Categories:
Android (13)
Apple Mac (27)
DH Keys (39)
DSA Keys (70)
EC Keys (923)
Firefox (30)
General (10)
Google Chrome (25)
Intermediate CA (152)
Java VM (29)
JDK Keytool (28)
Microsoft CertUtil (29)
Microsoft Edge (9)
Mozilla CertUtil (21)
OpenSSL (236)
Other (7)
Portecle (38)
Publishers (3200)
Revoked Certificates (16)
Root CA (85)
RSA Keys (2572)
Tools (46)
Tutorial (1)
What Is (22)
Windows (127)
Collections:
Other Resources:
s.tbcdn.cn, Organization and domain(s) authenticated by iTrus...
Certificate summary -
Owner: s.tbcdn.cn, Organization and domain(s) authenticated by iTrus China, RDC, "Taobao(China) Software Co., Ltd", L=Hangzhou, ST=Zhejiang, CN
Issuer: VeriSign Class 3 International Server CA - G3, Terms of use at https://www.verisign.com/rpa (c)10, VeriSign Trust Network, "VeriSign, Inc.", US
Expiration: Thu Jul 16 19:59:59 EDT 2015
MD5: F6:E6:CC:9E:22:0A:1B:D6:DD:97:F6:ED:C2:A2:B1:F2
Hash: Owner Hash=b614e10c, Issuer Hash=876bdba8
✍: FYIcenter.com
Information extracted out of the certificate:
Owner: CN=s.tbcdn.cn, OU=Organization and domain(s) authenticated by iTrus China, OU=RDC, O="Taobao(China) Software Co., Ltd", L=Hangzhou, ST=Zhejiang, C=CN Issuer: CN=VeriSign Class 3 International Server CA - G3, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Serial number: 2f706c9500ededf59ad7d36a118d4a27 Valid from: Sun Jul 14 20:00:00 EDT 2013 until: Thu Jul 16 19:59:59 EDT 2015 Certificate fingerprints: MD5: F6:E6:CC:9E:22:0A:1B:D6:DD:97:F6:ED:C2:A2:B1:F2 SHA1: B0:0A:26:49:E1:F5:68:87:E7:F8:27:8F:87:9A:1E:46:35:5C:20:C7 SHA256: 20:0F:E4:B6:88:0E:7D:9E:5C:CA:16:46:DD:A9:5B:54:8F:0D:82:5D:37:40:3E:6F:9C: 6E:C4:72:14:EC:B9:42 Signature algorithm name: SHA1withRSA Version: 3 Extensions: #1: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.verisign.com , accessMethod: caIssuers accessLocation: URIName: http://SVRIntl-G3-aia.verisign.com/SVRIntlG3.cer ] ] #2: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: D7 9B 7C D8 22 A0 15 F7 DD AD 5F CE 29 9B 58 C3 ...."....._.).X. 0010: BC 46 00 B5 .F.. ] ] #3: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] #4: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://SVRIntl-G3-crl.verisign.com/SVRIntlG3.crl] ]] #5: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.113733.1.7.54] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1C 68 74 74 70 73 3A 2F 2F 77 77 77 2E 76 65 ..https://www.ve 0010: 72 69 73 69 67 6E 2E 63 6F 6D 2F 63 70 73 risign.com/cps ]] ] ] #6: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth 2.16.840.1.113730.4.1 ] #7: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] #8: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: s.tbcdn.cn ]
Certificate in PEM format (Base64 encoded X.509):
-----BEGIN CERTIFICATE----- MIIFiTCCBHGgAwIBAgIQL3BslQDt7fWa19NqEY1KJzANBgkqhkiG9w0BAQUFADCB vDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQL ExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTswOQYDVQQLEzJUZXJtcyBvZiB1c2Ug YXQgaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JwYSAoYykxMDE2MDQGA1UEAxMt VmVyaVNpZ24gQ2xhc3MgMyBJbnRlcm5hdGlvbmFsIFNlcnZlciBDQSAtIEczMB4X DTEzMDcxNTAwMDAwMFoXDTE1MDcxNjIzNTk1OVowgcIxCzAJBgNVBAYTAkNOMREw DwYDVQQIEwhaaGVqaWFuZzERMA8GA1UEBxQISGFuZ3pob3UxKDAmBgNVBAoUH1Rh b2JhbyhDaGluYSkgU29mdHdhcmUgQ28uLCBMdGQxDDAKBgNVBAsUA1JEQzFAMD4G A1UECxQ3T3JnYW5pemF0aW9uIGFuZCBkb21haW4ocykgYXV0aGVudGljYXRlZCBi eSBpVHJ1cyBDaGluYTETMBEGA1UEAxQKcy50YmNkbi5jbjCCASIwDQYJKoZIhvcN AQEBBQADggEPADCCAQoCggEBAM5c9omCd14jX6OPH+7nso4XKsZaoCCiBSxevTcW o9btRkEi5n/7vZjZTw/Esyl4eCE4QBaY4uZlgWHGMhy4Zp1kuGX2XCyctdVowj8l 8Wt7qkb1vKLLgfx36YFy2TnqjOVppyEjNCuYZNOkxSEw9uV6VEk7BHQwke3zWXNv RiRk3mylogKyj/hcxC3FdxyEX70RPRc5WigQTzd2sma2OEh/bXXUfh5HQBBPG+Zt bTeHsjdL0n8Dg/un8DgfqMfphWomTulUJ2TbRlRxx2at96axBe/bs06z7KwttLsU zCshIw8DcropQpdhd6DIZOjNoBIPVaHlU/LQ4ZFYazavk6sCAwEAAaOCAX0wggF5 MBUGA1UdEQQOMAyCCnMudGJjZG4uY24wCQYDVR0TBAIwADAOBgNVHQ8BAf8EBAMC BaAwKAYDVR0lBCEwHwYIKwYBBQUHAwEGCCsGAQUFBwMCBglghkgBhvhCBAEwQwYD VR0gBDwwOjA4BgpghkgBhvhFAQc2MCowKAYIKwYBBQUHAgEWHGh0dHBzOi8vd3d3 LnZlcmlzaWduLmNvbS9jcHMwHwYDVR0jBBgwFoAU15t82CKgFffdrV/OKZtYw7xG ALUwQQYDVR0fBDowODA2oDSgMoYwaHR0cDovL1NWUkludGwtRzMtY3JsLnZlcmlz aWduLmNvbS9TVlJJbnRsRzMuY3JsMHIGCCsGAQUFBwEBBGYwZDAkBggrBgEFBQcw AYYYaHR0cDovL29jc3AudmVyaXNpZ24uY29tMDwGCCsGAQUFBzAChjBodHRwOi8v U1ZSSW50bC1HMy1haWEudmVyaXNpZ24uY29tL1NWUkludGxHMy5jZXIwDQYJKoZI hvcNAQEFBQADggEBAA8HexkvPC+EtKj/x+8Vj14nEK7UqYpt9XDOaQr9U4+nr1+v ZBYeiaEKeWJ9q0Hrs3p4DwtzZtj8IrhkBlxe0p52mEZa+FHsVHIf42zSVC6CL7zA zWYhnpGqsvmwuAldMS7vlH4RRh5+AfOIhXRgiyRNGci5bd58ihhJ+VIZrhvwjlaU lpxDCAcJwMbDb7ykTr9rAF/vbYM3WqN/MLbisDsU+tpMrbMG77A6y0QJiYTXCjhM Ua+W2NG7uZrUhNa9+FjZlSVFr8aLeo9cI5L+ZNxvd7j7EVcDtDdvjRJQCShVanbt 6ZpM9Cp5+gEpg5PyGAMj3NNVk0AWmT+xQQLl1QM= -----END CERTIFICATE-----
Visit the Web site using this certificate: https://www.taobao.com
2013-10-08, 4869👍, 0💬
Popular Posts:
How to import a my certificate signed by a CA back to my private key and public key entry in my keys...
Can I build a DH private key from an OpenSSL configuration file? Yes, you can build a DH private key...
How to use the "keytool -gencert" command? I received a CSR (Certificate Signing Request) file and w...
What options are supported by the "keytool -genkeypair" command? Java Keytool can be used to generat...
How to create a new keystore file with Portecle? I have Portecle installed. To create a new keystore...