CRL & OCSP report for idreproduction.com (IDRE EDUCATION SRL)

idreproduction.com

Certificate details for idreproduction.com (At position 0 in certificate chain)
Serial number:
hex: 85b958745bec0688432b6d07e5fb1fad
int: 177749692429183200444112576134189359021
Issued by: COMODO High-Assurance Secure Server CA
Public Key Algorithm: RSA
Not valid before:
Not valid after:
Organization: IDRE EDUCATION SRL
Organization unit: InstantSSL
Address: Viale Tunisia, 48
Postal code: 20124
State / Province: Italia
Locality: Milano
Country: IT
  • This certificate does not contain any links to an LDAP server
  • This certificate does not contain any internal server links
  • This certificate does not contain any links with an unknown format

Check certificate compliance for idreproduction.com.

Certificate Revocation List (CRL)

This CRL was cached at
http://crl.comodoca.com/COMODOHigh-AssuranceSecureServerCA.crl

CRL information

Source: CRL Distribution Points in Certificate
Location: http://crl.comodoca.com/COMODOHigh-AssuranceSecureServerCA.crl
Size: 59222 bytes (DER data)
Response time: 16.890343ms
This update:
Next update:
Revoked: No
Revoked certificates in CRL: 1654

Relevant server response headers

Date:
Last Modified:
Expires:

Server and network information

Server Software: cloudflare-nginx
Content Delivery Network (CDN): CloudFlare
Cache Information: HIT

Raw CRL response headers

Cache-Control: [public, max-age=14400]
Cf-Cache-Status: [HIT]
Cf-Ray: [374b789f27050779-EWR]
Content-Type: [application/x-pkcs7-crl]
Date: [Sun, 25 Jun 2017 22:47:53 GMT]
Etag: ["594ff71d-9554"]
Expires: [Mon, 26 Jun 2017 02:47:53 GMT]
Last-Modified: [Sun, 25 Jun 2017 17:47:09 GMT]
Server: [cloudflare-nginx]
Set-Cookie: [__cfduid=d18a88e29120027b428cc7c100940ca2f1498430873; expires=Mon, 25-Jun-18 22:47:53 GMT; path=/; domain=.comodoca.com; HttpOnly]
Vary: [Accept-Encoding]
X-Ccacdn-Mirror-Id: [dwdccacrl10]
X-Content-Type-Options: [nosniff]
X-Frame-Options: [SAMEORIGIN]
X-Xss-Protection: [1; mode=block]
  • Content-Type in response is set 'application/x-pkcs7-crl' and should be replaced with 'application/pkix-crl' (RFC 5280, section 4.2.1.13)
  • This CRL file is DER encoded
  • Issuer field is byte-for-byte equivalent with issuers subject
  • Response is already valid
  • Response is not expired
  • ThisUpdate is less than seven days old, CRLs must be updated and reissued at least every seven days (Mozilla Maintenance Policy section 3)
  • The NextUpdate field is not more than ten days beyond the value of the ThisUpdate field (Mozilla & Baseline Requirements)
  • Last-Modified header is the same as ThisUpdate (RFC 5019, section 6.2)
  • NextUpdate is after the date in the Expires cache header
  • The Cache-Control max-age header does not outlive NextUpdate
  • ThisUpdate has a date before NextUpdate
  • Expires cache header is not the same as the NextUpdate field (RFC 5019 section 6.2)

Online Certificate Status Protocol (OCSP)

This OCSP response was cached at
http://ocsp.comodoca.com (GET)Server failed

OCSP response information

Source: Authority Information Access in Certificate
Location: http://ocsp.comodoca.com (GET)
Size: 5 bytes (DER data)
Response time: 149.871852ms
Status: Server failed

Relevant server response headers

Date:

Server and network information

Server Software: Apache

URL used for GET request

http://ocsp.comodoca.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBT950qEosxt1h7EdDv7v4q%2BSjikWAQUP9W10NZEeVBKF6ObjErcuLAiZGsCEQCFuVh0W%2BwGiEMrbQfl%2Bx%2Bt

Raw OCSP request (PEM encoded)

-----BEGIN OCSP REQUEST-----
MFIwUDBOMEwwSjAJBgUrDgMCGgUABBT950qEosxt1h7EdDv7v4q+SjikWAQUP9W1
0NZEeVBKF6ObjErcuLAiZGsCEQCFuVh0W+wGiEMrbQfl+x+t
-----END OCSP REQUEST-----

Raw OCSP response (PEM encoded)

-----BEGIN OCSP RESPONSE-----
MAMKAQY=
-----END OCSP RESPONSE-----

Raw OCSP Signing Certificate (PEM encoded)


Raw OCSP response headers

Content-Length: [5]
Content-Type: [application/ocsp-response]
Date: [Sun, 25 Jun 2017 22:47:53 GMT]
Server: [Apache]
X-Ocsp-Reponder-Id: [rmdccaocsp24]
  • OCSP requests is smaller than 255 bytes
  • OCSP response must be valid for at least 8 hours (Microsoft)
  • OCSP response must be available at least 8 hours before the current period expires or at ½ the validity if valid for more than 16 hours (Microsoft)
  • Content-Type in response is set to 'application/ocsp-response'
  • ThisUpdate not set (RFC 5019, section 6.2)
  • Last-Modified cache header not set (RFC 5019, section 6.2)
  • NextUpdate not set (RFC 5019, section 2.2.4)
This OCSP response was cached at
http://ocsp.comodoca.com (POST)Server failed

OCSP response information

Source: Authority Information Access in Certificate
Location: http://ocsp.comodoca.com (POST)
Size: 5 bytes (DER data)
Response time: 161.62756ms
Status: Server failed

Relevant server response headers

Date:

Server and network information

Server Software: Apache

Raw OCSP request (PEM encoded)

-----BEGIN OCSP REQUEST-----
MFIwUDBOMEwwSjAJBgUrDgMCGgUABBT950qEosxt1h7EdDv7v4q+SjikWAQUP9W1
0NZEeVBKF6ObjErcuLAiZGsCEQCFuVh0W+wGiEMrbQfl+x+t
-----END OCSP REQUEST-----

Raw OCSP response (PEM encoded)

-----BEGIN OCSP RESPONSE-----
MAMKAQY=
-----END OCSP RESPONSE-----

Raw OCSP Signing Certificate (PEM encoded)


Raw OCSP response headers

Content-Length: [5]
Content-Type: [application/ocsp-response]
Date: [Sun, 25 Jun 2017 22:47:53 GMT]
Server: [Apache]
X-Ocsp-Reponder-Id: [rmdccaocsp24]
  • OCSP response must be valid for at least 8 hours (Microsoft)
  • OCSP response must be available at least 8 hours before the current period expires or at ½ the validity if valid for more than 16 hours (Microsoft)
  • Content-Type in response is set to 'application/ocsp-response'
  • ThisUpdate not set (RFC 5019, section 6.2)
  • Last-Modified cache header not set (RFC 5019, section 6.2)
  • NextUpdate not set (RFC 5019, section 2.2.4)

COMODO High-Assurance Secure Server CA (CA Certificate)

Certificate details for COMODO High-Assurance Secure Server CA (At position 1 in certificate chain)
Serial number:
hex: 1690c329b6780607511f05b0344846cb
int: 29994665029595910897972718685290776267
Issued by: AddTrust External CA Root
Public Key Algorithm: RSA
Not valid before:
Not valid after:
Organization: COMODO CA Limited
State / Province: Greater Manchester
Locality: Salford
Country: GB
  • This certificate does not contain any links to an LDAP server
  • This certificate does not contain any internal server links
  • This certificate does not contain any links with an unknown format

Certificate Revocation List (CRL)

This CRL was cached at
http://crl.usertrust.com/AddTrustExternalCARoot.crl

CRL information

Source: CRL Distribution Points in Certificate
Location: http://crl.usertrust.com/AddTrustExternalCARoot.crl
Size: 602 bytes (DER data)
Response time: 152.448193ms
This update:
Next update:
Revoked: No
Revoked certificates in CRL: 3

Relevant server response headers

Date:
Last Modified:

Server and network information

Server Software: nginx

Raw CRL response headers

Cache-Control: [max-age=3600]
Content-Type: [application/x-pkcs7-crl]
Date: [Sun, 25 Jun 2017 22:47:53 GMT]
Etag: ["59500425-229"]
Last-Modified: [Sun, 25 Jun 2017 18:42:45 GMT]
Server: [nginx]
X-Ccacdn-Mirror-Id: [rmdccacrl7]
X-Content-Type-Options: [nosniff]
X-Frame-Options: [SAMEORIGIN]
X-Xss-Protection: [1; mode=block]
  • Content-Type in response is set 'application/x-pkcs7-crl' and should be replaced with 'application/pkix-crl' (RFC 5280, section 4.2.1.13)
  • This CRL file is DER encoded
  • Issuer field is byte-for-byte equivalent with issuers subject
  • Response is already valid
  • Response is not expired
  • Revocation information is updated at least once every twelve months
  • The value of the NextUpdate field is not more than twelve months beyond the value of the ThisUpdate field
  • Last-Modified header is the same as ThisUpdate (RFC 5019, section 6.2)
  • Expires cache header not set (RFC 5019, section 6.2)
  • NextUpdate is after the date in the Expires cache header
  • The Cache-Control max-age header does not outlive NextUpdate
  • ThisUpdate has a date before NextUpdate
  • Expires cache header is the same as the NextUpdate field (RFC 5019 section 6.2)

Online Certificate Status Protocol (OCSP)

This OCSP response was cached at
http://ocsp.usertrust.com (GET)Good

OCSP response information

Source: Authority Information Access in Certificate
Location: http://ocsp.usertrust.com (GET)
Size: 471 bytes (DER data)
Response time: 150.932362ms
Signature algorithm: SHA256WithRSA
Signature type: CA Signed
Reported statuses: 1
This update:
Next update:
Produced at:
Status: Good

Relevant server response headers

Date:
Last Modified:
Expires:
Cache Control Max-age: 148h11m54s

Server and network information

Server Software: Apache

URL used for GET request

http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCEBaQwym2eAYHUR8FsDRIRss%3D

Raw OCSP request (PEM encoded)

-----BEGIN OCSP REQUEST-----
MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2Y
ejS0Jvf6xCZU7wO94CTLVBoCEBaQwym2eAYHUR8FsDRIRss=
-----END OCSP REQUEST-----

Raw OCSP response (PEM encoded)

-----BEGIN OCSP RESPONSE-----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-----END OCSP RESPONSE-----

Raw OCSP Signing Certificate (PEM encoded)


Raw OCSP response headers

Cache-Control: [max-age=533514,public,no-transform,must-revalidate]
Content-Length: [471]
Content-Type: [application/ocsp-response]
Date: [Sun, 25 Jun 2017 22:47:53 GMT]
Etag: [42BCB0518ECA780EA3FFB31BFC12586D0FA0C7B0]
Expires: [Sun, 02 Jul 2017 03:09:48 GMT]
Last-Modified: [Sun, 25 Jun 2017 03:09:48 GMT]
Server: [Apache]
X-Ocsp-Reponder-Id: [rmdccaocsp24]
  • OCSP requests is smaller than 255 bytes
  • Content-Type in response is set to 'application/ocsp-response'
  • Response is already valid
  • Response is not expired
  • Revocation information is updated at least once every twelve months
  • The value of the NextUpdate field is not more than twelve months beyond the value of the ThisUpdate field
  • Last-Modified header is the same as ThisUpdate (RFC 5019, section 6.2)
  • NextUpdate is after the date in the Expires cache header
  • The Cache-Control max-age header does not outlive NextUpdate
  • ThisUpdate has a date before NextUpdate
  • Expires cache header is the same as the NextUpdate field (RFC 5019 section 6.2)
This OCSP response was cached at
http://ocsp.usertrust.com (POST)Good

OCSP response information

Source: Authority Information Access in Certificate
Location: http://ocsp.usertrust.com (POST)
Size: 471 bytes (DER data)
Response time: 152.931975ms
Signature algorithm: SHA256WithRSA
Signature type: CA Signed
Reported statuses: 1
This update:
Next update:
Produced at:
Status: Good

Relevant server response headers

Date:
Last Modified:
Expires:
Cache Control Max-age: 148h11m54s

Server and network information

Server Software: Apache

Raw OCSP request (PEM encoded)

-----BEGIN OCSP REQUEST-----
MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2Y
ejS0Jvf6xCZU7wO94CTLVBoCEBaQwym2eAYHUR8FsDRIRss=
-----END OCSP REQUEST-----

Raw OCSP response (PEM encoded)

-----BEGIN OCSP RESPONSE-----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-----END OCSP RESPONSE-----

Raw OCSP Signing Certificate (PEM encoded)


Raw OCSP response headers

Cache-Control: [max-age=533514,public,no-transform,must-revalidate]
Content-Length: [471]
Content-Type: [application/ocsp-response]
Date: [Sun, 25 Jun 2017 22:47:53 GMT]
Etag: [42BCB0518ECA780EA3FFB31BFC12586D0FA0C7B0]
Expires: [Sun, 02 Jul 2017 03:09:48 GMT]
Last-Modified: [Sun, 25 Jun 2017 03:09:48 GMT]
Server: [Apache]
X-Ocsp-Reponder-Id: [rmdccaocsp24]
  • Content-Type in response is set to 'application/ocsp-response'
  • Response is already valid
  • Response is not expired
  • Revocation information is updated at least once every twelve months
  • The value of the NextUpdate field is not more than twelve months beyond the value of the ThisUpdate field
  • Last-Modified header is the same as ThisUpdate (RFC 5019, section 6.2)
  • NextUpdate is after the date in the Expires cache header
  • The Cache-Control max-age header does not outlive NextUpdate
  • ThisUpdate has a date before NextUpdate
  • Expires cache header is the same as the NextUpdate field (RFC 5019 section 6.2)

AddTrust External CA Root (CA Certificate)

Certificate details for AddTrust External CA Root (At position 2 in certificate chain)
Serial number:
hex: 7ed1a9abbee36f46cd6b4e29349056f3
int: 168571358846649089547607717019433064179
Issued by: UTN - DATACorp SGC
Public Key Algorithm: RSA
Not valid before:
Not valid after:
Organization: AddTrust AB
Organization unit: AddTrust External TTP Network
Country: SE
  • This certificate does not contain any links to an LDAP server
  • This certificate does not contain any internal server links
  • This certificate does not contain any links with an unknown format

This certificate contains no information about authoritative CRL(s) or OCSP servers

Check the revocation status for another website

Created by Paul van Brouwershaven
© 2015 - 2017 Digitorus B.V.
Revoked certificates can't and should not be trusted, these certificate will cause errors like "NET::ERR_CERT_REVOKED" in browsers.