SSL Checker
Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.
Report
It's all good. We have not detected any issues.
Hostname: | done Matches Common Name or/and SAN |
Expired: | done No (83 days till expiration) |
Public Key: | done We were unable to find any issues in the public key of end-entity certificate |
Trusted: | done Yes, we were able to verify the certificate |
Self-Signed: | done No, the end-entity certificate is not self-signed |
Chain Issues: | done No, we were unable to detect any issues in the certificate chain sent by the server |
Weak signatures: | done No, certificates sent by the server were not signed utilizing a weak hash function |
OCSP Status: | done OCSP Responder returned "good" status for the end-entity certificate |
DNS Information
Resolves To: | 85.13.151.83 |
Reverse IP lookup: | dd21716.kasserver.com. |
Nameserver: | ns5.kasserver.com. |
Nameserver: | ns6.kasserver.com. |
General Information
Common Name: | magicmama.de |
SANs: | DNS:magicmama.deDNS:www.magicmama.de Total number of SANs: 2 |
Signature Algorithm: | sha256WithRSAEncryption |
Key Type: | RSA |
Key size: | 2048 bits |
Serial Number: | 3e0c0b11c324ea862c345080fc784941587 |
Not Before: | Apr 19, 2024 11:40:17 GMT |
Not After: | Jul 18, 2024 11:40:16 GMT |
Number of certs: | 2 |
Revocation Status: | good |
OCSP Stapling: | Not Supported |
Server: | Apache |
HSTS: | Not Supported |
HPKP: | Not Supported |
Chain Information
Certificate # 1 - Common Name: magicmama.de
Decode this certificate for verbose information → launchSubject Common Name | magicmama.de |
Issuer Common Name | R3 |
Issuer Organization | Let's Encrypt |
Not Before: | Apr 19, 2024 11:40:17 GMT |
Not After: | Jul 18, 2024 11:40:16 GMT |
Signature Algorithm: | sha256WithRSAEncryption |
Serial Number: | 3e0c0b11c324ea862c345080fc784941587 |
SHA1 Fingerprint: | 33:86:E9:2F:5C:1C:D2:ED:0A:74:5B:BF:25:A8:D4:86:12:98:30:DB |
MD5 Fingerprint: | E4:C7:81:02:5A:50:D0:D6:9B:87:B7:1F:C3:38:7C:76 |
Certificate # 2 - Common Name: R3
Decode this certificate for verbose information → launchIn place? | Yes, this certificate directly certifies the preceding one |
Subject Common Name | R3 |
Subject Organization | Let's Encrypt |
Issuer Common Name | ISRG Root X1 |
Issuer Organization | Internet Security Research Group |
Not Before: | Sep 04, 2020 00:00:00 GMT |
Not After: | Sep 15, 2025 16:00:00 GMT |
Signature Algorithm: | sha256WithRSAEncryption |
Serial Number: | 912b084acf0c18a753f6d62e25a75f5a |
SHA1 Fingerprint: | A0:53:37:5B:FE:84:E8:B7:48:78:2C:7C:EE:15:82:7A:6A:F5:A4:05 |
MD5 Fingerprint: | E8:29:E6:5D:7C:43:07:D6:FB:C1:3C:17:9E:03:7A:36 |
OpenSSL Handshake
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1 verify return:1 depth=1 C = US, O = Let's Encrypt, CN = R3 verify return:1 depth=0 CN = magicmama.de verify return:1 CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = magicmama.de i:C = US, O = Let's Encrypt, CN = R3 -----BEGIN CERTIFICATE----- MIIE+DCCA+CgAwIBAgISA+DAsRwyTqhiw0UID8eElBWHMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yNDA0MTkxMTQwMTdaFw0yNDA3MTgxMTQwMTZaMBcxFTATBgNVBAMT DG1hZ2ljbWFtYS5kZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALF9 eOqhLeWExEXyv69hLhAVCXoqBgmkoi/W7kMg4CcpEDFALc9SA5ey6CDjJkBbadOa wNXH+S/jlBTigY7ONJgfGyiO4eRg5/a1i2Yo0Z4j2njNvPomc0A17UTIOEk1wubI /XmDGRBPxtpvRxh4KmYi7PFJeJRek1Iitho8s5VUWxSDdm96SKwze5Lvnxuy3IrV 6++qHWHGiS1EaxJHOSUVtGx0Fm9Kp30Mask9lu4s5c4T9oV4jghpWfw8K272CUjs sWg1C1ukAQO4KiCxAqyQdrsHACGb24tQfsMsBnGoKql+6VtJmWb4Whit/apNKKj/ Hp0msrCledOK7kOSCtcCAwEAAaOCAiEwggIdMA4GA1UdDwEB/wQEAwIFoDAdBgNV HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4E FgQUw/5tat+DiEIQY/A96tvzHSn7HPAwHwYDVR0jBBgwFoAUFC6zF7dYVsuuUAlA 5h+vnYsUwsYwVQYIKwYBBQUHAQEESTBHMCEGCCsGAQUFBzABhhVodHRwOi8vcjMu by5sZW5jci5vcmcwIgYIKwYBBQUHMAKGFmh0dHA6Ly9yMy5pLmxlbmNyLm9yZy8w KQYDVR0RBCIwIIIMbWFnaWNtYW1hLmRlghB3d3cubWFnaWNtYW1hLmRlMBMGA1Ud IAQMMAowCAYGZ4EMAQIBMIIBBQYKKwYBBAHWeQIEAgSB9gSB8wDxAHcAO1N3dT4t uYBOizBbBv5AO2fYT8P0x70ADS1yb+H61BcAAAGO9l8wUAAABAMASDBGAiEA2YCT xnsBp4QEzjd7ilmXdOpa6nha1k2u0FKnW52bj/YCIQCBViO+f7yFNPLiYTTPF/Y5 JxB4bbT2xkK7mTi+lQa2fQB2AHb/iD8KtvuVUcJhzPWHujS0pM27KdxoQgqf5mdM Wjp0AAABjvZfMIwAAAQDAEcwRQIhAOCIZT/DgjPH1sJK5UCz6z5jlfsstk1Nqqqc omIiCUErAiBocnnYVvq+Pqsl4jfCAF1hrpE810ubDB3nHPqzFxr76TANBgkqhkiG 9w0BAQsFAAOCAQEACCd/KLY0apK/0RwcDL9JmDFrrdQAdsUBWEHT2e3tLUS3fj0S xOfjCBkB2bEc9n8GEJCtjd1X8K21duFV88dspXOk4xgQwKUNBotTK77d4NhZtD+f 2nlqz+C8Tb99r+51VUuZidcrlRBFdZ45Xwxt/+4Er9UpNVK6GJJcktitcEh4D0WR VnQETF4EuLKgllQjg4bTva2qMmCF251ZZqgXg0yrWMdQpseTJaYtKpcETzBI+IyZ lQL7dqZVSOY9QbWjVMLsHuf7qHvd/2TUH7TRSNQrS0WtDtmIa3VfUDbnODfwPMgL CBivU2TLz2t/maZ2N+2CkX5IUiEMtGefRwpuNg== -----END CERTIFICATE----- 1 s:C = US, O = Let's Encrypt, CN = R3 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 -----BEGIN CERTIFICATE----- MIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw WhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg RW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP R5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx sxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm NHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg Z3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG /kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC AYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB Af8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA FHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw AoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw Oi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB gt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W PTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl ikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz CkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm lJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4 avAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2 yJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O yK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids hCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+ HlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv MldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX nLRbwHOoq7hHwg== -----END CERTIFICATE----- --- Server certificate subject=CN = magicmama.de issuer=C = US, O = Let's Encrypt, CN = R3 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 3147 bytes and written 403 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 2048 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- DONE