Collections:
Other Resources:
passport.58.com, Terms of use at www.verisign.com/rpa (c)05, ...
Certificate summary -
Owner: passport.58.com, Terms of use at www.verisign.com/rpa (c)05, Administration Department, "Beijing 58 Information Technology Co.,Ltd.", L=Beijing, ST=Beijing, CN
Issuer: VeriSign Class 3 International Server CA - G3, Terms of use at https://www.verisign.com/rpa (c)10, VeriSign Trust Network, "VeriSign, Inc.", US
Expiration: Thu Dec 19 18:59:59 EST 2013
MD5: A3:B9:C9:2D:E0:CA:2B:C9:3F:22:0D:BB:94:E3:37:A8
Hash: Owner Hash=79b0d241, Issuer Hash=876bdba8
✍: FYIcenter.com
Information extracted out of the certificate:
Owner: CN=passport.58.com, OU=Terms of use at www.verisign.com/rpa (c)05,
OU=Administration Department, O="Beijing 58 Information Technology
Co.,Ltd.", L=Beijing, ST=Beijing, C=CN
Issuer: CN=VeriSign Class 3 International Server CA - G3, OU=Terms of use
at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network,
O="VeriSign, Inc.", C=US
Serial number: 1184722225ff50e1865a8c4f6ca3d01f
Valid from: Mon Dec 19 19:00:00 EST 2011 until: Thu Dec 19 18:59:59 EST
2013
Certificate fingerprints:
MD5: A3:B9:C9:2D:E0:CA:2B:C9:3F:22:0D:BB:94:E3:37:A8
SHA1: 04:5D:DA:41:49:4A:34:25:C1:0F:52:87:6E:C4:8C:F4:C6:30:AD:19
Signature algorithm name: SHA1withRSA
Version: 3
Extensions:
#1: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
DigitalSignature
Key_Encipherment
]
#2: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: 1.3.6.1.5.5.7.48.1
accessLocation: URIName: http://ocsp.verisign.com,
accessMethod: 1.3.6.1.5.5.7.48.2
accessLocation: URIName:
http://SVRIntl-G3-aia.verisign.com/SVRIntlG3.cer]
]
#3: ObjectId: 1.3.6.1.5.5.7.1.12 Criticality=false
#4: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: http://SVRIntl-G3-crl.verisign.com/SVRIntlG3.crl]
]]
#5: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.16.840.1.113733.1.7.23.3]
[PolicyQualifierInfo: [
qualifierID: 1.3.6.1.5.5.7.2.1
qualifier: 0000: 16 1C 68 74 74 70 73 3A 2F 2F 77 77 77 2E 76 65
..https://www.ve
0010: 72 69 73 69 67 6E 2E 63 6F 6D 2F 72 70 61 risign.com/rpa
]] ]
]
#6: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
clientAuth
2.16.840.1.113730.4.1
]
#7: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]
Certificate in PEM format (Base64 encoded X.509):
-----BEGIN CERTIFICATE----- MIIF1jCCBL6gAwIBAgIQEYRyIiX/UOGGWoxPbKPQHzANBgkqhkiG9w0BAQUFADCB vDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQL ExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTswOQYDVQQLEzJUZXJtcyBvZiB1c2Ug YXQgaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JwYSAoYykxMDE2MDQGA1UEAxMt VmVyaVNpZ24gQ2xhc3MgMyBJbnRlcm5hdGlvbmFsIFNlcnZlciBDQSAtIEczMB4X DTExMTIyMDAwMDAwMFoXDTEzMTIxOTIzNTk1OVowgdkxCzAJBgNVBAYTAkNOMRAw DgYDVQQIEwdCZWlqaW5nMRAwDgYDVQQHFAdCZWlqaW5nMTMwMQYDVQQKFCpCZWlq aW5nIDU4IEluZm9ybWF0aW9uIFRlY2hub2xvZ3kgQ28uLEx0ZC4xIjAgBgNVBAsU GUFkbWluaXN0cmF0aW9uIERlcGFydG1lbnQxMzAxBgNVBAsUKlRlcm1zIG9mIHVz ZSBhdCB3d3cudmVyaXNpZ24uY29tL3JwYSAoYykwNTEYMBYGA1UEAxQPcGFzc3Bv cnQuNTguY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAq6phS3Tc eDS/Z528pAMTEWF49D7D5u2JjP35DW5EuUpSZntaP7/GCTmkHIM4uA9TVNRFFHsn i7Vz/vuSzzWOfUYDp7ctvwwKMiQGklIosYlrFtalO6YauSmPnlxq23sfU+K0SwRE 0ijXpg2jkRh5e/SImHVjqvQDems+LBaKYR3gDmggnGEYGI5I+zuh35KGrSOHeM8+ u0pGbwZ2KfaBiRf+mJaXd9+CwXfh/NVRkAYkpXwFDMk5SP6n5WMN/mpXDXhcdN/v xKMvUL5XKuNSKcHo0oXKccL1P1miWuGLk1FTO+mlYbs+AvuK2iLL895UW9VwgKf9 9k74hVVtoH80cQIDAQABo4IBszCCAa8wCQYDVR0TBAIwADALBgNVHQ8EBAMCBaAw RAYDVR0gBD0wOzA5BgtghkgBhvhFAQcXAzAqMCgGCCsGAQUFBwIBFhxodHRwczov L3d3dy52ZXJpc2lnbi5jb20vcnBhMEEGA1UdHwQ6MDgwNqA0oDKGMGh0dHA6Ly9T VlJJbnRsLUczLWNybC52ZXJpc2lnbi5jb20vU1ZSSW50bEczLmNybDAoBgNVHSUE ITAfBggrBgEFBQcDAQYIKwYBBQUHAwIGCWCGSAGG+EIEATByBggrBgEFBQcBAQRm MGQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLnZlcmlzaWduLmNvbTA8BggrBgEF BQcwAoYwaHR0cDovL1NWUkludGwtRzMtYWlhLnZlcmlzaWduLmNvbS9TVlJJbnRs RzMuY2VyMG4GCCsGAQUFBwEMBGIwYKFeoFwwWjBYMFYWCWltYWdlL2dpZjAhMB8w BwYFKw4DAhoEFEtruSiWBgy70FI4mymsSweLIQUYMCYWJGh0dHA6Ly9sb2dvLnZl cmlzaWduLmNvbS92c2xvZ28xLmdpZjANBgkqhkiG9w0BAQUFAAOCAQEAhWSD2dUF Z55wShZ5znvx8/SxfBCqpIQ9z25e4U+fWVuex0qVDwaw9B0ilmsFHydrEaZoaNbC 3HYd/HPFxHk0jD7HtlieUi8cvKO1ngWoS3j/wyBi3U7eVTotfCZ0VXz9ID4f+/F5 m54op2Seaxm9LPWM+R+NmK1QrRuI5vvaiaaXi5ToQWXxu/n8TFPkLmWTVukG+fr0 l6I46rqvvkETm+y2cfo5ao5dGXwmhPZ7OECXAaAXhKH7PXazzbP2Mgu1rk41Qcnb 29aJCZzKVFYYqz7WSrH5TXYjh2uiKbUa74CFU7bvZGejNHZK0gN/l/0yyGxvfyza lTD1PlwePzgCww== -----END CERTIFICATE-----
Visit the Web site using this certificate: https://www.58.com
2013-01-14, ∼5276🔥, 0💬
Popular Posts:
How to list all commands in OpenSSL? I don't remember exactly what is the command to generate a CSR....
How to specify DN value defaults when using the "prompt=yes" mode of the OpenSSL "req -new" command?...
Certificate Summary: Subject: *.camsoda.com Issuer: Sectigo ECC Domain Validation Secure Server CA E...
How to start IE as an administrator? Do I need the administrator permission to delete a root CA cert...
What is ASN.1 OCTET STRING field type? How to specify OCTET STRING field type in OpenSSL "asn1parse"...