CRL & OCSP report for www.ploegsma.nl (Uitgeverij Ploegsma)

www.ploegsma.nl

Certificate details for www.ploegsma.nl (At position 0 in certificate chain)
Serial number:
hex: d87c50d0f0f186e312d796b23de8f994
int: 287758731046794632739303512697163282836
Issued by: USERTrust Legacy Secure Server CA
Public Key Algorithm: RSA
Not valid before:
Not valid after:
Organization: Uitgeverij Ploegsma
Organization unit: PremiumSSL Legacy
Address: Singel 262
Postal code: 1001 AC
State / Province: Noord-Holland
Locality: Amsterdam
Country: NL
  • This certificate does not contain any links to an LDAP server
  • This certificate does not contain any internal server links
  • This certificate does not contain any links with an unknown format

Check certificate compliance for www.ploegsma.nl.

Certificate Revocation List (CRL)

This CRL was cached at
http://crl.usertrust.com/USERTrustLegacySecureServerCA.crl

CRL information

Source: CRL Distribution Points in Certificate
Location: http://crl.usertrust.com/USERTrustLegacySecureServerCA.crl
Size: 510 bytes (DER data)
Response time: 233.121052ms
This update:
Next update:
Revoked: No
Revoked certificates in CRL: 0

Relevant server response headers

Date:
Last Modified:

Server and network information

Server Software: nginx

Raw CRL response headers

Cache-Control: [max-age=3600]
Content-Type: [application/x-pkcs7-crl]
Date: [Sat, 29 Apr 2017 21:17:03 GMT]
Etag: ["5904fa6f-1f6"]
Last-Modified: [Sat, 29 Apr 2017 20:41:19 GMT]
Server: [nginx]
X-Ccacdn-Mirror-Id: [rmdccacrl6]
  • Content-Type in response is set 'application/x-pkcs7-crl' and should be replaced with 'application/pkix-crl' (RFC 5280, section 4.2.1.13)
  • This CRL file is DER encoded
  • Issuer field is byte-for-byte equivalent with issuers subject
  • Response is already valid
  • Response is not expired
  • ThisUpdate is less than seven days old, CRLs must be updated and reissued at least every seven days (Mozilla Maintenance Policy section 3)
  • The NextUpdate field is not more than ten days beyond the value of the ThisUpdate field (Mozilla & Baseline Requirements)
  • Last-Modified header is the same as ThisUpdate (RFC 5019, section 6.2)
  • Expires cache header not set (RFC 5019, section 6.2)
  • NextUpdate is after the date in the Expires cache header
  • The Cache-Control max-age header does not outlive NextUpdate
  • ThisUpdate has a date before NextUpdate
  • Expires cache header is the same as the NextUpdate field (RFC 5019 section 6.2)

Online Certificate Status Protocol (OCSP)

This OCSP response was cached at
http://ocsp.usertrust.com (GET)Server failed

OCSP response information

Source: Authority Information Access in Certificate
Location: http://ocsp.usertrust.com (GET)
Size: 5 bytes (DER data)
Response time: 232.947195ms
Status: Server failed

Relevant server response headers

Date:

Server and network information

Server Software: Apache

URL used for GET request

http:/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBR0fzwAGHvPgR0qWvkJGdfHRUARnAQUr6RAr58W%2Fqsx%2FfvVl4v1kaMkhhYCEQDYfFDQ8PGG4xLXlrI96PmU

Raw OCSP request (PEM encoded)

-----BEGIN OCSP REQUEST-----
MFIwUDBOMEwwSjAJBgUrDgMCGgUABBR0fzwAGHvPgR0qWvkJGdfHRUARnAQUr6RA
r58W/qsx/fvVl4v1kaMkhhYCEQDYfFDQ8PGG4xLXlrI96PmU
-----END OCSP REQUEST-----

Raw OCSP response (PEM encoded)

-----BEGIN OCSP RESPONSE-----
MAMKAQY=
-----END OCSP RESPONSE-----

Raw OCSP Signing Certificate (PEM encoded)


Raw OCSP response headers

Content-Length: [5]
Content-Type: [application/ocsp-response]
Date: [Sat, 29 Apr 2017 21:17:03 GMT]
Server: [Apache]
X-Ocsp-Reponder-Id: [rmdccaocsp26]
  • OCSP requests is smaller than 255 bytes
  • OCSP response must be valid for at least 8 hours (Microsoft)
  • OCSP response must be available at least 8 hours before the current period expires or at ½ the validity if valid for more than 16 hours (Microsoft)
  • Content-Type in response is set to 'application/ocsp-response'
  • ThisUpdate not set (RFC 5019, section 6.2)
  • Last-Modified cache header not set (RFC 5019, section 6.2)
  • NextUpdate not set (RFC 5019, section 2.2.4)
This OCSP response was cached at
http://ocsp.usertrust.com (POST)Server failed

OCSP response information

Source: Authority Information Access in Certificate
Location: http://ocsp.usertrust.com (POST)
Size: 5 bytes (DER data)
Response time: 232.11004ms
Status: Server failed

Relevant server response headers

Date:

Server and network information

Server Software: Apache

Raw OCSP request (PEM encoded)

-----BEGIN OCSP REQUEST-----
MFIwUDBOMEwwSjAJBgUrDgMCGgUABBR0fzwAGHvPgR0qWvkJGdfHRUARnAQUr6RA
r58W/qsx/fvVl4v1kaMkhhYCEQDYfFDQ8PGG4xLXlrI96PmU
-----END OCSP REQUEST-----

Raw OCSP response (PEM encoded)

-----BEGIN OCSP RESPONSE-----
MAMKAQY=
-----END OCSP RESPONSE-----

Raw OCSP Signing Certificate (PEM encoded)


Raw OCSP response headers

Content-Length: [5]
Content-Type: [application/ocsp-response]
Date: [Sat, 29 Apr 2017 21:17:03 GMT]
Server: [Apache]
X-Ocsp-Reponder-Id: [rmdccaocsp26]
  • OCSP response must be valid for at least 8 hours (Microsoft)
  • OCSP response must be available at least 8 hours before the current period expires or at ½ the validity if valid for more than 16 hours (Microsoft)
  • Content-Type in response is set to 'application/ocsp-response'
  • ThisUpdate not set (RFC 5019, section 6.2)
  • Last-Modified cache header not set (RFC 5019, section 6.2)
  • NextUpdate not set (RFC 5019, section 2.2.4)

USERTrust Legacy Secure Server CA (CA Certificate)

Certificate details for USERTrust Legacy Secure Server CA (At position 1 in certificate chain)
Serial number:
hex: 3863e8ea
int: 946071786
Issued by: Entrust.net Certification Authority (2048)
Public Key Algorithm: RSA
Not valid before:
Not valid after:
Organization: The USERTRUST Network
State / Province: UT
Locality: Salt Lake City
Country: US
  • This certificate does not contain any links to an LDAP server
  • This certificate does not contain any internal server links
  • This certificate does not contain any links with an unknown format

This certificate contains no information about authoritative CRL(s) or OCSP servers

Check the revocation status for another website

Created by Paul van Brouwershaven
Revoked certificates can't and should not be trusted, these certificate will cause errors like "NET::ERR_CERT_REVOKED" in browsers.