Welcome to OCSP Checker.
Author: coeurl (
@debiru_R
)
This is test page for
OCSP Stapling Test
.
Test URL:
https://www.partners.manduka.jp
Each APIs:
https://ssl.lavoscore.org/api/sslcert-expires/?q=www.partners.manduka.jp
https://ssl.lavoscore.org/api/sslcert-expires/ocsp-stapling/?q=www.partners.manduka.jp
https://ssl.lavoscore.org/api/sslcert-expires/ocsp/?q=www.partners.manduka.jp
And you can
check your domain name
.
#
Certificate of
www.partners.manduka.jp
{ "serial": "1CE68D5060A46D64E07020C733B3B049", "OCSP_serial": "1CE68D5060A46D64E07020C733B3B049", "OCSP_cert_status": "good", "OCSP_this_update": "Mar 31 04:58:05 2026 GMT", "OCSP_next_update": "Apr 7 04:58:04 2026 GMT", "domainName": "www.partners.manduka.jp", "port": 443, "subjectAltName": "DNS:www.partners.manduka.jp", "is_valid": true, "CA": "ZeroSSL", "updated_at": "2026/03/26 09:00:00", "expires_at": "2026/06/25 08:59:59", "today": "2026/04/01 10:31:18", "UTC": { "updated_at": "2026-03-26T00:00:00Z", "expires_at": "2026-06-24T23:59:59Z", "today": "2026-04-01T01:31:18Z" }, "remaining_days": 84 }
#
OCSP response of
www.partners.manduka.jp
from OCSP Stapling
CONNECTED(00000003) OCSP response: ====================================== OCSP Response Data: OCSP Response Status: successful (0x0) Response Type: Basic OCSP Response Version: 1 (0x0) Responder Id: 0F6BE64BCE3947AEF67E901E79F0309192C85FA3 Produced At: Mar 31 04:58:05 2026 GMT Responses: Certificate ID: Hash Algorithm: sha1 Issuer Name Hash: 331FFE3FFD0B8416284F948D56C07E0392D8F64D Issuer Key Hash: 0F6BE64BCE3947AEF67E901E79F0309192C85FA3 Serial Number: 1CE68D5060A46D64E07020C733B3B049 Cert Status: good This Update: Mar 31 04:58:05 2026 GMT Next Update: Apr 7 04:58:04 2026 GMT Signature Algorithm: ecdsa-with-SHA384 Signature Value: 30:64:02:30:6d:c4:cb:cf:a4:0c:1d:8d:20:48:a9:24:5e:20: 87:c0:3e:45:16:c9:87:44:27:74:88:13:29:ea:8c:19:d4:61: 9c:2c:ee:a9:b4:68:a6:8a:a6:0e:9a:c4:ce:3c:ff:16:02:30: 66:7f:68:97:44:56:84:a6:cc:da:ad:9c:29:79:5f:86:12:21: ed:b2:30:2c:0d:ef:07:e7:40:1c:f8:e1:5c:b6:52:68:e9:01: c6:68:24:93:01:10:f6:36:15:25:a7:9d ====================================== --- Certificate chain 0 s:CN = www.partners.manduka.jp i:C = AT, O = ZeroSSL, CN = ZeroSSL ECC Domain Secure Site CA a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Mar 26 00:00:00 2026 GMT; NotAfter: Jun 24 23:59:59 2026 GMT 1 s:C = AT, O = ZeroSSL, CN = ZeroSSL ECC Domain Secure Site CA i:C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust ECC Certification Authority a:PKEY: id-ecPublicKey, 384 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Jan 30 00:00:00 2020 GMT; NotAfter: Jan 29 23:59:59 2030 GMT 2 s:C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust ECC Certification Authority i:C = GB, ST = Greater Manchester, L = Salford, O = Comodo CA Limited, CN = AAA Certificate Services a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA384 v:NotBefore: Mar 12 00:00:00 2019 GMT; NotAfter: Dec 31 23:59:59 2028 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIECDCCA46gAwIBAgIQHOaNUGCkbWTgcCDHM7OwSTAKBggqhkjOPQQDAzBLMQsw CQYDVQQGEwJBVDEQMA4GA1UEChMHWmVyb1NTTDEqMCgGA1UEAxMhWmVyb1NTTCBF Q0MgRG9tYWluIFNlY3VyZSBTaXRlIENBMB4XDTI2MDMyNjAwMDAwMFoXDTI2MDYy NDIzNTk1OVowIjEgMB4GA1UEAxMXd3d3LnBhcnRuZXJzLm1hbmR1a2EuanAwWTAT BgcqhkjOPQIBBggqhkjOPQMBBwNCAARf4N68NlbCoQHS0gH1d6X7MlqFbycr/Kjz KAoY2vRNVwrxHy9nj4oVwgkKKdYnuFW1bsIdWWaaJKmY9GeAjIRCo4ICezCCAncw HwYDVR0jBBgwFoAUD2vmS845R672fpAeefAwkZLIX6MwHQYDVR0OBBYEFDd/iJ1a wfhh+MWH0rk8guK9A73HMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMG A1UdJQQMMAoGCCsGAQUFBwMBMEkGA1UdIARCMEAwNAYLKwYBBAGyMQECAk4wJTAj BggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQIBMIGI BggrBgEFBQcBAQR8MHowSwYIKwYBBQUHMAKGP2h0dHA6Ly96ZXJvc3NsLmNydC5z ZWN0aWdvLmNvbS9aZXJvU1NMRUNDRG9tYWluU2VjdXJlU2l0ZUNBLmNydDArBggr BgEFBQcwAYYfaHR0cDovL3plcm9zc2wub2NzcC5zZWN0aWdvLmNvbTCCAQYGCisG AQQB1nkCBAIEgfcEgfQA8gB3AA5XlLzzrqk+MxssmQez95Dfm8I9cTIl3SGpJaxh xU4hAAABnSwn7p8AAAQDAEgwRgIhANI2fAJGf9X7p09phvFSs7ys0plhBd5fl7De lUBNFbPHAiEA/mwGRTevL8bj1lSTIKI3o8Ze/75eKW3pRJyYY08wuQ0AdwAWgy2r 8KklDw/wOqVF/8i/yCPQh0v2BCkn+OcfMxP1+gAAAZ0sJ+7YAAAEAwBIMEYCIQCW fv3QIMMKb6i+sFhSDq2fIVfpx4AgAwX5aPQUfkswtAIhAM9HQntGad8hPlsStiIg t+i0qEmT9qkAyxs47vNCtIe1MCIGA1UdEQQbMBmCF3d3dy5wYXJ0bmVycy5tYW5k dWthLmpwMAoGCCqGSM49BAMDA2gAMGUCMAel+eFspSmd/RM9cRR8w/5X3Mr9gAGj s+F1utgkOshQH7Yw3pCvIy/+jBVdq2BBlgIxAO98YvB70YxvqC/gSX0Qom6z9oUi 7b7tskgHsU5FFpHQYHR9URj3KN+xFIW4/4WX3g== -----END CERTIFICATE----- subject=CN = www.partners.manduka.jp issuer=C = AT, O = ZeroSSL, CN = ZeroSSL ECC Domain Secure Site CA --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 3612 bytes and written 398 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 47D61E7B8F0AAD62A6F5C8E8D4FEACBC60D1493047DF9678ACB52F1857972181 Session-ID-ctx: Resumption PSK: B8A03B1A32406B4969F6BA157E9D65F535D576223E729F6AAD7E6E565EE3BABA PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - e1 b1 33 3e a8 44 2c 14-41 77 fd 84 60 dc ab 69 ..3>.D,.Aw..`..i 0010 - 3f 4f f8 f4 e3 b8 81 18-9d 4e 6c 2b 2d d8 58 c5 ?O.......Nl+-.X. 0020 - d7 f1 bc da 6f 9e ba de-ce 91 68 4d 17 a5 b7 82 ....o.....hM.... 0030 - e3 8e d4 db 14 2b ae b0-1b cc 07 47 e9 d7 18 55 .....+.....G...U 0040 - fb eb aa 88 2f be 11 f4-ed 7a da f3 36 e6 0b 13 ..../....z..6... 0050 - 95 05 09 f5 41 31 c5 14-0f 38 58 0f f2 93 e1 14 ....A1...8X..... 0060 - 90 41 32 74 2d b0 43 6d-39 .A2t-.Cm9 Start Time: 1775007080 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK
#
OCSP response of
www.partners.manduka.jp
from OCSP responder (Let's Encrypt)
OCSP response from OCSP responder allows only Let's Encrypt's Certificate.