SSL(CA) Checker

SSL Fingerprint

this website fingerprint(SHA1)(copy that) :

BB:F0:26:D0:79:57:80:2F:E1:F1:00:7E:1C:8E:6F:44:78:04:EF:C8 NOTES : https://whatismyip.pro/ valid until July 29, 2020. As this SSL as been compromised i suggest take skyrivermecatronic.com

C4:EE:E3:68:59:88:D0:6D:38:C2:6A:1C:C8:D9:2C:13:6B:BD:CD:53 NOTES : https://skyrivermecatronic.com/ <---SSL for skyrivermecatronic.com not for gsrmt.com --- Expire on : October 21, 2020

Simply look at https://skyrivermecatronic.com/security/ and lookup browser cert

Why? For a prevention check against man in the middle attack.

.... nano gsrmt.com.sslcert.txt and keep it somewhere : - )

Query SHA1

Query SSL(CA) SHA1 fingerprint from HTTPS website.

Simply a text input field (For tabs...)No memory so put after page reload.


Website URL


Query value

Security tips for Unix users

You don't use it.... purge it.

SSL(CA)

What is SSL certificate or CA?

In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a trusted third party—trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. The format of these certificates is specified by the X.509 standard. One particularly common use for certificate authorities is to sign certificates used in HTTPS, the secure browsing protocol for the World Wide Web. Another common use is in issuing identity cards by national governments for use in electronically signing documents.

X.509 standard

In cryptography, X.509 is a standard defining the format of public key certificates. X.509 certificates are used in many Internet protocols, including TLS/SSL, which is the basis for HTTPS[1], the secure protocol for browsing the web. They are also used in offline applications, like electronic signatures. An X.509 certificate contains a public key and an identity (a hostname, or an organization, or an individual), and is either signed by a certificate authority or self-signed. When a certificate is signed by a trusted certificate authority, or validated by other means, someone holding that certificate can rely on the public key it contains to establish secure communications with another party, or validate documents digitally signed by the corresponding private key. X.509 also defines certificate revocation lists, which are a means to distribute information about certificates that have been deemed invalid by a signing authority, as well as a certification path validation algorithm, which allows for certificates to be signed by intermediate CA certificates, which are, in turn, signed by other certificates, eventually reaching a trust anchor. X.509 is defined by the International Telecommunications Union's Standardization sector (ITU-T), and is based on ASN.1, another ITU-T standard.

Wikipedia Certificate Authority

Date 2019/12/10 & Unix Epoch 1576011501

this website is made with nano editor!
CSS framework taken from w3schools.com, easily customisable, it make magic!