CRL & OCSP report for www.clarocet.com (Medicor Labs Corporation)

www.clarocet.com

Certificate details for www.clarocet.com (At position 0 in certificate chain)
Serial number:
hex: 4b1bc0c737b570a9d05c1595858f45fa
int: 99836201705338395424164387416752211450
Issued by: COMODO High-Assurance Secure Server CA
Public Key Algorithm: RSA
Not valid before:
Not valid after:
Organization: Medicor Labs Corporation
Organization unit: Administrative
Organization unit: Comodo InstantSSL
Address: PO BOX 311
Postal code: 95604
State / Province: CA
Locality: Auburn
Country: US
  • This certificate does not contain any links to an LDAP server
  • This certificate does not contain any internal server links
  • This certificate does not contain any links with an unknown format

Check certificate compliance for www.clarocet.com.

Certificate Revocation List (CRL)

This CRL was cached at
http://crl.comodoca.com/COMODOHigh-AssuranceSecureServerCA.crl

CRL information

Source: CRL Distribution Points in Certificate
Location: http://crl.comodoca.com/COMODOHigh-AssuranceSecureServerCA.crl
Size: 59541 bytes (DER data)
Response time: 13.797505ms
This update:
Next update:
Revoked: No
Revoked certificates in CRL: 1663

Relevant server response headers

Date:
Last Modified:
Expires:

Server and network information

Server Software: cloudflare-nginx
Content Delivery Network (CDN): CloudFlare
Cache Information: HIT

Raw CRL response headers

Cache-Control: [public, max-age=14400]
Cf-Cache-Status: [HIT]
Cf-Ray: [3744dd7f14b90ed3-EWR]
Content-Type: [application/x-pkcs7-crl]
Date: [Sun, 25 Jun 2017 03:33:24 GMT]
Etag: ["594eb34e-961f"]
Expires: [Sun, 25 Jun 2017 07:33:24 GMT]
Last-Modified: [Sat, 24 Jun 2017 18:45:34 GMT]
Server: [cloudflare-nginx]
Set-Cookie: [__cfduid=d7d702853227ee4f79eafc1ce4fcf45301498361604; expires=Mon, 25-Jun-18 03:33:24 GMT; path=/; domain=.comodoca.com; HttpOnly]
Vary: [Accept-Encoding]
X-Ccacdn-Mirror-Id: [dwdccacrl10]
X-Content-Type-Options: [nosniff]
X-Frame-Options: [SAMEORIGIN]
X-Xss-Protection: [1; mode=block]
  • Content-Type in response is set 'application/x-pkcs7-crl' and should be replaced with 'application/pkix-crl' (RFC 5280, section 4.2.1.13)
  • This CRL file is DER encoded
  • Issuer field is byte-for-byte equivalent with issuers subject
  • Response is already valid
  • Response is not expired
  • ThisUpdate is less than seven days old, CRLs must be updated and reissued at least every seven days (Mozilla Maintenance Policy section 3)
  • The NextUpdate field is not more than ten days beyond the value of the ThisUpdate field (Mozilla & Baseline Requirements)
  • Last-Modified header is the same as ThisUpdate (RFC 5019, section 6.2)
  • NextUpdate is after the date in the Expires cache header
  • The Cache-Control max-age header does not outlive NextUpdate
  • ThisUpdate has a date before NextUpdate
  • Expires cache header is not the same as the NextUpdate field (RFC 5019 section 6.2)

Online Certificate Status Protocol (OCSP)

This OCSP response was cached at
http://ocsp.comodoca.com (GET)Server failed

OCSP response information

Source: Authority Information Access in Certificate
Location: http://ocsp.comodoca.com (GET)
Size: 5 bytes (DER data)
Response time: 159.668976ms
Status: Server failed

Relevant server response headers

Date:

Server and network information

Server Software: Apache

URL used for GET request

http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT950qEosxt1h7EdDv7v4q%2BSjikWAQUP9W10NZEeVBKF6ObjErcuLAiZGsCEEsbwMc3tXCp0FwVlYWPRfo%3D

Raw OCSP request (PEM encoded)

-----BEGIN OCSP REQUEST-----
MFEwTzBNMEswSTAJBgUrDgMCGgUABBT950qEosxt1h7EdDv7v4q+SjikWAQUP9W1
0NZEeVBKF6ObjErcuLAiZGsCEEsbwMc3tXCp0FwVlYWPRfo=
-----END OCSP REQUEST-----

Raw OCSP response (PEM encoded)

-----BEGIN OCSP RESPONSE-----
MAMKAQY=
-----END OCSP RESPONSE-----

Raw OCSP Signing Certificate (PEM encoded)


Raw OCSP response headers

Content-Length: [5]
Content-Type: [application/ocsp-response]
Date: [Sun, 25 Jun 2017 03:33:25 GMT]
Server: [Apache]
X-Ocsp-Reponder-Id: [rmdccaocsp23]
  • OCSP requests is smaller than 255 bytes
  • OCSP response must be valid for at least 8 hours (Microsoft)
  • OCSP response must be available at least 8 hours before the current period expires or at ½ the validity if valid for more than 16 hours (Microsoft)
  • Content-Type in response is set to 'application/ocsp-response'
  • ThisUpdate not set (RFC 5019, section 6.2)
  • Last-Modified cache header not set (RFC 5019, section 6.2)
  • NextUpdate not set (RFC 5019, section 2.2.4)
This OCSP response was cached at
http://ocsp.comodoca.com (POST)Server failed

OCSP response information

Source: Authority Information Access in Certificate
Location: http://ocsp.comodoca.com (POST)
Size: 5 bytes (DER data)
Response time: 159.849542ms
Status: Server failed

Relevant server response headers

Date:

Server and network information

Server Software: Apache

Raw OCSP request (PEM encoded)

-----BEGIN OCSP REQUEST-----
MFEwTzBNMEswSTAJBgUrDgMCGgUABBT950qEosxt1h7EdDv7v4q+SjikWAQUP9W1
0NZEeVBKF6ObjErcuLAiZGsCEEsbwMc3tXCp0FwVlYWPRfo=
-----END OCSP REQUEST-----

Raw OCSP response (PEM encoded)

-----BEGIN OCSP RESPONSE-----
MAMKAQY=
-----END OCSP RESPONSE-----

Raw OCSP Signing Certificate (PEM encoded)


Raw OCSP response headers

Content-Length: [5]
Content-Type: [application/ocsp-response]
Date: [Sun, 25 Jun 2017 03:33:25 GMT]
Server: [Apache]
X-Ocsp-Reponder-Id: [rmdccaocsp23]
  • OCSP response must be valid for at least 8 hours (Microsoft)
  • OCSP response must be available at least 8 hours before the current period expires or at ½ the validity if valid for more than 16 hours (Microsoft)
  • Content-Type in response is set to 'application/ocsp-response'
  • ThisUpdate not set (RFC 5019, section 6.2)
  • Last-Modified cache header not set (RFC 5019, section 6.2)
  • NextUpdate not set (RFC 5019, section 2.2.4)

COMODO High-Assurance Secure Server CA (CA Certificate)

Certificate details for COMODO High-Assurance Secure Server CA (At position 1 in certificate chain)
Serial number:
hex: 1690c329b6780607511f05b0344846cb
int: 29994665029595910897972718685290776267
Issued by: AddTrust External CA Root
Public Key Algorithm: RSA
Not valid before:
Not valid after:
Organization: COMODO CA Limited
State / Province: Greater Manchester
Locality: Salford
Country: GB
  • This certificate does not contain any links to an LDAP server
  • This certificate does not contain any internal server links
  • This certificate does not contain any links with an unknown format

Certificate Revocation List (CRL)

This CRL was cached at
http://crl.usertrust.com/AddTrustExternalCARoot.crl

CRL information

Source: CRL Distribution Points in Certificate
Location: http://crl.usertrust.com/AddTrustExternalCARoot.crl
Size: 602 bytes (DER data)
Response time: 152.01286ms
This update:
Next update:
Revoked: No
Revoked certificates in CRL: 3

Relevant server response headers

Date:
Last Modified:

Server and network information

Server Software: nginx

Raw CRL response headers

Cache-Control: [max-age=3600]
Content-Type: [application/x-pkcs7-crl]
Date: [Sun, 25 Jun 2017 03:33:25 GMT]
Etag: ["594ec0b5-22a"]
Last-Modified: [Sat, 24 Jun 2017 19:42:45 GMT]
Server: [nginx]
X-Ccacdn-Mirror-Id: [rmdccacrl10]
X-Content-Type-Options: [nosniff]
X-Frame-Options: [SAMEORIGIN]
X-Xss-Protection: [1; mode=block]
  • Content-Type in response is set 'application/x-pkcs7-crl' and should be replaced with 'application/pkix-crl' (RFC 5280, section 4.2.1.13)
  • This CRL file is DER encoded
  • Issuer field is byte-for-byte equivalent with issuers subject
  • Response is already valid
  • Response is not expired
  • Revocation information is updated at least once every twelve months
  • The value of the NextUpdate field is not more than twelve months beyond the value of the ThisUpdate field
  • Last-Modified header is the same as ThisUpdate (RFC 5019, section 6.2)
  • Expires cache header not set (RFC 5019, section 6.2)
  • NextUpdate is after the date in the Expires cache header
  • The Cache-Control max-age header does not outlive NextUpdate
  • ThisUpdate has a date before NextUpdate
  • Expires cache header is the same as the NextUpdate field (RFC 5019 section 6.2)

Online Certificate Status Protocol (OCSP)

This OCSP response was cached at
http://ocsp.usertrust.com (GET)Good

OCSP response information

Source: Authority Information Access in Certificate
Location: http://ocsp.usertrust.com (GET)
Size: 471 bytes (DER data)
Response time: 148.381669ms
Signature algorithm: SHA256WithRSA
Signature type: CA Signed
Reported statuses: 1
This update:
Next update:
Produced at:
Status: Good

Relevant server response headers

Date:
Last Modified:
Expires:
Cache Control Max-age: 83h26m22s

Server and network information

Server Software: Apache

URL used for GET request

http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCEBaQwym2eAYHUR8FsDRIRss%3D

Raw OCSP request (PEM encoded)

-----BEGIN OCSP REQUEST-----
MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2Y
ejS0Jvf6xCZU7wO94CTLVBoCEBaQwym2eAYHUR8FsDRIRss=
-----END OCSP REQUEST-----

Raw OCSP response (PEM encoded)

-----BEGIN OCSP RESPONSE-----
MIIB0woBAKCCAcwwggHIBgkrBgEFBQcwAQEEggG5MIIBtTCBnqIWBBStvZh6NLQm
9/rEJlTvA73gJMtUGhgPMjAxNzA2MjExNTA5NDhaMHMwcTBJMAkGBSsOAwIaBQAE
FHyxZlScq9tE7mImFq30ZXv3etWUBBStvZh6NLQm9/rEJlTvA73gJMtUGgIQFpDD
KbZ4BgdRHwWwNEhGy4AAGA8yMDE3MDYyMTE1MDk0OFqgERgPMjAxNzA2MjgxNTA5
NDhaMA0GCSqGSIb3DQEBCwUAA4IBAQBU3jV0gUHQFPgs5xRBERs5w1hTw8J9QFO0
/lSsw+padcRcDeJpxjpXl3snJfSBUMwSho+g5SwZmo19ACjJEKyMXmeMmRdSEpjL
mY4zmn1fAHpYNrwkG4zy47ld7/D6+X8aoyZhquxv2gvzikGM/jsi/cqgkN/GUWFY
1MXJiQ4fQ35WO13nhA58YsKsKeOU9UC+QPEydRiK/j41H7CQ1DBbCl9dy7O0Rwsq
VMZY3Cxsm0djqoPb7g5G4Q/mLIgSN3Hkbj9PIAJsUOadnUmCm05QuY+HTsD+sgk5
ttPlypaO2Yh+towoMcPOe2JQh83yNzpiKAnniBr0myx1I2E1YBux
-----END OCSP RESPONSE-----

Raw OCSP Signing Certificate (PEM encoded)


Raw OCSP response headers

Cache-Control: [max-age=300382,public,no-transform,must-revalidate]
Content-Length: [471]
Content-Type: [application/ocsp-response]
Date: [Sun, 25 Jun 2017 03:33:25 GMT]
Etag: [1DE6FC07BA63E122A4876A9F3D65BC542BCA92E7]
Expires: [Wed, 28 Jun 2017 15:09:48 GMT]
Last-Modified: [Wed, 21 Jun 2017 15:09:48 GMT]
Server: [Apache]
X-Ocsp-Reponder-Id: [rmdccaocsp23]
  • OCSP requests is smaller than 255 bytes
  • Content-Type in response is set to 'application/ocsp-response'
  • Response is already valid
  • Response is not expired
  • Revocation information is updated at least once every twelve months
  • The value of the NextUpdate field is not more than twelve months beyond the value of the ThisUpdate field
  • Last-Modified header is the same as ThisUpdate (RFC 5019, section 6.2)
  • NextUpdate is after the date in the Expires cache header
  • The Cache-Control max-age header does not outlive NextUpdate
  • ThisUpdate has a date before NextUpdate
  • Expires cache header is the same as the NextUpdate field (RFC 5019 section 6.2)
This OCSP response was cached at
http://ocsp.usertrust.com (POST)Good

OCSP response information

Source: Authority Information Access in Certificate
Location: http://ocsp.usertrust.com (POST)
Size: 471 bytes (DER data)
Response time: 160.054435ms
Signature algorithm: SHA256WithRSA
Signature type: CA Signed
Reported statuses: 1
This update:
Next update:
Produced at:
Status: Good

Relevant server response headers

Date:
Last Modified:
Expires:
Cache Control Max-age: 83h26m22s

Server and network information

Server Software: Apache

Raw OCSP request (PEM encoded)

-----BEGIN OCSP REQUEST-----
MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2Y
ejS0Jvf6xCZU7wO94CTLVBoCEBaQwym2eAYHUR8FsDRIRss=
-----END OCSP REQUEST-----

Raw OCSP response (PEM encoded)

-----BEGIN OCSP RESPONSE-----
MIIB0woBAKCCAcwwggHIBgkrBgEFBQcwAQEEggG5MIIBtTCBnqIWBBStvZh6NLQm
9/rEJlTvA73gJMtUGhgPMjAxNzA2MjExNTA5NDhaMHMwcTBJMAkGBSsOAwIaBQAE
FHyxZlScq9tE7mImFq30ZXv3etWUBBStvZh6NLQm9/rEJlTvA73gJMtUGgIQFpDD
KbZ4BgdRHwWwNEhGy4AAGA8yMDE3MDYyMTE1MDk0OFqgERgPMjAxNzA2MjgxNTA5
NDhaMA0GCSqGSIb3DQEBCwUAA4IBAQBU3jV0gUHQFPgs5xRBERs5w1hTw8J9QFO0
/lSsw+padcRcDeJpxjpXl3snJfSBUMwSho+g5SwZmo19ACjJEKyMXmeMmRdSEpjL
mY4zmn1fAHpYNrwkG4zy47ld7/D6+X8aoyZhquxv2gvzikGM/jsi/cqgkN/GUWFY
1MXJiQ4fQ35WO13nhA58YsKsKeOU9UC+QPEydRiK/j41H7CQ1DBbCl9dy7O0Rwsq
VMZY3Cxsm0djqoPb7g5G4Q/mLIgSN3Hkbj9PIAJsUOadnUmCm05QuY+HTsD+sgk5
ttPlypaO2Yh+towoMcPOe2JQh83yNzpiKAnniBr0myx1I2E1YBux
-----END OCSP RESPONSE-----

Raw OCSP Signing Certificate (PEM encoded)


Raw OCSP response headers

Cache-Control: [max-age=300382,public,no-transform,must-revalidate]
Content-Length: [471]
Content-Type: [application/ocsp-response]
Date: [Sun, 25 Jun 2017 03:33:25 GMT]
Etag: [1DE6FC07BA63E122A4876A9F3D65BC542BCA92E7]
Expires: [Wed, 28 Jun 2017 15:09:48 GMT]
Last-Modified: [Wed, 21 Jun 2017 15:09:48 GMT]
Server: [Apache]
X-Ocsp-Reponder-Id: [rmdccaocsp23]
  • Content-Type in response is set to 'application/ocsp-response'
  • Response is already valid
  • Response is not expired
  • Revocation information is updated at least once every twelve months
  • The value of the NextUpdate field is not more than twelve months beyond the value of the ThisUpdate field
  • Last-Modified header is the same as ThisUpdate (RFC 5019, section 6.2)
  • NextUpdate is after the date in the Expires cache header
  • The Cache-Control max-age header does not outlive NextUpdate
  • ThisUpdate has a date before NextUpdate
  • Expires cache header is the same as the NextUpdate field (RFC 5019 section 6.2)

AddTrust External CA Root (CA Certificate)

Certificate details for AddTrust External CA Root (At position 2 in certificate chain)
Serial number:
hex: 7ed1a9abbee36f46cd6b4e29349056f3
int: 168571358846649089547607717019433064179
Issued by: UTN - DATACorp SGC
Public Key Algorithm: RSA
Not valid before:
Not valid after:
Organization: AddTrust AB
Organization unit: AddTrust External TTP Network
Country: SE
  • This certificate does not contain any links to an LDAP server
  • This certificate does not contain any internal server links
  • This certificate does not contain any links with an unknown format

This certificate contains no information about authoritative CRL(s) or OCSP servers

Check the revocation status for another website

Created by Paul van Brouwershaven
© 2015 - 2017 Digitorus B.V.
Revoked certificates can't and should not be trusted, these certificate will cause errors like "NET::ERR_CERT_REVOKED" in browsers.