Collections:
Other Resources:
*.edublogs.org, EssentialSSL Wildcard, Domain Control Validated
Certificate summary -
Owner: *.edublogs.org, EssentialSSL Wildcard, Domain Control Validated
Issuer: EssentialSSL CA, COMODO CA Limited, L=Salford, ST=Greater Manchester, GB
Expiration: Tue Sep 16 19:59:59 EDT 2014
MD5: B5:52:60:68:F0:0D:E6:7B:22:B1:C1:BD:F3:67:15:BA
Hash: Owner Hash=128d6124, Issuer Hash=3b07e61e
✍: FYIcenter.com
Information extracted out of the certificate:
Owner: CN=*.edublogs.org, OU=EssentialSSL Wildcard, OU=Domain Control Validated Issuer: CN=EssentialSSL CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Serial number: 8814bf3d72845fbfa62f30c540cf26b2 Valid from: Sat Sep 15 20:00:00 EDT 2012 until: Tue Sep 16 19:59:59 EDT 2014 Certificate fingerprints: MD5: B5:52:60:68:F0:0D:E6:7B:22:B1:C1:BD:F3:67:15:BA SHA1: 02:33:63:7C:1B:A7:D4:D0:57:55:3E:94:1C:9D:F5:2E:4E:CA:EF:84 SHA256: 23:4C:C2:21:90:37:32:5A:6B:32:5E:76:3B:45:20:63:E2:10:F1:C9:78:BD:8A:E5:F7: 30:A6:D5:75:07:8F:18 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://crt.comodoca.com/EssentialSSLCA_2.crt , accessMethod: ocsp accessLocation: URIName: http://ocsp.comodoca.com ] ] #2: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: DA CB EA AD 5B 08 5D CC FF FC 26 54 CE 49 E5 55 ....[.]...&T.I.U 0010: C6 38 F4 F8 .8.. ] ] #3: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] #4: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/EssentialSSLCA.crl] ]] #5: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.2.7] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1D 68 74 74 70 73 3A 2F 2F 73 65 63 75 72 65 ..https://secure 0010: 2E 63 6F 6D 6F 64 6F 2E 63 6F 6D 2F 43 50 53 .comodo.com/CPS ]] ] ] #6: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth 1.3.6.1.4.1.311.10.3.3 2.16.840.1.113730.4.1 ] #7: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] #8: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: *.edublogs.org DNSName: edublogs.org ] #9: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: AE B4 7E EF CD 7F 62 96 99 04 29 09 AC 8A 4C 92 ......b...)...L. 0010: 8C B7 1A 5C ...\ ] ]
Certificate in PEM format (Base64 encoded X.509):
-----BEGIN CERTIFICATE----- MIIFEDCCA/igAwIBAgIRAIgUvz1yhF+/pi8wxUDPJrIwDQYJKoZIhvcNAQEFBQAw cjELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxGDAWBgNV BAMTD0Vzc2VudGlhbFNTTCBDQTAeFw0xMjA5MTYwMDAwMDBaFw0xNDA5MTYyMzU5 NTlaMFwxITAfBgNVBAsTGERvbWFpbiBDb250cm9sIFZhbGlkYXRlZDEeMBwGA1UE CxMVRXNzZW50aWFsU1NMIFdpbGRjYXJkMRcwFQYDVQQDFA4qLmVkdWJsb2dzLm9y ZzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALcakSwlMsW5o7oRLibY M4DWle2dW8A5YzR5VuDVqkTqMsw9boATuSZKoTufhvVnwRQtgDQoq8jKqFOtd/ty OgT/Fp7f4IuknULoFxm95YK4ZyKnZLM+JIa6D3+uLOibctowCfLRdv6PemRlAcdo xVHdioH9WNov0p1RMtGeJx0mF/hsfATenLVlebr9cNAQW7J06DpGgnZVWIRS6ZAU uHGaCFW6/gWaGHnP6PLAlDXcrtxUSm8QLWv+6ZkVXeMxSEoHR5vwNjpuhBaBQjFT opNh65+jjTxX9RBmumWJJpEcIcZGZ9a7+q++xy2b1qEOGdN06vIHMpdPBpib9lMs O6UCAwEAAaOCAbUwggGxMB8GA1UdIwQYMBaAFNrL6q1bCF3M//wmVM5J5VXGOPT4 MB0GA1UdDgQWBBSutH7vzX9ilpkEKQmsikySjLcaXDAOBgNVHQ8BAf8EBAMCBaAw DAYDVR0TAQH/BAIwADA0BgNVHSUELTArBggrBgEFBQcDAQYIKwYBBQUHAwIGCisG AQQBgjcKAwMGCWCGSAGG+EIEATBFBgNVHSAEPjA8MDoGCysGAQQBsjEBAgIHMCsw KQYIKwYBBQUHAgEWHWh0dHBzOi8vc2VjdXJlLmNvbW9kby5jb20vQ1BTMDsGA1Ud HwQ0MDIwMKAuoCyGKmh0dHA6Ly9jcmwuY29tb2RvY2EuY29tL0Vzc2VudGlhbFNT TENBLmNybDBuBggrBgEFBQcBAQRiMGAwOAYIKwYBBQUHMAKGLGh0dHA6Ly9jcnQu Y29tb2RvY2EuY29tL0Vzc2VudGlhbFNTTENBXzIuY3J0MCQGCCsGAQUFBzABhhho dHRwOi8vb2NzcC5jb21vZG9jYS5jb20wJwYDVR0RBCAwHoIOKi5lZHVibG9ncy5v cmeCDGVkdWJsb2dzLm9yZzANBgkqhkiG9w0BAQUFAAOCAQEATgeQSJA12aE8a6dI OfOLXowIOtO4oMfqZDZpxdcCbJENkACt+iVlZI5j0pRN1MBSXqtOL0bR7/diQAqx PNqBzVi57gsPeTFwj6blJLdFWZ8kPAj7V7uK1HgzcbPzoqzZue1KlSxthUzmeLDj OI5+9gfod7GvanKb6HOnAf12pmYLzcc0WaRkgYarvuqF9WUyho+0ebGeLgcYP42U PunHjGQDTMs0RbBTypm+sps2WiYFbRuS6dnSSsrJh52eePr1VR/eleGK6j0WOAUg mbaNurR7OCr93BQvwPvvLaB8Id0pI72T0QWxjetSESGzu22qlQcp8tLXTOms/EXF GNVLpg== -----END CERTIFICATE-----
Visit the Web site using this certificate: https://www.edublogs.org
2014-06-18, 4826🔥, 0💬
Popular Posts:
After signing for the Root and Intermediate CA. when i try to sign a server_cert the following error...
Certificate summary - Owner: *.zippyshare.com, Domain Control Validated Issuer: AlphaSSL CA - G2, Al...
Why I am getting the "variable lookup failed for ca::default_ca" error when running OpenSSL "ca" com...
Certificate summary - Owner: EMAILADDRESS=info@plesk. com,plesk, Plesk, Parallels, L=Herndon, ST=Vir...
How to export my private key and public key pair with it's certificates into a PKCS #12 keystore fil...