOsyeEhnW/xNmUBI8AkWYLiHq4FgfthimCHf4sZ/4kq3ygyhP6h5b1+w XNaUjiZYyQdMYoe0+xY0C/agNW5tDjNWGyO5fS+L3GaG9+HJVsE7kbbNVroujdcb 2/cTZA3ZFrEo1+/u13HN8r1o1pmwKGWPaZGx+lq4zWwm2nGfZgvUAwym6pTwVpy+ +59OnqwH2HHgQC6h+7iAIdETlESBwSF1+pDgMT/21eQv/ICI2hP/HinGjwkKCH/r XbJYdObZIimfcezSAA== -----END CERTIFICATE----- --- Server certificate subject=CN = gjknas.com issuer=CN = gjknas.com --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1698 bytes and written 414 bytes Verification error: certificate has expired --- New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: 0231AFC142AD3415E4B90BE5A031FFAE8A5D2612EDA38EA61B13B8140AB5B6D7 Session-ID-ctx: Master-Key: CC1DC38984619236AC4344535993517460101964E4C58E1818F96C9901A03AF815B0158D9962C10ECD414206025D5AA3 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket: 0000 - 4a 4b 68 bf 50 f9 70 7b-90 96 17 08 37 fd 1f 72 JKh.P.p{....7..r 0010 - 82 71 7e 60 ce 47 98 fd-06 ba 76 49 50 f4 84 41 .q~`.G....vIP..A 0020 - 4e 93 00 d4 86 d3 18 c1-fd ed 65 61 b8 e7 df e1 N.........ea.... 0030 - b2 88 f0 b3 29 49 97 30-c8 ac 31 b9 22 85 2f 6a ....)I.0..1."./j 0040 - d3 47 c1 9e fa cc a4 f3-b0 1f d2 ea b2 f8 2f 6e .G............/n 0050 - 37 c4 c3 53 50 23 4b 7f-44 1b e9 fb ed fd 20 d8 7..SP#K.D..... . 0060 - 8c 9d 79 65 e0 bb 31 c1-cd 9b db 7b e2 d4 74 e0 ..ye..1....{..t. 0070 - 07 d8 bc 33 33 a8 14 7a-06 4c 83 d4 14 26 5f f1 ...33..z.L...&_. 0080 - 0a 09 b9 2c 6d 8f 67 2f-eb 4d b0 6e 1a 69 c0 ab ...,m.g/.M.n.i.. 0090 - 54 d1 5c fb 78 fd 98 a4-29 ba 72 3f e5 e5 e9 f4 T.\.x...).r?.... 00a0 - 37 64 e5 3e e2 6c 50 f6-1a a6 37 59 25 b2 73 99 7d.>.lP...7Y%.s. 00b0 - d1 0d 5d b9 33 07 d6 da-e8 74 2a 18 61 57 dd 39 ..].3....t*.aW.9 00c0 - 93 2c e8 b5 1d ff 7d c2-6f 28 71 78 57 c4 1b ca .,....}.o(qxW... Start Time: 1713588291 Timeout : 7200 (sec) Verify return code: 10 (certificate has expired) Extended master secret: yes --- DONE