SSL Checker
Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.
Report
It's all good. We have not detected any issues.
Hostname: | done Matches Common Name or/and SAN |
Expired: | done No (37 days till expiration) |
Public Key: | done We were unable to find any issues in the public key of end-entity certificate |
Trusted: | done Yes, we were able to verify the certificate |
Self-Signed: | done No, the end-entity certificate is not self-signed |
Chain Issues: | done No, we were unable to detect any issues in the certificate chain sent by the server |
Weak signatures: | done No, certificates sent by the server were not signed utilizing a weak hash function |
OCSP Status: | done OCSP Responder returned "good" status for the end-entity certificate |
DNS Information
Resolves To: | 66.29.146.71 |
Reverse IP lookup: | premium232-4.web-hosting.com. |
Nameserver: | dns1.namecheaphosting.com. |
Nameserver: | dns2.namecheaphosting.com. |
Note: | Namecheap hosting nameservers are in use |
Note: | This domain is hosted with Namecheap |
General Information
Common Name: | webmail.poulininc.ca |
SANs: | DNS:webmail.poulininc.ca Total number of SANs: 1 |
Signature Algorithm: | sha256WithRSAEncryption |
Key Type: | ECDSA (secp256r1) |
Key size: | 256 bits |
Serial Number: | 4c293210f72e8f76477bb07a0359b7fada3 |
Not Before: | Feb 27, 2024 23:40:44 GMT |
Not After: | May 27, 2024 23:40:43 GMT |
Number of certs: | 2 |
Revocation Status: | good |
OCSP Stapling: | Not Supported |
Chain Information
Certificate # 1 - Common Name: webmail.poulininc.ca
Decode this certificate for verbose information → launchSubject Common Name | webmail.poulininc.ca |
Issuer Common Name | R3 |
Issuer Organization | Let's Encrypt |
Not Before: | Feb 27, 2024 23:40:44 GMT |
Not After: | May 27, 2024 23:40:43 GMT |
Signature Algorithm: | sha256WithRSAEncryption |
Serial Number: | 4c293210f72e8f76477bb07a0359b7fada3 |
SHA1 Fingerprint: | 51:1B:49:40:8C:5B:BC:C7:23:D0:A8:DA:CA:19:E7:03:8F:18:03:0D |
MD5 Fingerprint: | 30:CA:FA:CB:F1:F1:F5:29:D7:89:FE:3B:84:3F:4C:61 |
Certificate # 2 - Common Name: R3
Decode this certificate for verbose information → launchIn place? | Yes, this certificate directly certifies the preceding one |
Subject Common Name | R3 |
Subject Organization | Let's Encrypt |
Issuer Common Name | ISRG Root X1 |
Issuer Organization | Internet Security Research Group |
Not Before: | Sep 04, 2020 00:00:00 GMT |
Not After: | Sep 15, 2025 16:00:00 GMT |
Signature Algorithm: | sha256WithRSAEncryption |
Serial Number: | 912b084acf0c18a753f6d62e25a75f5a |
SHA1 Fingerprint: | A0:53:37:5B:FE:84:E8:B7:48:78:2C:7C:EE:15:82:7A:6A:F5:A4:05 |
MD5 Fingerprint: | E8:29:E6:5D:7C:43:07:D6:FB:C1:3C:17:9E:03:7A:36 |
OpenSSL Handshake
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1 verify return:1 depth=1 C = US, O = Let's Encrypt, CN = R3 verify return:1 depth=0 CN = webmail.poulininc.ca verify return:1 CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = webmail.poulininc.ca i:C = US, O = Let's Encrypt, CN = R3 -----BEGIN CERTIFICATE----- MIIEKzCCAxOgAwIBAgISBMKTIQ9y6Pdkd7sHoDWbf62jMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yNDAyMjcyMzQwNDRaFw0yNDA1MjcyMzQwNDNaMB8xHTAbBgNVBAMT FHdlYm1haWwucG91bGluaW5jLmNhMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE lv5sqmYr1IhSrLYGS0dFEM/aeKhYU4PMgphNodW+CgNn/X/H9hqfWPflYjtdsbMc IazC0T3Sqy5qGhux7rkId6OCAhcwggITMA4GA1UdDwEB/wQEAwIHgDAdBgNVHSUE FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU bKSgty0iqMTnOnB+YwVO1Xy0dfYwHwYDVR0jBBgwFoAUFC6zF7dYVsuuUAlA5h+v nYsUwsYwVQYIKwYBBQUHAQEESTBHMCEGCCsGAQUFBzABhhVodHRwOi8vcjMuby5s ZW5jci5vcmcwIgYIKwYBBQUHMAKGFmh0dHA6Ly9yMy5pLmxlbmNyLm9yZy8wHwYD VR0RBBgwFoIUd2VibWFpbC5wb3VsaW5pbmMuY2EwEwYDVR0gBAwwCjAIBgZngQwB AgEwggEFBgorBgEEAdZ5AgQCBIH2BIHzAPEAdgBIsONr2qZHNA/lagL6nTDrHFIB y1bdLIHZu7+rOdiEcwAAAY3tKBg3AAAEAwBHMEUCIQCG9PV3yCPOb0wHZIX6uO7j l1cyEmsSYlVZR4UtaMyxwgIgKup/Fsf/NxxOe20mfJaygLAZZvxmjyEk29FNEJVf z5wAdwB2/4g/Crb7lVHCYcz1h7o0tKTNuyncaEIKn+ZnTFo6dAAAAY3tKBiJAAAE AwBIMEYCIQD0MCfFaYJ6oWzdgI1hU+ymL84xgunLhrRkFridCYlC1wIhALaZ4NaL mwMZqSFABz6YWH1AK/xPTErSZDPwdZIkq27PMA0GCSqGSIb3DQEBCwUAA4IBAQBZ XZ4RiboKe1mlzB1rSSRJnlR/CSJxbzBkK9OZzP7Akjy2LnylK3Mwr9VGUEbKbcKN S/1ByTttv5gggyOdAuGXoFYV3LxHXf2jpKZ+BICLkVxhAiGfHlr/O23nHJrZaOUy X7wJGZh5LM0FpubTGGh/8nv/je8N3x1lep1YIjXXCDKbtSlalkTh7Korg1ktaTi0 Rk6K2bRmlXGtfOjzesXJU7csLsNRozjO87ZH4RznGytWKSMJvXiklLFekaw/rc4G Nh0R2djquSJ1GQTz8XO9MGuubdxegzcb//P7Ged9I0i6SkQseyjyaWtwlIJf1cRb 7vAw4UwNKqr2kWuvkkR/ -----END CERTIFICATE----- 1 s:C = US, O = Let's Encrypt, CN = R3 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 -----BEGIN CERTIFICATE----- MIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw WhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg RW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP R5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx sxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm NHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg Z3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG /kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC AYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB Af8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA FHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw AoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw Oi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB gt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W PTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl ikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz CkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm lJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4 avAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2 yJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O yK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids hCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+ HlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv MldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX nLRbwHOoq7hHwg== -----END CERTIFICATE----- --- Server certificate subject=CN = webmail.poulininc.ca issuer=C = US, O = Let's Encrypt, CN = R3 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 2756 bytes and written 411 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- DONE