New SSLCheck

SSLCheck, made by Xolphin, verifies the proper installation of your SSL certificate and reports any potential issues as well as possible solutions.

Need help?

Wizard SSL Help Wizard


For everything else

PhoneCall us on +31 88 775 7750
Mailsend us an e-mail

SSLCheck Results

icon lockedCertificates

The certificate could be verified and is installed properly.

The root and intermediate certificates are not in the correct order

  • *.4service.nl

    Certificate
    Organisation
    Not Available
    Type
    Domain Validation
    City
    Not Available
    Country code
    Not Available

    Validity
    Valid from
    2018-04-21
    Valid to
    2020-05-19
    OCSP status info
    OCSP is short for Online Certificate Status Protocol. OCSP is used to request the status of a certificate. The answer on the request is whether the certificate is revoked or active. OCSP is an altenative for CRL. Note: After certificate issuance it can take up to 24 hours before the certificate is added to the OSCP list. Until then the status might say 'Invalid'.
    Valid
    CRL status info
    CRL is short for Certificate Revocation List. The list contains certificates that are revoked or not active anymore. The CRL is issued periodically by the Certificate Authority (the issuer of the certificates). Based on the CRL webbrowers are able to check if a certificate is trusted and if they will give an error or not.
    Not available

    Details
    Algorithm info
    Digital signatures make use of encryption with an algorithm. To order a certificate, RSA encryption should be selected
    The safety of the connection depends on the size of the private key. For new requests, a private key of at least 2048 bits is required. Some certificates are also available with a DSA or ECC algorithm.
    RSA 4096
    Signature info
    A Certificate Authority generates SSL certificates and signs them digitally. The algorithm of the signature can differ, such as the SHA-1 and SHA-2 algorithm. There are weaknesses found in the SHA-1 algorithm by manufacturers such as Microsoft and Google. They have decided to phase out support for SHA-1. SHA-2 does not contain the weaknesses that SHA-1 has and is therefore safer. SHA-2 is not yet supported by all systems. Your certificate will be delivered with SHA-2.
    Unknown

    Signatures
    Fingerprint
    64:99:26:03:70:2c:3f:63:96:60:54:c4:70:28:7a:8c:31:27:55:0a
    Serial number
    12:69:44:37:89:87:82:97:84:69:58:18:13:88:09:96:93:43:61:9

    *.4service.nl
    4service.nl
  • *.4service.nl

    Certificate
    Organisation
    Not Available
    Type
    Intermediate Certificate
    City
    Not Available
    Country code
    Not Available

    Validity
    Valid from
    2018-04-21
    Valid to
    2020-05-19
    OCSP status info
    OCSP is short for Online Certificate Status Protocol. OCSP is used to request the status of a certificate. The answer on the request is whether the certificate is revoked or active. OCSP is an altenative for CRL. Note: After certificate issuance it can take up to 24 hours before the certificate is added to the OSCP list. Until then the status might say 'Invalid'.
    Not available
    CRL status info
    CRL is short for Certificate Revocation List. The list contains certificates that are revoked or not active anymore. The CRL is issued periodically by the Certificate Authority (the issuer of the certificates). Based on the CRL webbrowers are able to check if a certificate is trusted and if they will give an error or not.
    Not available

    Details
    Algorithm info
    Digital signatures make use of encryption with an algorithm. To order a certificate, RSA encryption should be selected
    The safety of the connection depends on the size of the private key. For new requests, a private key of at least 2048 bits is required. Some certificates are also available with a DSA or ECC algorithm.
    RSA 4096
    Signature info
    A Certificate Authority generates SSL certificates and signs them digitally. The algorithm of the signature can differ, such as the SHA-1 and SHA-2 algorithm. There are weaknesses found in the SHA-1 algorithm by manufacturers such as Microsoft and Google. They have decided to phase out support for SHA-1. SHA-2 does not contain the weaknesses that SHA-1 has and is therefore safer. SHA-2 is not yet supported by all systems. Your certificate will be delivered with SHA-2.
    Unknown

    Signatures
    Fingerprint
    64:99:26:03:70:2c:3f:63:96:60:54:c4:70:28:7a:8c:31:27:55:0a
    Serial number
    12:69:44:37:89:87:82:97:84:69:58:18:13:88:09:96:93:43:61:9

    *.4service.nl
    4service.nl
  • COMODO RSA CA

    Certificate
    Organisation
    COMODO CA Limited
    Type
    Intermediate Certificate
    City
    Salford
    Country code
    GB

    Validity
    Valid from
    2000-05-30
    Valid to
    2020-05-30
    OCSP status info
    OCSP is short for Online Certificate Status Protocol. OCSP is used to request the status of a certificate. The answer on the request is whether the certificate is revoked or active. OCSP is an altenative for CRL. Note: After certificate issuance it can take up to 24 hours before the certificate is added to the OSCP list. Until then the status might say 'Invalid'.
    Not available
    CRL status info
    CRL is short for Certificate Revocation List. The list contains certificates that are revoked or not active anymore. The CRL is issued periodically by the Certificate Authority (the issuer of the certificates). Based on the CRL webbrowers are able to check if a certificate is trusted and if they will give an error or not.
    Not available

    Details
    Algorithm info
    Digital signatures make use of encryption with an algorithm. To order a certificate, RSA encryption should be selected
    The safety of the connection depends on the size of the private key. For new requests, a private key of at least 2048 bits is required. Some certificates are also available with a DSA or ECC algorithm.
    RSA 4096
    Signature info
    A Certificate Authority generates SSL certificates and signs them digitally. The algorithm of the signature can differ, such as the SHA-1 and SHA-2 algorithm. There are weaknesses found in the SHA-1 algorithm by manufacturers such as Microsoft and Google. They have decided to phase out support for SHA-1. SHA-2 does not contain the weaknesses that SHA-1 has and is therefore safer. SHA-2 is not yet supported by all systems. Your certificate will be delivered with SHA-2.
    Unknown

    Signatures
    Fingerprint
    f5:ad:0b:cc:1a:d5:6c:d1:50:72:5b:1c:86:6c:30:ad:92:ef:21:b0
    Serial number
    52:37:43:40:21:51:08:29:58:45:37:59:62:88:35:22:09:25:78

  • COMODO RSA Domain Validation Secure Server CA

    Certificate
    Organisation
    COMODO CA Limited
    Type
    Intermediate Certificate
    City
    Salford
    Country code
    GB

    Validity
    Valid from
    2014-02-12
    Valid to
    2029-02-12
    OCSP status info
    OCSP is short for Online Certificate Status Protocol. OCSP is used to request the status of a certificate. The answer on the request is whether the certificate is revoked or active. OCSP is an altenative for CRL. Note: After certificate issuance it can take up to 24 hours before the certificate is added to the OSCP list. Until then the status might say 'Invalid'.
    Not available
    CRL status info
    CRL is short for Certificate Revocation List. The list contains certificates that are revoked or not active anymore. The CRL is issued periodically by the Certificate Authority (the issuer of the certificates). Based on the CRL webbrowers are able to check if a certificate is trusted and if they will give an error or not.
    Not available

    Details
    Algorithm info
    Digital signatures make use of encryption with an algorithm. To order a certificate, RSA encryption should be selected
    The safety of the connection depends on the size of the private key. For new requests, a private key of at least 2048 bits is required. Some certificates are also available with a DSA or ECC algorithm.
    RSA 2048
    Signature info
    A Certificate Authority generates SSL certificates and signs them digitally. The algorithm of the signature can differ, such as the SHA-1 and SHA-2 algorithm. There are weaknesses found in the SHA-1 algorithm by manufacturers such as Microsoft and Google. They have decided to phase out support for SHA-1. SHA-2 does not contain the weaknesses that SHA-1 has and is therefore safer. SHA-2 is not yet supported by all systems. Your certificate will be delivered with SHA-2.
    Unknown

    Signatures
    Fingerprint
    33:9c:dd:57:cf:d5:b1:41:16:9b:61:5f:f3:14:28:78:2d:1d:a6:39
    Serial number
    57:39:78:99:14:59:90:36:30:81:02:30:81:27:54:80:37:83:75

  • AddTrust External CA Root

    Certificate
    Organisation
    AddTrust AB
    Type
    Intermediate Certificate
    City
    Not Available
    Country code
    se SE

    Validity
    Valid from
    2000-05-30
    Valid to
    2020-05-30
    OCSP status info
    OCSP is short for Online Certificate Status Protocol. OCSP is used to request the status of a certificate. The answer on the request is whether the certificate is revoked or active. OCSP is an altenative for CRL. Note: After certificate issuance it can take up to 24 hours before the certificate is added to the OSCP list. Until then the status might say 'Invalid'.
    Not available
    CRL status info
    CRL is short for Certificate Revocation List. The list contains certificates that are revoked or not active anymore. The CRL is issued periodically by the Certificate Authority (the issuer of the certificates). Based on the CRL webbrowers are able to check if a certificate is trusted and if they will give an error or not.
    Not available

    Details
    Algorithm info
    Digital signatures make use of encryption with an algorithm. To order a certificate, RSA encryption should be selected
    The safety of the connection depends on the size of the private key. For new requests, a private key of at least 2048 bits is required. Some certificates are also available with a DSA or ECC algorithm.
    RSA 2048
    Signature info
    A Certificate Authority generates SSL certificates and signs them digitally. The algorithm of the signature can differ, such as the SHA-1 and SHA-2 algorithm. There are weaknesses found in the SHA-1 algorithm by manufacturers such as Microsoft and Google. They have decided to phase out support for SHA-1. SHA-2 does not contain the weaknesses that SHA-1 has and is therefore safer. SHA-2 is not yet supported by all systems. Your certificate will be delivered with SHA-2.
    Unknown

    Signatures
    Fingerprint
    02:fa:f3:e2:91:43:54:68:60:78:57:69:4d:f5:e4:5b:68:85:18:68
    Serial number
    1

info