SSLCheck

  • When the SSLCheck gives an error that the certificate is not signed, a self-signed certificate is active on the server. A self-signed certificate secures the connection with SSL. But because the certificate isn't issued by a...

    More

  • Certificates using only 1024 bit root certificates are not trusted anymore. After the browser is updated the certificates will be blocked. An error wil occur on the client side. Replacing the root certificates Issues with t...

    More

  • SSL certificates are not directly signed by the root certificates that are stored in the browsers, but by an intermediate or intermediate certificate. This intermediate certificate is a type of certificate used by the publish...

    More

  • When the SSLCheck indicates that the root certificate is not trusted, this is because the certificate was signed by a root certificate which is not trusted by the browser. Browsers will give an error when the site is visited....

    More

  • If SSLv2 is used on a server, the SSLCheck will give an error because SSLv2 is a potential security risk. SSL v2 is an obsolete protocol with known weaknesses. We strongly recommend deactivating the protocol. We refer to the...

    More

  • In a number of OpenSSL implementations on Debian based Linux distributions a serious leak was found when generating the private keys. As a result the private keys generated on the systems for usage with SSH, OpenVPN, DNSSec a...

    More

point up