SSL Checker
Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.
Report
It's all good. We have not detected any issues.
Hostname: | done Matches Common Name or/and SAN |
Expired: | done No (67 days till expiration) |
Public Key: | done We were unable to find any issues in the public key of end-entity certificate |
Trusted: | done Yes, we were able to verify the certificate |
Self-Signed: | done No, the end-entity certificate is not self-signed |
Chain Issues: | done No, we were unable to detect any issues in the certificate chain sent by the server |
Weak signatures: | done No, certificates sent by the server were not signed utilizing a weak hash function |
OCSP Status: | done OCSP Responder returned "good" status for the end-entity certificate |
DNS Information
Resolves To: | 46.223.68.148 |
Reverse IP lookup: | ip-046-223-068-148.um13.pools.vodafone-ip.de. |
Nameserver: | wells.ns.cloudflare.com. |
Nameserver: | olga.ns.cloudflare.com. |
General Information
Common Name: | eekhof.org |
SANs: | DNS:cloud.eekhof.orgDNS:eekhof.orgDNS:ftrss.eekhof.orgDNS:lucas.eekhof.orgDNS:rss.eekhof.orgDNS:www.cloud.eekhof.orgDNS:www.eekhof.orgDNS:www.ftrss.eekhof.orgDNS:www.lucas.eekhof.orgDNS:www.rss.eekhof.org Total number of SANs: 10 |
Signature Algorithm: | ecdsa-with-SHA384 |
Key Type: | ECDSA (secp256r1) |
Key size: | 256 bits |
Serial Number: | 3733c513d46b1742acfb83eb6bae2f65bb0 |
Not Before: | Dec 16, 2024 09:40:05 GMT |
Not After: | Mar 16, 2025 09:40:04 GMT |
Number of certs: | 2 |
Revocation Status: | good |
OCSP Stapling: | Not Supported |
Server: | Apache/2.4.62 (Debian) |
HSTS: | Not Supported |
HPKP: | Not Supported |
Chain Information
Certificate # 1 - Common Name: eekhof.org
Decode this certificate for verbose information → launchSubject Common Name | eekhof.org |
Issuer Common Name | E5 |
Issuer Organization | Let's Encrypt |
Not Before: | Dec 16, 2024 09:40:05 GMT |
Not After: | Mar 16, 2025 09:40:04 GMT |
Signature Algorithm: | ecdsa-with-SHA384 |
Serial Number: | 3733c513d46b1742acfb83eb6bae2f65bb0 |
SHA1 Fingerprint: | 39:17:32:6D:7F:79:5A:2D:F3:34:F2:2D:51:E1:49:1F:CE:C5:78:63 |
MD5 Fingerprint: | 80:D9:B0:90:EF:6C:2E:44:AD:5E:41:07:49:1C:BF:E6 |
Certificate # 2 - Common Name: E5
Decode this certificate for verbose information → launchIn place? | Yes, this certificate directly certifies the preceding one |
Subject Common Name | E5 |
Subject Organization | Let's Encrypt |
Issuer Common Name | ISRG Root X1 |
Issuer Organization | Internet Security Research Group |
Not Before: | Mar 13, 2024 00:00:00 GMT |
Not After: | Mar 12, 2027 23:59:59 GMT |
Signature Algorithm: | sha256WithRSAEncryption |
Serial Number: | 838f6c63ceb1398c6206628315c9fdde |
SHA1 Fingerprint: | 5F:28:D9:C5:89:EE:4B:F3:1A:11:B7:8C:72:B8:D1:3F:07:9D:DC:45 |
MD5 Fingerprint: | 54:7A:B1:C0:5C:A8:5A:6E:68:2C:91:28:0F:EF:D7:55 |
OpenSSL Handshake
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1 verify return:1 depth=1 C = US, O = Let's Encrypt, CN = E5 verify return:1 depth=0 CN = eekhof.org verify return:1 CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = eekhof.org i:C = US, O = Let's Encrypt, CN = E5 -----BEGIN CERTIFICATE----- MIIEIzCCA6qgAwIBAgISA3M8UT1GsXQqz7g+trri9luwMAoGCCqGSM49BAMDMDIx CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF NTAeFw0yNDEyMTYwOTQwMDVaFw0yNTAzMTYwOTQwMDRaMBUxEzARBgNVBAMTCmVl a2hvZi5vcmcwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAARCyjVVIdqIEyOmOQ3t P6gFSaBvkjETkCVSCryCm0CY9ZLdz88zqWyVw1xX1cT9NWsIxH/tJyFDwZNRoYFu lMKHo4ICuzCCArcwDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQGCCsGAQUFBwMB BggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQMVMYQXLBnDDutPwYL xfqjTfk9/TAfBgNVHSMEGDAWgBSfK1/PPCFPnQS37SssxMZwi9LXDTBVBggrBgEF BQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNS5vLmxlbmNyLm9yZzAiBggr BgEFBQcwAoYWaHR0cDovL2U1LmkubGVuY3Iub3JnLzCBwwYDVR0RBIG7MIG4ghBj bG91ZC5lZWtob2Yub3JnggplZWtob2Yub3JnghBmdHJzcy5lZWtob2Yub3JnghBs dWNhcy5lZWtob2Yub3Jngg5yc3MuZWVraG9mLm9yZ4IUd3d3LmNsb3VkLmVla2hv Zi5vcmeCDnd3dy5lZWtob2Yub3JnghR3d3cuZnRyc3MuZWVraG9mLm9yZ4IUd3d3 Lmx1Y2FzLmVla2hvZi5vcmeCEnd3dy5yc3MuZWVraG9mLm9yZzATBgNVHSAEDDAK MAgGBmeBDAECATCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB2AKLjCuRF772tm344 7Udnd1PXgluElNcrXhssxLlQpEfnAAABk88MY38AAAQDAEcwRQIgbBldUXz0ns1k qEJlJcljUn9CnHuWcC/SGqJ7tzSIukwCIQDfGTFA1NsyxeszlymQsjeHbZ6fDU3g cJNPHaEThuXxWwB2AM8RVu7VLnyv84db2Wkum+kacWdKsBfsrAHSW3fOzDsIAAAB k88MY8MAAAQDAEcwRQIhAMoDuYA3ccxB9DIyGztpNQU1E2TxISFIaZl+qodBPEli AiBY8h+BK7IxZEnjo3W48YdEEUfXZqYIP7Ew7i4lmSLyRjAKBggqhkjOPQQDAwNn ADBkAjADb6AyMfNvVweE9g5ZUDSWWkA732KXsqwO7iOI/q/wR6CMhip+oTZNQGya d9PhzuoCMAHhM3LF4vbPG1jvxQ6H7g8/Z4UhE0evFkNoo71ZmBn4REzzn4maeNkK F5qN61orxg== -----END CERTIFICATE----- 1 s:C = US, O = Let's Encrypt, CN = E5 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 -----BEGIN CERTIFICATE----- MIIEVzCCAj+gAwIBAgIRAIOPbGPOsTmMYgZigxXJ/d4wDQYJKoZIhvcNAQELBQAw TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg RW5jcnlwdDELMAkGA1UEAxMCRTUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNCzqK a2GOtu/cX1jnxkJFVKtj9mZhSAouWXW0gQI3ULc/FnncmOyhKJdyIBwsz9V8UiBO VHhbhBRrwJCuhezAUUE8Wod/Bk3U/mDR+mwt4X2VEIiiCFQPmRpM5uoKrNijgfgw gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSfK1/PPCFPnQS37SssxMZw i9LXDTAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAH3KdNEVCQdqk0LKyuNImTKdRJY1C 2uw2SJajuhqkyGPY8C+zzsufZ+mgnhnq1A2KVQOSykOEnUbx1cy637rBAihx97r+ bcwbZM6sTDIaEriR/PLk6LKs9Be0uoVxgOKDcpG9svD33J+G9Lcfv1K9luDmSTgG 6XNFIN5vfI5gs/lMPyojEMdIzK9blcl2/1vKxO8WGCcjvsQ1nJ/Pwt8LQZBfOFyV XP8ubAp/au3dc4EKWG9MO5zcx1qT9+NXRGdVWxGvmBFRAajciMfXME1ZuGmk3/GO koAM7ZkjZmleyokP1LGzmfJcUd9s7eeu1/9/eg5XlXd/55GtYjAM+C4DG5i7eaNq cm2F+yxYIPt6cbbtYVNJCGfHWqHEQ4FYStUyFnv8sjyqU8ypgZaNJ9aVcWSICLOI E1/Qv/7oKsnZCWJ926wU6RqG1OYPGOi1zuABhLw61cuPVDT28nQS/e6z95cJXq0e K1BcaJ6fJZsmbjRgD5p3mvEf5vdQM7MCEvU0tHbsx2I5mHHJoABHb8KVBgWp/lcX GWiWaeOyB7RP+OfDtvi2OsapxXiV7vNVs7fMlrRjY1joKaqmmycnBvAq14AEbtyL sVfOS66B8apkeFX2NY4XPEYV4ZSCe8VHPrdrERk2wILG3T/EGmSIkCYVUMSnjmJd VQD9F6Na/+zmXCc= -----END CERTIFICATE----- --- Server certificate subject=CN = eekhof.org issuer=C = US, O = Let's Encrypt, CN = E5 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 2558 bytes and written 405 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- DONE