Collections:
Other Resources:
*.odnoklassniki.ru, Odnoklassniki Ltd, L=Moscow, RU
Certificate summary -
Owner: *.odnoklassniki.ru, Odnoklassniki Ltd, L=Moscow, RU
Issuer: DigiCert High Assurance CA-3, www.digicert.com, DigiCert Inc, US
Expiration: Wed Nov 05 07:00:00 EST 2014
MD5: 80:2F:C4:9E:3E:60:64:7D:AB:96:B8:E6:0C:43:6C:49
Hash: Owner Hash=ade7e254, Issuer Hash=1445ed77
✍: FYIcenter.com
Information extracted out of the certificate:
Owner: CN=*.odnoklassniki.ru, O=Odnoklassniki Ltd, L=Moscow, C=RU Issuer: CN=DigiCert High Assurance CA-3, OU=www.digicert.com, O=DigiCert Inc, C=US Serial number: dab3b3f95f140fd5c8a84db69259efb Valid from: Mon Jul 09 20:00:00 EDT 2012 until: Wed Nov 05 07:00:00 EST 2014 Certificate fingerprints: MD5: 80:2F:C4:9E:3E:60:64:7D:AB:96:B8:E6:0C:43:6C:49 SHA1: 59:4F:BD:B1:6A:C2:6C:0F:02:20:04:CC:9F:28:58:DA:76:CC:28:06 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] #2: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] #3: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 7D 38 29 94 B0 95 30 47 DE AF B8 6D 3E 45 F3 A8 .8)...0G...m>E.. 0010: 0B A9 1F A9 .... ] ] #4: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: 1.3.6.1.5.5.7.48.1 accessLocation: URIName: http://ocsp.digicert.com, accessMethod: 1.3.6.1.5.5.7.48.2 accessLocation: URIName: http://cacerts.digicert.com/DigiCertHighAssuranceCA-3.crt] ] #5: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://crl3.digicert.com/ca3-g11.crl] , DistributionPoint: [URIName: http://crl4.digicert.com/ca3-g11.crl] ]] #6: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.114412.1.1] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 2E 68 74 74 70 3A 2F 2F 77 77 77 2E 64 69 67 ..http://www.dig 0010: 69 63 65 72 74 2E 63 6F 6D 2F 73 73 6C 2D 63 70 icert.com/ssl-cp 0020: 73 2D 72 65 70 6F 73 69 74 6F 72 79 2E 68 74 6D s-repository.htm ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 82 01 56 1E 82 01 52 00 41 00 6E 00 79 00 20 0..V...R.A.n.y. 0010: 00 75 00 73 00 65 00 20 00 6F 00 66 00 20 00 74 .u.s.e. .o.f. .t 0020: 00 68 00 69 00 73 00 20 00 43 00 65 00 72 00 74 .h.i.s. .C.e.r.t 0030: 00 69 00 66 00 69 00 63 00 61 00 74 00 65 00 20 .i.f.i.c.a.t.e. 0040: 00 63 00 6F 00 6E 00 73 00 74 00 69 00 74 00 75 .c.o.n.s.t.i.t.u 0050: 00 74 00 65 00 73 00 20 00 61 00 63 00 63 00 65 .t.e.s. .a.c.c.e 0060: 00 70 00 74 00 61 00 6E 00 63 00 65 00 20 00 6F .p.t.a.n.c.e. .o 0070: 00 66 00 20 00 74 00 68 00 65 00 20 00 44 00 69 .f. .t.h.e. .D.i 0080: 00 67 00 69 00 43 00 65 00 72 00 74 00 20 00 43 .g.i.C.e.r.t. .C 0090: 00 50 00 2F 00 43 00 50 00 53 00 20 00 61 00 6E .P./.C.P.S. .a.n 00A0: 00 64 00 20 00 74 00 68 00 65 00 20 00 52 00 65 .d. .t.h.e. .R.e 00B0: 00 6C 00 79 00 69 00 6E 00 67 00 20 00 50 00 61 .l.y.i.n.g. .P.a 00C0: 00 72 00 74 00 79 00 20 00 41 00 67 00 72 00 65 .r.t.y. .A.g.r.e 00D0: 00 65 00 6D 00 65 00 6E 00 74 00 20 00 77 00 68 .e.m.e.n.t. .w.h 00E0: 00 69 00 63 00 68 00 20 00 6C 00 69 00 6D 00 69 .i.c.h. .l.i.m.i 00F0: 00 74 00 20 00 6C 00 69 00 61 00 62 00 69 00 6C .t. .l.i.a.b.i.l 0100: 00 69 00 74 00 79 00 20 00 61 00 6E 00 64 00 20 .i.t.y. .a.n.d. 0110: 00 61 00 72 00 65 00 20 00 69 00 6E 00 63 00 6F .a.r.e. .i.n.c.o 0120: 00 72 00 70 00 6F 00 72 00 61 00 74 00 65 00 64 .r.p.o.r.a.t.e.d 0130: 00 20 00 68 00 65 00 72 00 65 00 69 00 6E 00 20 . .h.e.r.e.i.n. 0140: 00 62 00 79 00 20 00 72 00 65 00 66 00 65 00 72 .b.y. .r.e.f.e.r 0150: 00 65 00 6E 00 63 00 65 00 2E .e.n.c.e.. ]] ] ] #7: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth ] #8: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] #9: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: *.odnoklassniki.ru DNSName: odnoklassniki.ru ]
Certificate in PEM format (Base64 encoded X.509):
-----BEGIN CERTIFICATE----- MIIGozCCBYugAwIBAgIQDas7P5XxQP1cioTbaSWe+zANBgkqhkiG9w0BAQUFADBm MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSUwIwYDVQQDExxEaWdpQ2VydCBIaWdoIEFzc3VyYW5j ZSBDQS0zMB4XDTEyMDcxMDAwMDAwMFoXDTE0MTEwNTEyMDAwMFowVzELMAkGA1UE BhMCUlUxDzANBgNVBAcTBk1vc2NvdzEaMBgGA1UEChMRT2Rub2tsYXNzbmlraSBM dGQxGzAZBgNVBAMMEioub2Rub2tsYXNzbmlraS5ydTCCASIwDQYJKoZIhvcNAQEB BQADggEPADCCAQoCggEBANFozwWcf/ghgO0CW2dJCoEghzXAAM3TCVHde+xv9TWL UQvK83ixTtv5Y3FH/Jr1hOj56NAKDh9743pxPnCsr1kZpamNoKIykirtBRLxlWSs 3UaB1N5fc+yRtUZ+dmwOLxCVKMcyt0MmJO9jQtQGzCxbeqfuz8k+tnUBv9BP13n9 PTaMECmqJ8Os+70D5nApa1z2ZRF6sK3weJhQuLZQuPn1EfIUCSAfwpHfiXaJ6tNM M260sPL0BXu9NRDQ4ZeTqcYqnrn0j3UnwK8lxDpwTHTMgsAy51oHmH9kx7BUHRAv a9SIxlBhEAoFpGE+PDynIK8QhMdi/EabVjcxtfxnDWcCAwEAAaOCA1owggNWMB8G A1UdIwQYMBaAFFDqc4nbKfsQj57lASDU3nmZSIP3MB0GA1UdDgQWBBR9OCmUsJUw R96vuG0+RfOoC6kfqTAvBgNVHREEKDAmghIqLm9kbm9rbGFzc25pa2kucnWCEG9k bm9rbGFzc25pa2kucnUwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUF BwMBBggrBgEFBQcDAjBhBgNVHR8EWjBYMCqgKKAmhiRodHRwOi8vY3JsMy5kaWdp Y2VydC5jb20vY2EzLWcxMS5jcmwwKqAooCaGJGh0dHA6Ly9jcmw0LmRpZ2ljZXJ0 LmNvbS9jYTMtZzExLmNybDCCAcQGA1UdIASCAbswggG3MIIBswYJYIZIAYb9bAEB MIIBpDA6BggrBgEFBQcCARYuaHR0cDovL3d3dy5kaWdpY2VydC5jb20vc3NsLWNw cy1yZXBvc2l0b3J5Lmh0bTCCAWQGCCsGAQUFBwICMIIBVh6CAVIAQQBuAHkAIAB1 AHMAZQAgAG8AZgAgAHQAaABpAHMAIABDAGUAcgB0AGkAZgBpAGMAYQB0AGUAIABj AG8AbgBzAHQAaQB0AHUAdABlAHMAIABhAGMAYwBlAHAAdABhAG4AYwBlACAAbwBm ACAAdABoAGUAIABEAGkAZwBpAEMAZQByAHQAIABDAFAALwBDAFAAUwAgAGEAbgBk ACAAdABoAGUAIABSAGUAbAB5AGkAbgBnACAAUABhAHIAdAB5ACAAQQBnAHIAZQBl AG0AZQBuAHQAIAB3AGgAaQBjAGgAIABsAGkAbQBpAHQAIABsAGkAYQBiAGkAbABp AHQAeQAgAGEAbgBkACAAYQByAGUAIABpAG4AYwBvAHIAcABvAHIAYQB0AGUAZAAg AGgAZQByAGUAaQBuACAAYgB5ACAAcgBlAGYAZQByAGUAbgBjAGUALjB7BggrBgEF BQcBAQRvMG0wJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBF BggrBgEFBQcwAoY5aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 SGlnaEFzc3VyYW5jZUNBLTMuY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQEF BQADggEBADgW2UJXMXsiWg0ikeVvSs5ZgpatCic+yjRnufgTL24cmvgv2FEqk1Yn b9V6Wqfx0RWuSuX5/tqyFldoShAqxGu9Pii9fzN5rvarBU6yNXp23AXTqQ9iB3zH cGbrGVjqTlcYaEYZq51R01vmbESNZYtqsYOLfe5AAJH/UOu4gkYWKnkTnsSqupQH jzzwpwm/nTEAdBTTRjasgc+AxNQjFabh3+u/NIZQ2427h0+pUBS5RXZ6ysxNOnfj djtbekip87+1Zvem3ogDxlgWEQRSJDEvLQHYS9GFhUuBV0lCQfEyATLflozk7Mkr Jyo81qIv2Swfv5WBx+9ZmOtR7Vgq+VY= -----END CERTIFICATE-----
Visit the Web site using this certificate: https://www.odnoklassniki.ru
2013-03-25, 6770🔥, 0💬
Popular Posts:
You can use the Certificates snap-in to manage certificates for a user, computer, or service account...
What is the process of verifying the signed document with RSA keys using OpenSSL commands? I receive...
Certificate Summary: Subject: www.amazon.cn Issuer: VeriSign Class 3 Secure Server CA - G3 Expiratio...
Certificate summary - Owner: USERTrust Legacy Secure Server CA, The USERTRUST Network, L=Salt Lake C...
How to extract the public key from an RSA key file using OpenSSL "rsa" command? If you want to extra...