Collections:
Other Resources:
EMAILADDRESS=postmaster@lokis-chaos.de, piwik.lokis-chaos.de,...
Certificate summary -
Owner: EMAILADDRESS=postmaster@lokis-chaos.de, piwik.lokis-chaos.de, DE, OID.2.5.4.13=Tlh6gAguOTU7lE33
Issuer: StartCom Class 1 Primary Intermediate Server CA, Secure Digital Certificate Signing, StartCom Ltd., IL
Expiration: Thu Nov 07 16:00:37 EST 2013
MD5: 9B:15:ED:A8:F8:64:B8:E5:C8:1C:60:AD:6D:9C:F3:66
Hash: Owner Hash=091902c1, Issuer Hash=ea59305e
✍: FYIcenter.com
Information extracted out of the certificate:
Owner: EMAILADDRESS=postmaster@lokis-chaos.de, CN=piwik.lokis-chaos.de, C=DE, OID.2.5.4.13=Tlh6gAguOTU7lE33 Issuer: CN=StartCom Class 1 Primary Intermediate Server CA, OU=Secure Digital Certificate Signing, O=StartCom Ltd., C=IL Serial number: 7f9ec Valid from: Tue Nov 06 01:20:45 EST 2012 until: Thu Nov 07 16:00:37 EST 2013 Certificate fingerprints: MD5: 9B:15:ED:A8:F8:64:B8:E5:C8:1C:60:AD:6D:9C:F3:66 SHA1: C7:02:75:B5:0B:69:1F:C5:63:1A:13:9D:60:36:E6:EA:43:55:E8:B8 SHA256: 9E:32:D0:9F:8D:01:F6:D1:A3:EA:57:B6:AB:78:83:11:74:8C:D0:6E:A6:B4:D4:C8:26: BF:C7:A9:EB:5C:B7:7C Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.startssl.com/sub/class1/server/ca , accessMethod: caIssuers accessLocation: URIName: http://aia.startssl.com/certs/sub.class1.server.ca.crt ] ] #2: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: EB 42 34 D0 98 B0 AB 9F F4 1B 6B 08 F7 CC 64 2E .B4.......k...d. 0010: EF 0E 2C 45 ..,E ] ] #3: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] #4: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.startssl.com/crt1-crl.crl] ]] #5: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.23.140.1.2.1] [] ] [CertificatePolicyId: [1.3.6.1.4.1.23223.1.2.3] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 22 68 74 74 70 3A 2F 2F 77 77 77 2E 73 74 61 ."http://www.sta 0010: 72 74 73 73 6C 2E 63 6F 6D 2F 70 6F 6C 69 63 79 rtssl.com/policy 0020: 2E 70 64 66 .pdf ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 EA 30 27 16 20 53 74 61 72 74 43 6F 6D 20 0..0'. StartCom 0010: 43 65 72 74 69 66 69 63 61 74 69 6F 6E 20 41 75 Certification Au 0020: 74 68 6F 72 69 74 79 30 03 02 01 01 1A 81 BE 54 thority0.......T 0030: 68 69 73 20 63 65 72 74 69 66 69 63 61 74 65 20 his certificate 0040: 77 61 73 20 69 73 73 75 65 64 20 61 63 63 6F 72 was issued accor 0050: 64 69 6E 67 20 74 6F 20 74 68 65 20 43 6C 61 73 ding to the Clas 0060: 73 20 31 20 56 61 6C 69 64 61 74 69 6F 6E 20 72 s 1 Validation r 0070: 65 71 75 69 72 65 6D 65 6E 74 73 20 6F 66 20 74 equirements of t 0080: 68 65 20 53 74 61 72 74 43 6F 6D 20 43 41 20 70 he StartCom CA p 0090: 6F 6C 69 63 79 2C 20 72 65 6C 69 61 6E 63 65 20 olicy, reliance 00A0: 6F 6E 6C 79 20 66 6F 72 20 74 68 65 20 69 6E 74 only for the int 00B0: 65 6E 64 65 64 20 70 75 72 70 6F 73 65 20 69 6E ended purpose in 00C0: 20 63 6F 6D 70 6C 69 61 6E 63 65 20 6F 66 20 74 compliance of t 00D0: 68 65 20 72 65 6C 79 69 6E 67 20 70 61 72 74 79 he relying party 00E0: 20 6F 62 6C 69 67 61 74 69 6F 6E 73 2E obligations. ]] ] ] #6: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] #7: ObjectId: 2.5.29.18 Criticality=false IssuerAlternativeName [ URIName: http://www.startssl.com/ ] #8: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ DigitalSignature Key_Encipherment Key_Agreement ] #9: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: piwik.lokis-chaos.de DNSName: lokis-chaos.de ] #10: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 82 79 FE 1D F6 61 E3 1F 02 3C C7 67 AA 63 E5 88 .y...a...<.g.c.. 0010: 6D 10 C7 BE m... ] ]
Certificate in PEM format (Base64 encoded X.509):
-----BEGIN CERTIFICATE----- MIIGZjCCBU6gAwIBAgIDB/nsMA0GCSqGSIb3DQEBBQUAMIGMMQswCQYDVQQGEwJJ TDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0 YWwgQ2VydGlmaWNhdGUgU2lnbmluZzE4MDYGA1UEAxMvU3RhcnRDb20gQ2xhc3Mg MSBQcmltYXJ5IEludGVybWVkaWF0ZSBTZXJ2ZXIgQ0EwHhcNMTIxMTA2MDYyMDQ1 WhcNMTMxMTA3MjEwMDM3WjBxMRkwFwYDVQQNExBUbGg2Z0FndU9UVTdsRTMzMQsw CQYDVQQGEwJERTEdMBsGA1UEAxMUcGl3aWsubG9raXMtY2hhb3MuZGUxKDAmBgkq hkiG9w0BCQEWGXBvc3RtYXN0ZXJAbG9raXMtY2hhb3MuZGUwggEiMA0GCSqGSIb3 DQEBAQUAA4IBDwAwggEKAoIBAQC8ZhpCDf9z48GX3V22v3jnvRHEhL2uCTs5ULXO xt0lUrFYdgaH4MhDXl8CWR2Oht17xNyqKIKGZGKkL186Nj4sVCuqKjrHVWxmTmAr eTO0UaWYIOjGQqvzSROShUKmBSG+4DQ6yVy1W5b8vT0DW9vlZdqqZRCUg1YfyMd7 2Rah8Vosq5tndb5uVV1sqHnqLZYxI8hqRtQODuvqhKCwbrcAbR5CSBasA6gz2HYN d+D8X+Q7DAl5gAljdTP+Sx+EijTpB5NgBUE9Ltp7/j6okLvnHwI9kZbrVBY4exFh jcjrwz7m83LBBWc7YPd01IzQ9jEKvW3WPhW7x1LdZhMqd3rHAgMBAAGjggLpMIIC 5TAJBgNVHRMEAjAAMAsGA1UdDwQEAwIDqDATBgNVHSUEDDAKBggrBgEFBQcDATAd BgNVHQ4EFgQUgnn+HfZh4x8CPMdnqmPliG0Qx74wHwYDVR0jBBgwFoAU60I00Jiw q5/0G2sI98xkLu8OLEUwLwYDVR0RBCgwJoIUcGl3aWsubG9raXMtY2hhb3MuZGWC Dmxva2lzLWNoYW9zLmRlMIIBVgYDVR0gBIIBTTCCAUkwCAYGZ4EMAQIBMIIBOwYL KwYBBAGBtTcBAgMwggEqMC4GCCsGAQUFBwIBFiJodHRwOi8vd3d3LnN0YXJ0c3Ns LmNvbS9wb2xpY3kucGRmMIH3BggrBgEFBQcCAjCB6jAnFiBTdGFydENvbSBDZXJ0 aWZpY2F0aW9uIEF1dGhvcml0eTADAgEBGoG+VGhpcyBjZXJ0aWZpY2F0ZSB3YXMg aXNzdWVkIGFjY29yZGluZyB0byB0aGUgQ2xhc3MgMSBWYWxpZGF0aW9uIHJlcXVp cmVtZW50cyBvZiB0aGUgU3RhcnRDb20gQ0EgcG9saWN5LCByZWxpYW5jZSBvbmx5 IGZvciB0aGUgaW50ZW5kZWQgcHVycG9zZSBpbiBjb21wbGlhbmNlIG9mIHRoZSBy ZWx5aW5nIHBhcnR5IG9ibGlnYXRpb25zLjA1BgNVHR8ELjAsMCqgKKAmhiRodHRw Oi8vY3JsLnN0YXJ0c3NsLmNvbS9jcnQxLWNybC5jcmwwgY4GCCsGAQUFBwEBBIGB MH8wOQYIKwYBBQUHMAGGLWh0dHA6Ly9vY3NwLnN0YXJ0c3NsLmNvbS9zdWIvY2xh c3MxL3NlcnZlci9jYTBCBggrBgEFBQcwAoY2aHR0cDovL2FpYS5zdGFydHNzbC5j b20vY2VydHMvc3ViLmNsYXNzMS5zZXJ2ZXIuY2EuY3J0MCMGA1UdEgQcMBqGGGh0 dHA6Ly93d3cuc3RhcnRzc2wuY29tLzANBgkqhkiG9w0BAQUFAAOCAQEAhA+2hfT9 YodjwJ67n9zbOxPWNzZ1zaTr66xYi+4y+4LImEFqIOlS9OD2/lo1PbcXt4a5ketl Ii1P1LyF2QmCU30pRy2017cohg2a746u/G8cMAt/J7bhqBqjGCzrVWMrpKayO00l kgOVC0IocrhiFkWApPSP38IHl9zCEmvrzsY5lvfZ2b7KmwZ13RoEqzbg+do8+ca3 zQ7sYeDtqp7QOafvXBb81naqsiAwz8+yaqL1qBpQjYxzLhYI8D1ukN+G07lL1ykl KYn29AKrgNtMXo+9pLL2evaFZO1DBgYENUCQyvZkGrc7I27R05NEHg+bkkrhlUx/ ZNRM1hZbnAvP0w== -----END CERTIFICATE-----
Visit the Web site using this certificate: https://www.movie2k.to
2013-07-24, 4039🔥, 0💬
Popular Posts:
How to print out MD5 and SHA-1 fingerprints of a certificate using OpenSSL "x509" command? I need to...
How to verify the digital signature inside a CSR using OpenSSL "req -verify" command? If you want to...
How to create a new certificate to be used by some Web site for server authentication to support HTT...
Certificate summary - Owner: GeoTrust SSL CA - G3, GeoTrust Inc., US Issuer: GeoTrust Global CA, Geo...
Certificate Summary: Subject: VeriSign Class 3 Secure Server CA - G3 Issuer: VeriSign Class 3 Public...