Welcome to OCSP Checker.
Author: coeurl (
@debiru_R
)
This is test page for
OCSP Stapling Test
.
Test URL:
https://fujideli.take-eats.jp
Each APIs:
https://ssl.lavoscore.org/api/sslcert-expires/?q=fujideli.take-eats.jp
https://ssl.lavoscore.org/api/sslcert-expires/ocsp-stapling/?q=fujideli.take-eats.jp
https://ssl.lavoscore.org/api/sslcert-expires/ocsp/?q=fujideli.take-eats.jp
And you can
check your domain name
.
#
Certificate of
fujideli.take-eats.jp
{ "serial": "031DAEC5E58FA1C811E96A8C4F00C9B2", "OCSP_serial": null, "OCSP_cert_status": null, "OCSP_this_update": null, "OCSP_next_update": null, "domainName": "fujideli.take-eats.jp", "port": 443, "subjectAltName": "DNS:*.take-eats.jp", "is_valid": true, "CA": "Amazon", "updated_at": "2025/04/01 09:00:00", "expires_at": "2026/05/01 08:59:59", "today": "2025/07/13 12:29:53", "UTC": { "updated_at": "2025-04-01T00:00:00Z", "expires_at": "2026-04-30T23:59:59Z", "today": "2025-07-13T03:29:53Z" }, "remaining_days": 291 }
#
OCSP response of
fujideli.take-eats.jp
from OCSP Stapling
CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = *.take-eats.jp i:C = US, O = Amazon, CN = Amazon RSA 2048 M03 a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Apr 1 00:00:00 2025 GMT; NotAfter: Apr 30 23:59:59 2026 GMT 1 s:C = US, O = Amazon, CN = Amazon RSA 2048 M03 i:C = US, O = Amazon, CN = Amazon Root CA 1 a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Aug 23 22:26:04 2022 GMT; NotAfter: Aug 23 22:26:04 2030 GMT 2 s:C = US, O = Amazon, CN = Amazon Root CA 1 i:C = US, ST = Arizona, L = Scottsdale, O = "Starfield Technologies, Inc.", CN = Starfield Services Root Certificate Authority - G2 a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: May 25 12:00:00 2015 GMT; NotAfter: Dec 31 01:00:00 2037 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIFxzCCBK+gAwIBAgIQAx2uxeWPocgR6WqMTwDJsjANBgkqhkiG9w0BAQsFADA8 MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRwwGgYDVQQDExNBbWF6b24g UlNBIDIwNDggTTAzMB4XDTI1MDQwMTAwMDAwMFoXDTI2MDQzMDIzNTk1OVowGTEX MBUGA1UEAwwOKi50YWtlLWVhdHMuanAwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw ggEKAoIBAQCzLZoPaj0f+CU8SJi42/kZsfmriBVo8qxmskQGp795CXwFVbAIm8p0 AFiwk6SgSQ03wb/e2CYhARYlE2Hxpu3/yEgrA2fCwhPZ9BkHeXOQ35n9hQLcb55J cdLK5WEtJzAeipSMB4KLq7RcQu87aVAtDBYSnvq0imcTb4XR2F4zb+KCOC7KDrMB KKKoqXs9Wofy4Iw7hSGVttwkSUaXQU2cp8FRvXpUHUQY/t6LtEsHg+2oWahISf9y xcxTMoRzcS2jxLbnSrkXzLh/59VswzrDx8D7An//oVl54Btx/pfOQXAqyof0h8FV FNLcMHAKAa9N/nTjmUXNjFDIP30RcsVVAgMBAAGjggLmMIIC4jAfBgNVHSMEGDAW gBRV2Rhf0hzMAeFYtL6r2VVCAdcuAjAdBgNVHQ4EFgQUorPYSwI4sZY3HPyReCx7 jQFOcKIwGQYDVR0RBBIwEIIOKi50YWtlLWVhdHMuanAwEwYDVR0gBAwwCjAIBgZn gQwBAgEwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF BQcDAjA7BgNVHR8ENDAyMDCgLqAshipodHRwOi8vY3JsLnIybTAzLmFtYXpvbnRy dXN0LmNvbS9yMm0wMy5jcmwwdQYIKwYBBQUHAQEEaTBnMC0GCCsGAQUFBzABhiFo dHRwOi8vb2NzcC5yMm0wMy5hbWF6b250cnVzdC5jb20wNgYIKwYBBQUHMAKGKmh0 dHA6Ly9jcnQucjJtMDMuYW1hem9udHJ1c3QuY29tL3IybTAzLmNlcjAMBgNVHRMB Af8EAjAAMIIBfQYKKwYBBAHWeQIEAgSCAW0EggFpAWcAdQCWl2S/VViXrfdDh2g3 CEJ36fA61fak8zZuRqQ/D8qpxgAAAZXu0HQpAAAEAwBGMEQCIA9pxzXdyxTFBAgX hdIgPFK8ggA3c+yiiXXMmTeccDYCAiA+8Aj5mE7KxsVWq/Adp4tJBujJkZgO3fde QT3Lc34V0wB2AGQRxGykEuyniRyiAi4AvKtPKAfUHjUnq+r+1QPJfc3wAAABle7Q dBsAAAQDAEcwRQIgbpTdpNd4mrwFT0LJCSHNgovNXAydFI5fO3Dh/256xlgCIQCy pHE2QsIWJRYPsd2X6Pij+dwc28ijjVYA48DI20O6zAB2AEmcm2neHXzs/DbezYdk prhbrwqHgBnRVVL76esp3fjDAAABle7QdC0AAAQDAEcwRQIgD9OjRZkeCDnfgMHd 2pcm5aQxlHlsSEl7IdojnsxeMJ8CIQCTazLaudmzYww9zSHwEcHWXK03UMPJJCBp Kjo11KudWTANBgkqhkiG9w0BAQsFAAOCAQEAV7cxUvgj6Fz1yj/zetm19YlH5Q9y flaw2Fx93Ymxm2ZPGEFIxhNDHPqoMRw/b2WfUjPId13UF/P6+pHL8a7P94O89AU/ 6YN4qcg4sIGZdNWOVxnQ/kI+/v7o89lJhw8xQZdKNgFAp3hpHxzOqr75oHmPSTjV OryunOCm4Fl7x1zIOpP3KIhTdgVU4DEzRfCmx4ebpyn8PifawCJ3qpeSggRDS3Aj qOq3IV7+NGJoKPEWVYlJ9ggdETJQkrvAHbIU8HMFb08ZOA/e4qCVo2VA0Ml8Yjtp WXOdYSntc76Yl0ZHYgAHlgd6JEfEMcfTFVZpZHVTSC3e+BhZVOUw4D8M1g== -----END CERTIFICATE----- subject=CN = *.take-eats.jp issuer=C = US, O = Amazon, CN = Amazon RSA 2048 M03 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 4455 bytes and written 458 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES128-GCM-SHA256 Session-ID: B99A339AE50912B58145216AC457CBDB8D34DCDC62B1D4CE1D649D231593D237 Session-ID-ctx: Master-Key: A6CB6BC5AD7D9FF232950F1904EA56B955D6E7937CEB82EA3082FF6D4B3D6694D51B78688A529FC6AD29E0A096BFD6B6 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 86400 (seconds) TLS session ticket: 0000 - 01 5c b5 24 d7 7f 99 07-41 1d 3a cd d1 c4 1d ce .\.$....A.:..... 0010 - 40 9f 8a 00 50 35 ed c3-a5 ff 9f 3a 2a b0 86 b5 @...P5.....:*... 0020 - 9e a4 a5 71 c3 0e fb 3f-eb fd bf 9c 89 bd 5b 35 ...q...?......[5 0030 - 56 ef 6d 32 63 15 a6 be-ef 06 12 c7 c3 47 9e 5d V.m2c........G.] 0040 - 0b 77 29 8a a5 4c ba 65-d3 06 64 00 89 aa c2 81 .w)..L.e..d..... 0050 - 02 cc 3d 63 8a a3 a4 54-62 c4 fc 9b 12 76 04 44 ..=c...Tb....v.D 0060 - e7 92 ae df 28 6a c1 f2-31 d2 e5 6e 40 1f e4 6b ....(j..1..n@..k 0070 - a0 cb d2 23 0f ef 93 7c-02 7c c5 ec 1c e5 48 d9 ...#...|.|....H. 0080 - a8 fd 06 7f 9f 3f fa 90-03 13 .....?.... Start Time: 1752377393 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes ---
#
OCSP response of
fujideli.take-eats.jp
from OCSP responder (Let's Encrypt)
OCSP response from OCSP responder allows only Let's Encrypt's Certificate.