Welcome to OCSP Checker.
Author: coeurl (
@debiru_R
)
This is test page for
OCSP Stapling Test
.
Test URL:
https://kintetsu-mie.take-eats.jp
Each APIs:
https://ssl.lavoscore.org/api/sslcert-expires/?q=kintetsu-mie.take-eats.jp
https://ssl.lavoscore.org/api/sslcert-expires/ocsp-stapling/?q=kintetsu-mie.take-eats.jp
https://ssl.lavoscore.org/api/sslcert-expires/ocsp/?q=kintetsu-mie.take-eats.jp
And you can
check your domain name
.
#
Certificate of
kintetsu-mie.take-eats.jp
{ "serial": "031DAEC5E58FA1C811E96A8C4F00C9B2", "OCSP_serial": null, "OCSP_cert_status": null, "OCSP_this_update": null, "OCSP_next_update": null, "domainName": "kintetsu-mie.take-eats.jp", "port": 443, "subjectAltName": "DNS:*.take-eats.jp", "is_valid": true, "CA": "Amazon", "updated_at": "2025/04/01 09:00:00", "expires_at": "2026/05/01 08:59:59", "today": "2026/01/01 08:10:13", "UTC": { "updated_at": "2025-04-01T00:00:00Z", "expires_at": "2026-04-30T23:59:59Z", "today": "2025-12-31T23:10:13Z" }, "remaining_days": 120 }
#
OCSP response of
kintetsu-mie.take-eats.jp
from OCSP Stapling
CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = *.take-eats.jp i:C = US, O = Amazon, CN = Amazon RSA 2048 M03 a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Apr 1 00:00:00 2025 GMT; NotAfter: Apr 30 23:59:59 2026 GMT 1 s:C = US, O = Amazon, CN = Amazon RSA 2048 M03 i:C = US, O = Amazon, CN = Amazon Root CA 1 a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Aug 23 22:26:04 2022 GMT; NotAfter: Aug 23 22:26:04 2030 GMT 2 s:C = US, O = Amazon, CN = Amazon Root CA 1 i:C = US, ST = Arizona, L = Scottsdale, O = "Starfield Technologies, Inc.", CN = Starfield Services Root Certificate Authority - G2 a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: May 25 12:00:00 2015 GMT; NotAfter: Dec 31 01:00:00 2037 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIFxzCCBK+gAwIBAgIQAx2uxeWPocgR6WqMTwDJsjANBgkqhkiG9w0BAQsFADA8 MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRwwGgYDVQQDExNBbWF6b24g UlNBIDIwNDggTTAzMB4XDTI1MDQwMTAwMDAwMFoXDTI2MDQzMDIzNTk1OVowGTEX MBUGA1UEAwwOKi50YWtlLWVhdHMuanAwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw ggEKAoIBAQCzLZoPaj0f+CU8SJi42/kZsfmriBVo8qxmskQGp795CXwFVbAIm8p0 AFiwk6SgSQ03wb/e2CYhARYlE2Hxpu3/yEgrA2fCwhPZ9BkHeXOQ35n9hQLcb55J cdLK5WEtJzAeipSMB4KLq7RcQu87aVAtDBYSnvq0imcTb4XR2F4zb+KCOC7KDrMB KKKoqXs9Wofy4Iw7hSGVttwkSUaXQU2cp8FRvXpUHUQY/t6LtEsHg+2oWahISf9y xcxTMoRzcS2jxLbnSrkXzLh/59VswzrDx8D7An//oVl54Btx/pfOQXAqyof0h8FV FNLcMHAKAa9N/nTjmUXNjFDIP30RcsVVAgMBAAGjggLmMIIC4jAfBgNVHSMEGDAW gBRV2Rhf0hzMAeFYtL6r2VVCAdcuAjAdBgNVHQ4EFgQUorPYSwI4sZY3HPyReCx7 jQFOcKIwGQYDVR0RBBIwEIIOKi50YWtlLWVhdHMuanAwEwYDVR0gBAwwCjAIBgZn gQwBAgEwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF BQcDAjA7BgNVHR8ENDAyMDCgLqAshipodHRwOi8vY3JsLnIybTAzLmFtYXpvbnRy dXN0LmNvbS9yMm0wMy5jcmwwdQYIKwYBBQUHAQEEaTBnMC0GCCsGAQUFBzABhiFo dHRwOi8vb2NzcC5yMm0wMy5hbWF6b250cnVzdC5jb20wNgYIKwYBBQUHMAKGKmh0 dHA6Ly9jcnQucjJtMDMuYW1hem9udHJ1c3QuY29tL3IybTAzLmNlcjAMBgNVHRMB Af8EAjAAMIIBfQYKKwYBBAHWeQIEAgSCAW0EggFpAWcAdQCWl2S/VViXrfdDh2g3 CEJ36fA61fak8zZuRqQ/D8qpxgAAAZXu0HQpAAAEAwBGMEQCIA9pxzXdyxTFBAgX hdIgPFK8ggA3c+yiiXXMmTeccDYCAiA+8Aj5mE7KxsVWq/Adp4tJBujJkZgO3fde QT3Lc34V0wB2AGQRxGykEuyniRyiAi4AvKtPKAfUHjUnq+r+1QPJfc3wAAABle7Q dBsAAAQDAEcwRQIgbpTdpNd4mrwFT0LJCSHNgovNXAydFI5fO3Dh/256xlgCIQCy pHE2QsIWJRYPsd2X6Pij+dwc28ijjVYA48DI20O6zAB2AEmcm2neHXzs/DbezYdk prhbrwqHgBnRVVL76esp3fjDAAABle7QdC0AAAQDAEcwRQIgD9OjRZkeCDnfgMHd 2pcm5aQxlHlsSEl7IdojnsxeMJ8CIQCTazLaudmzYww9zSHwEcHWXK03UMPJJCBp Kjo11KudWTANBgkqhkiG9w0BAQsFAAOCAQEAV7cxUvgj6Fz1yj/zetm19YlH5Q9y flaw2Fx93Ymxm2ZPGEFIxhNDHPqoMRw/b2WfUjPId13UF/P6+pHL8a7P94O89AU/ 6YN4qcg4sIGZdNWOVxnQ/kI+/v7o89lJhw8xQZdKNgFAp3hpHxzOqr75oHmPSTjV OryunOCm4Fl7x1zIOpP3KIhTdgVU4DEzRfCmx4ebpyn8PifawCJ3qpeSggRDS3Aj qOq3IV7+NGJoKPEWVYlJ9ggdETJQkrvAHbIU8HMFb08ZOA/e4qCVo2VA0Ml8Yjtp WXOdYSntc76Yl0ZHYgAHlgd6JEfEMcfTFVZpZHVTSC3e+BhZVOUw4D8M1g== -----END CERTIFICATE----- subject=CN = *.take-eats.jp issuer=C = US, O = Amazon, CN = Amazon RSA 2048 M03 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 4455 bytes and written 462 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES128-GCM-SHA256 Session-ID: 7ED4A7B0A41C5915D6D0478EF730F8929FBC3BD332BEA285509E2CE8BB1257C4 Session-ID-ctx: Master-Key: 4ECEE410C7CE6FC1D2A71CA1F210D792F0655CF60359E620D86F489205EE96B3E8A27A9D85E17521F59DF209DB0A3A3F PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 50386 (seconds) TLS session ticket: 0000 - 01 1b 5c b3 ef 58 0c e5-47 f1 f9 46 50 5c 84 06 ..\..X..G..FP\.. 0010 - 3a 8d 57 fd 87 f5 47 db-ca 6a dd 93 64 8b 6b fd :.W...G..j..d.k. 0020 - 69 ef 40 7f 12 13 09 a1-aa 15 da b8 b0 45 42 21 i.@..........EB! 0030 - c6 e3 61 e0 41 19 04 b0-56 2a 36 4b 69 39 15 cf ..a.A...V*6Ki9.. 0040 - 9b ac 49 d6 fe 7c b9 09-a6 ac 9b 99 f0 04 d1 47 ..I..|.........G 0050 - bf d2 ad e9 43 65 cf 41-dd 9e 50 a3 85 47 2a 78 ....Ce.A..P..G*x 0060 - 05 ec e5 93 75 30 1d 5a-34 b7 da 5c 0e d3 85 68 ....u0.Z4..\...h 0070 - bb c3 41 9f b3 74 ff 78-03 4c 2c b8 e6 5a e2 21 ..A..t.x.L,..Z.! 0080 - 3e 99 f5 e9 69 72 b6 71-41 a2 >...ir.qA. Start Time: 1767222613 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes ---
#
OCSP response of
kintetsu-mie.take-eats.jp
from OCSP responder (Let's Encrypt)
OCSP response from OCSP responder allows only Let's Encrypt's Certificate.