SSL Checker
Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.
Report
Hostname: | done Matches Common Name or/and SAN |
Expired: | done No (27 days till expiration) |
Public Key: | done We were unable to find any issues in the public key of end-entity certificate |
Trusted: | close We were unable to verify this certificate |
Self-Signed: | done No, the end-entity certificate is not self-signed |
Chain Issues: | close The chain doesn't contain any intermediate certificates |
Weak signatures: | done No, certificates sent by the server were not signed utilizing a weak hash function |
OCSP Status: | done OCSP Responder returned "good" status for the end-entity certificate |
DNS Information
Resolves To: | 70.190.152.206 |
Reverse IP lookup: | ip70-190-152-206.ph.ph.cox.net. |
Nameserver: | ns1.asuscomm.com. |
General Information
Common Name: | treffyes.asuscomm.com |
SANs: | DNS:treffyes.asuscomm.com Total number of SANs: 1 |
Signature Algorithm: | sha256WithRSAEncryption |
Key Type: | ECDSA (secp256r1) |
Key size: | 256 bits |
Serial Number: | 44641892c2b061f6f440e465323e2da9867 |
Not Before: | Feb 21, 2024 19:12:24 GMT |
Not After: | May 21, 2024 19:12:23 GMT |
Number of certs: | 1 |
Revocation Status: | good |
OCSP Stapling: | Not Supported |
Server: | lighttpd/1.4.39 |
HSTS: | Not Supported |
HPKP: | Not Supported |
Chain Information
Certificate # 1 - Common Name: treffyes.asuscomm.com
Decode this certificate for verbose information → launchSubject Common Name | treffyes.asuscomm.com |
Issuer Common Name | R3 |
Issuer Organization | Let's Encrypt |
Not Before: | Feb 21, 2024 19:12:24 GMT |
Not After: | May 21, 2024 19:12:23 GMT |
Signature Algorithm: | sha256WithRSAEncryption |
Serial Number: | 44641892c2b061f6f440e465323e2da9867 |
SHA1 Fingerprint: | 16:FC:68:2F:64:8D:0A:C6:05:01:CD:15:D9:B0:E6:58:F6:DE:CB:27 |
MD5 Fingerprint: | 12:EC:62:54:41:B7:74:FD:08:F1:8E:19:A5:08:AB:C2 |
OpenSSL Handshake
depth=0 CN = treffyes.asuscomm.com verify error:num=20:unable to get local issuer certificate verify return:1 depth=0 CN = treffyes.asuscomm.com verify error:num=21:unable to verify the first certificate verify return:1 depth=0 CN = treffyes.asuscomm.com verify return:1 CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = treffyes.asuscomm.com i:C = US, O = Let's Encrypt, CN = R3 -----BEGIN CERTIFICATE----- MIIELTCCAxWgAwIBAgISBEZBiSwrBh9vRA5GUyPi2phnMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yNDAyMjExOTEyMjRaFw0yNDA1MjExOTEyMjNaMCAxHjAcBgNVBAMT FXRyZWZmeWVzLmFzdXNjb21tLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA BDrl589i3GLPH3p/j6GoxbtKCrq2nlbrS6UanLwPcQItMv75kehvXmN4ANou+akt r3D2X5B4++f4FUtjPWhsVj6jggIYMIICFDAOBgNVHQ8BAf8EBAMCB4AwHQYDVR0l BBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYE FLTQI3ddxE74ET4wS6z7KCUxxMaBMB8GA1UdIwQYMBaAFBQusxe3WFbLrlAJQOYf r52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL3IzLm8u bGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5vcmcvMCAG A1UdEQQZMBeCFXRyZWZmeWVzLmFzdXNjb21tLmNvbTATBgNVHSAEDDAKMAgGBmeB DAECATCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB2AEiw42vapkc0D+VqAvqdMOsc UgHLVt0sgdm7v6s52IRzAAABjc1MSE8AAAQDAEcwRQIga4TTV0Q+1tP6GkoyWgBe HLPmsJNK9c9ekJWNnn+pCCgCIQDFPCj1kzRkjfFwvxgaOvuX48N/+R3tMqt0gFpO GHRJagB3AO7N0GTV2xrOxVy3nbTNE6Iyh0Z8vOzew1FIWUZxH7WbAAABjc1MSGwA AAQDAEgwRgIhAJiMMYFPnjfLQuE3Bi4DX+cdEQfi2vjbZfr/AJETKeCEAiEA4o6n vUswJnjtPZEpZtLG2C7xyQgVw60tgetN9N8UHPgwDQYJKoZIhvcNAQELBQADggEB AEt0uijJ65Vm8SDzTJxciJcjhAjo4RxowaOltyyi5CNk59/XGP/oEhGf4lGChuER nPzeFsVeicK3ZnZ5+WD9vL5ClkbgHplVCRV8d1I7xoy3Snz3tVMFin1mNACNwAjf aj31Rzl3sEh5qDlXBgtZpETX2UZl6xOPK55GEgPdImw0CKOlpRp2e0hiQxysD9LY 6vuDUrehEm2oFAy1aLG8bPtQj8ADjNh9ifC1g4HFXiLvmPO/WjCyajfv7RE0Bb5d xJQqpF9MvnY6e5sl29sXYnGHYcCQo8e3+pbq1Y4c/50TUUmEg/g74KStAcSj3lk3 2bAAEMMPQ287LwMoJbXJTE8= -----END CERTIFICATE----- --- Server certificate subject=CN = treffyes.asuscomm.com issuer=C = US, O = Let's Encrypt, CN = R3 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1448 bytes and written 412 bytes Verification error: unable to verify the first certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 21 (unable to verify the first certificate) --- DONE