Welcome to OCSP Checker.
Author: coeurl (
@debiru_R
)
This is test page for
OCSP Stapling Test
.
Test URL:
https://test-nankaicojp.take-eats.jp
Each APIs:
https://ssl.lavoscore.org/api/sslcert-expires/?q=test-nankaicojp.take-eats.jp
https://ssl.lavoscore.org/api/sslcert-expires/ocsp-stapling/?q=test-nankaicojp.take-eats.jp
https://ssl.lavoscore.org/api/sslcert-expires/ocsp/?q=test-nankaicojp.take-eats.jp
And you can
check your domain name
.
#
Certificate of
test-nankaicojp.take-eats.jp
{ "serial": "0CC13EFDE2C33B157D7658FC049D9608", "OCSP_serial": null, "OCSP_cert_status": null, "OCSP_this_update": null, "OCSP_next_update": null, "domainName": "test-nankaicojp.take-eats.jp", "port": 443, "subjectAltName": "DNS:*.take-eats.jp", "is_valid": true, "CA": "Amazon", "updated_at": "2026/03/02 09:00:00", "expires_at": "2026/09/16 08:59:59", "today": "2026/04/01 11:56:51", "UTC": { "updated_at": "2026-03-02T00:00:00Z", "expires_at": "2026-09-15T23:59:59Z", "today": "2026-04-01T02:56:51Z" }, "remaining_days": 167 }
#
OCSP response of
test-nankaicojp.take-eats.jp
from OCSP Stapling
CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = *.take-eats.jp i:C = US, O = Amazon, CN = Amazon RSA 2048 M04 a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 2 00:00:00 2026 GMT; NotAfter: Sep 15 23:59:59 2026 GMT 1 s:C = US, O = Amazon, CN = Amazon RSA 2048 M04 i:C = US, O = Amazon, CN = Amazon Root CA 1 a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Aug 23 22:26:35 2022 GMT; NotAfter: Aug 23 22:26:35 2030 GMT 2 s:C = US, O = Amazon, CN = Amazon Root CA 1 i:C = US, ST = Arizona, L = Scottsdale, O = "Starfield Technologies, Inc.", CN = Starfield Services Root Certificate Authority - G2 a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: May 25 12:00:00 2015 GMT; NotAfter: Dec 31 01:00:00 2037 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIFvTCCBKWgAwIBAgIQDME+/eLDOxV9dlj8BJ2WCDANBgkqhkiG9w0BAQsFADA8 MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRwwGgYDVQQDExNBbWF6b24g UlNBIDIwNDggTTA0MB4XDTI2MDMwMjAwMDAwMFoXDTI2MDkxNTIzNTk1OVowGTEX MBUGA1UEAwwOKi50YWtlLWVhdHMuanAwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw ggEKAoIBAQDb7lrA6cvQGWkIaO4u68cXkzzG96TaUGykFIlsFQzab52jZ8Nc+9t+ DHe9AmuXAZ5Bvy2CDjRF4JehYVtuKZ7nlMjMv0kSMXiDC1geOKunvILar1Xo2LJB D7+1w9GmVMVupDWafAoq//57byFhj3cjAG5ChprRtKSl/Ws6w2BBz6w+K7aXRGbf RZGo5dt9xfYh0mluwc2RjAoc4jorSot/c6xmm5BBRxFLNx1gYkMKtEMp37YpBQeL SU6dCgI3jTARqtNyk14IunyRrwgTuabWfIy+zrubzBoFxozS4LV0vlm8tq7UW795 fu7FNB4z8nKy5YWudY8U3elBHX277Yy5AgMBAAGjggLcMIIC2DAfBgNVHSMEGDAW gBQfUpJhVoJUf4Fm2B09CqoyXIfdCDAdBgNVHQ4EFgQUTV62kpU3RN5IdJCom5mK C+ca/dAwGQYDVR0RBBIwEIIOKi50YWtlLWVhdHMuanAwEwYDVR0gBAwwCjAIBgZn gQwBAgEwDgYDVR0PAQH/BAQDAgWgMBMGA1UdJQQMMAoGCCsGAQUFBwMBMDsGA1Ud HwQ0MDIwMKAuoCyGKmh0dHA6Ly9jcmwucjJtMDQuYW1hem9udHJ1c3QuY29tL3Iy bTA0LmNybDB1BggrBgEFBQcBAQRpMGcwLQYIKwYBBQUHMAGGIWh0dHA6Ly9vY3Nw LnIybTA0LmFtYXpvbnRydXN0LmNvbTA2BggrBgEFBQcwAoYqaHR0cDovL2NydC5y Mm0wNC5hbWF6b250cnVzdC5jb20vcjJtMDQuY2VyMAwGA1UdEwEB/wQCMAAwggF9 BgorBgEEAdZ5AgQCBIIBbQSCAWkBZwB1AMIxfldFGaNF7n843rKQQevHwiFaIr9/ 1bWtdprZDlLNAAABnKv2qUsAAAQDAEYwRAIgezGThWkZJpvYFsKb7jYIoC0N26FN WGnkxMDl2Dgh+QACICemPgzkUJjTldkw96dw6XY1lpVWXo0J/OJFGhyySiQ4AHYA 1219ENGn9XfCx+lf1wC/+YLJM1pl4dCzAXMXwMjFaXcAAAGcq/apSwAABAMARzBF AiBCQML8zDumxov4sIpzxO4z3sHTF4Jv/xjmQJD8WaNFuwIhAM/DWOcI60LAyFtA q8NKgQEUk7phNWQgJtM9dfA40JtRAHYAlE5Dh/rswe+B8xkkJqgYZQHH0184AgE/ cmd9VTcuGdgAAAGcq/apWAAABAMARzBFAiB+6UNTL/e1KDHfq7i5Uot8uIN2wTXA Sy2FwVPsKUHINwIhAIFWi0rzqXaq3sb9VQ72O2BN95BXZyNH7wEzbNCYV8WjMA0G CSqGSIb3DQEBCwUAA4IBAQC1eO5XKEkQsNbChdygFTqZWXnw1adt18PpomzXRoXj 5vPelVTAqbmbUl9i6tjeQZRc7mVh5YuyE6owF3aL+L72spolEZ4/bxhLUGtJHKBw i31HCAKDBpPy/PCWVcz6jbIYWi51PAfYvKZy7ezGEE1mtRRWsv6z8YoN/Gr7vi8x 2ebJmK44/CwiZn0vKgoHnFmB7qULZzzmcyIlEiD1rT8QKooMafUWPys9XZoKl5dV 96CtDHiUM/HPnC9IMuZNwRc6+o/4/Szj9pTG2vUp7HCumGdJNj1QkuOZKbxNvh3M Mlx9FRv98ol0x5CMsyoAkj/mQNoWVwd6Nrn9gvyQA9ia -----END CERTIFICATE----- subject=CN = *.take-eats.jp issuer=C = US, O = Amazon, CN = Amazon RSA 2048 M04 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 4445 bytes and written 465 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES128-GCM-SHA256 Session-ID: C53CEEEB523DE73CE169F40F156E9FF20D50943F70BA0CF643768A178A3DED0F Session-ID-ctx: Master-Key: 4E41E3EA12E77C1EE71FB2B34499349AF665739EC9E96EDFC4A7C9656E9EAE506962FDF1697180DFEF27CD8887BBF859 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 51488 (seconds) TLS session ticket: 0000 - 01 24 06 b1 00 78 f6 e0-06 a0 ca bf cd cf f6 7f .$...x.......... 0010 - f4 c0 6c d3 ac 5a 55 e8-60 8b c8 af 59 6d b2 c7 ..l..ZU.`...Ym.. 0020 - 5f 26 d1 5d 62 93 7f c8-20 5b 9b 3d 54 7b 24 cb _&.]b... [.=T{$. 0030 - 46 fa f9 16 7f 61 90 92-8e 50 d3 93 b8 4f fd c7 F....a...P...O.. 0040 - 0a 90 31 2a 3f 95 d2 f6-2b e1 6c 0c 6b fc 67 00 ..1*?...+.l.k.g. 0050 - 20 da 51 d3 d8 b3 1f 03-61 27 43 ea 58 37 99 e2 .Q.....a'C.X7.. 0060 - c3 79 6d 0c a4 44 76 bd-53 43 63 76 a4 b1 e8 66 .ym..Dv.SCcv...f 0070 - 4a e2 6e 91 0a a6 4b ea-52 de ed 84 d6 8f ea a4 J.n...K.R....... 0080 - aa 39 46 44 62 37 ee bf-1a 72 .9FDb7...r Start Time: 1775012211 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes ---
#
OCSP response of
test-nankaicojp.take-eats.jp
from OCSP responder (Let's Encrypt)
OCSP response from OCSP responder allows only Let's Encrypt's Certificate.