Certificate is not signed by a root certificate
When the SSLCheck gives an error that the certificate is not signed, a self-signed certificate is active on the server. A self-signed certificate secures the connection with SSL. But because the certificate isn't issued by a...
Certificate only uses 1024 bit root certificates
Certificates using only 1024 bit root certificates are not trusted anymore. After the browser is updated the certificates will be blocked. An error wil occur on the client side. Replacing the root certificates Issues with t...
Intermediate certificates are not passed on by the server
SSL certificates are not directly signed by the root certificates that are stored in the browsers, but by an intermediate or intermediate certificate. This intermediate certificate is a type of certificate used by the publish...
Root Certificate not trusted
When the SSLCheck indicates that the root certificate is not trusted, this is because the certificate was signed by a root certificate which is not trusted by the browser. Browsers will give an error when the site is visited....
Server uses SSLv2
If SSLv2 is used on a server, the SSLCheck will give an error because SSLv2 is a potential security risk. SSL v2 is an obsolete protocol with known weaknesses. We strongly recommend deactivating the protocol. We refer to the...
The server uses a weak private key
In a number of OpenSSL implementations on Debian based Linux distributions a serious leak was found when generating the private keys. As a result the private keys generated on the systems for usage with SSH, OpenVPN, DNSSec a...
Call us +31 88 775 775 0
Our SSLCheck will examine your website's root and intermediate certificates for correctness and report any potential issues