Welcome to OCSP Checker.
Author: coeurl (
@debiru_R
)
This is test page for
OCSP Stapling Test
.
Test URL:
https://entry-notif.gramin.jp
Each APIs:
https://ssl.lavoscore.org/api/sslcert-expires/?q=entry-notif.gramin.jp
https://ssl.lavoscore.org/api/sslcert-expires/ocsp-stapling/?q=entry-notif.gramin.jp
https://ssl.lavoscore.org/api/sslcert-expires/ocsp/?q=entry-notif.gramin.jp
And you can
check your domain name
.
#
Certificate of
entry-notif.gramin.jp
{ "serial": "94ED75743CC5FD12C0F509DCDF8562A8", "OCSP_serial": "94ED75743CC5FD12C0F509DCDF8562A8", "OCSP_cert_status": "good", "OCSP_this_update": "Oct 30 13:20:43 2025 GMT", "OCSP_next_update": "Nov 6 13:20:42 2025 GMT", "domainName": "entry-notif.gramin.jp", "port": 443, "subjectAltName": "DNS:entry-notif.gramin.jp", "is_valid": true, "CA": "ZeroSSL", "updated_at": "2025/09/30 09:00:00", "expires_at": "2025/12/30 08:59:59", "today": "2025/11/03 07:06:09", "UTC": { "updated_at": "2025-09-30T00:00:00Z", "expires_at": "2025-12-29T23:59:59Z", "today": "2025-11-02T22:06:09Z" }, "remaining_days": 57 }
#
OCSP response of
entry-notif.gramin.jp
from OCSP Stapling
CONNECTED(00000003) OCSP response: ====================================== OCSP Response Data: OCSP Response Status: successful (0x0) Response Type: Basic OCSP Response Version: 1 (0x0) Responder Id: 0F6BE64BCE3947AEF67E901E79F0309192C85FA3 Produced At: Oct 30 13:20:43 2025 GMT Responses: Certificate ID: Hash Algorithm: sha1 Issuer Name Hash: 331FFE3FFD0B8416284F948D56C07E0392D8F64D Issuer Key Hash: 0F6BE64BCE3947AEF67E901E79F0309192C85FA3 Serial Number: 94ED75743CC5FD12C0F509DCDF8562A8 Cert Status: good This Update: Oct 30 13:20:43 2025 GMT Next Update: Nov 6 13:20:42 2025 GMT Signature Algorithm: ecdsa-with-SHA384 Signature Value: 30:64:02:30:0e:af:1e:69:15:1a:a3:15:15:ca:b0:c1:28:6f: e2:7e:94:74:7c:26:ba:c9:91:9b:bc:6e:cd:3a:1c:81:8d:cd: 53:70:50:f7:26:0a:d1:b1:c7:ec:24:b8:04:10:f8:34:02:30: 05:be:21:00:e2:99:02:19:e9:6c:34:51:3a:4a:02:ea:8c:f9: 0e:a6:1a:aa:eb:87:a8:71:64:91:41:ed:6b:cf:38:bb:3d:56: 65:7f:45:a9:f1:e7:1d:87:35:10:0f:95 ====================================== --- Certificate chain 0 s:CN = entry-notif.gramin.jp i:C = AT, O = ZeroSSL, CN = ZeroSSL ECC Domain Secure Site CA a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Sep 30 00:00:00 2025 GMT; NotAfter: Dec 29 23:59:59 2025 GMT 1 s:C = AT, O = ZeroSSL, CN = ZeroSSL ECC Domain Secure Site CA i:C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust ECC Certification Authority a:PKEY: id-ecPublicKey, 384 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Jan 30 00:00:00 2020 GMT; NotAfter: Jan 29 23:59:59 2030 GMT 2 s:C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust ECC Certification Authority i:C = GB, ST = Greater Manchester, L = Salford, O = Comodo CA Limited, CN = AAA Certificate Services a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA384 v:NotBefore: Mar 12 00:00:00 2019 GMT; NotAfter: Dec 31 23:59:59 2028 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIEDTCCA5OgAwIBAgIRAJTtdXQ8xf0SwPUJ3N+FYqgwCgYIKoZIzj0EAwMwSzEL MAkGA1UEBhMCQVQxEDAOBgNVBAoTB1plcm9TU0wxKjAoBgNVBAMTIVplcm9TU0wg RUNDIERvbWFpbiBTZWN1cmUgU2l0ZSBDQTAeFw0yNTA5MzAwMDAwMDBaFw0yNTEy MjkyMzU5NTlaMCAxHjAcBgNVBAMTFWVudHJ5LW5vdGlmLmdyYW1pbi5qcDBZMBMG ByqGSM49AgEGCCqGSM49AwEHA0IABHHFr4NfeyT0O26Yn1M/5nLv9dwkBogYPJ/F pZQV0m/Q3EWjwXzcYEPPPK87VZWlXzm+BqIUnQEsOLtycdxiESqjggKBMIICfTAf BgNVHSMEGDAWgBQPa+ZLzjlHrvZ+kB558DCRkshfozAdBgNVHQ4EFgQUphS+r94o 241VJMnA0vM2KmQTH50wDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwHQYD VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMEkGA1UdIARCMEAwNAYLKwYBBAGy MQECAk4wJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwCAYG Z4EMAQIBMIGIBggrBgEFBQcBAQR8MHowSwYIKwYBBQUHMAKGP2h0dHA6Ly96ZXJv c3NsLmNydC5zZWN0aWdvLmNvbS9aZXJvU1NMRUNDRG9tYWluU2VjdXJlU2l0ZUNB LmNydDArBggrBgEFBQcwAYYfaHR0cDovL3plcm9zc2wub2NzcC5zZWN0aWdvLmNv bTCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB2AN3cyjSV1+EWBeeVMvrHn/g9HFDf 2wA6FBJ2Ciysu8gqAAABmZiICowAAAQDAEcwRQIgeW9udIFtxyh4CCkCwnTj+VHN tU21IZyWb90z6QCf0NICIQDxpCBcRVRyMASO55DqwQcod1DgDj4lQHSlKRsDG+BE dQB2AA0dvIlE6fUAVULXLT4UTMxDCCq26h6U39cGZX0uhvMBAAABmZiICvEAAAQD AEcwRQIhAKrXnszv3zyxH7nyKdXvIkwfWC3jvkZFgpJvMFSkwuXyAiBgktne8udV 3lnZwNKUBRu1lD+vIacYWxbvtEfDnsu4njAgBgNVHREEGTAXghVlbnRyeS1ub3Rp Zi5ncmFtaW4uanAwCgYIKoZIzj0EAwMDaAAwZQIwGN1GjnlMRcF7/Sqj7+8rNvvT V3st49DnxcQoWQZLMfaOucdBJ2JSnpaCwxKVXOY4AjEAg/9mg++kc86zCPkInMpw WhvYgBysMKVmOQ8U0KckGUWVcajNSYPl/3m7jeHhWuyM -----END CERTIFICATE----- subject=CN = entry-notif.gramin.jp issuer=C = AT, O = ZeroSSL, CN = ZeroSSL ECC Domain Secure Site CA --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 3621 bytes and written 396 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 9C8A7BCCB483638693F13E708AD8698986D6CA44AF79EB0B21F02BBB9058A941 Session-ID-ctx: Resumption PSK: D69152FE9F0CD340B54AC498F1BCFE4B3D3C4E865D02173BF38AC2ECAC2FBFE0 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - 1a 05 c0 b3 c0 c8 38 d3-ff 83 bd 65 f8 ab e7 5c ......8....e...\ 0010 - 83 2b 3d 10 ea a0 57 a1-0d c1 35 c5 38 3a 10 16 .+=...W...5.8:.. 0020 - 19 ad 99 e0 4d 8a cd df-c5 7b 16 e4 d2 f6 9c 6f ....M....{.....o 0030 - a7 a8 b5 46 5f f4 84 bb-b3 e0 ba be 63 46 88 09 ...F_.......cF.. 0040 - a1 7d ae 58 d7 1e 28 d8-73 59 32 dd 12 9f 87 e4 .}.X..(.sY2..... 0050 - 67 a7 ea a5 f9 f8 60 b4-2b 4b 7c 77 d1 ef 63 7a g.....`.+K|w..cz 0060 - bf 20 aa c4 88 24 4e d4-ab . ...$N.. Start Time: 1762121170 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK
#
OCSP response of
entry-notif.gramin.jp
from OCSP responder (Let's Encrypt)
OCSP response from OCSP responder allows only Let's Encrypt's Certificate.