证书信息
信任状态 | 可信 |
是 | |
通用名称 | baidu.com |
颁发者 | GlobalSign RSA OV SSL CA 2018 |
启用SNI | 是 |
弱密钥检测 | 否 |
加密算法 | RSA 2048 bits |
签名算法 | SHA256WithRSA |
证书透明(CT) | 是 (Apple: (来自证书,有效)) |
证书品牌 | GlobalSign |
证书类型 | OV SSL |
开始时间 | 2024-07-08 09:41:02 |
结束时间 | 2025-08-09 09:41:01 |
吊销状态 | 正常 |
OCSP装订状态 | 不支持 |
OCSP 必须装订 | 否 |
组织机构 | Beijing Baidu Netcom Science Technology Co., Ltd |
部门 | -- |
备用名称 | baidu.com baifubao.com www.baidu.cn www.baidu.com.cn mct.y.nuomi.com ...... 查看全部 baidu.com baifubao.com www.baidu.cn www.baidu.com.cn mct.y.nuomi.com apollo.auto dwz.cn *.baidu.com *.baifubao.com *.baidustatic.com *.bdstatic.com *.bdimg.com *.hao123.com *.nuomi.com *.chuanke.com *.trustgo.com *.bce.baidu.com *.eyun.baidu.com *.map.baidu.com *.mbd.baidu.com *.fanyi.baidu.com *.baidubce.com *.mipcdn.com *.news.baidu.com *.baidupcs.com *.aipage.com *.aipage.cn *.bcehost.com *.safe.baidu.com *.im.baidu.com *.baiducontent.com *.dlnel.com *.dlnel.org *.dueros.baidu.com *.su.baidu.com *.91.com *.hao123.baidu.com *.apollo.auto *.xueshu.baidu.com *.bj.baidubce.com *.gz.baidubce.com *.smartapps.cn *.bdtjrcv.com *.hao222.com *.haokan.com *.pae.baidu.com *.vd.bdstatic.com *.cloud.baidu.com click.hm.baidu.com log.hm.baidu.com cm.pos.baidu.com wn.pos.baidu.com update.pan.baidu.com |
证书链信息 了解详细 下载证书链
颁发给: | baidu.com(根证书来自服务器,会增加额外的握手开销) |
颁发者: | GlobalSign RSA OV SSL CA 2018 |
加密算法: | RSA 2048 bits |
签名算法: | SHA256WithRSA |
证书指纹: | EF0FBE1302E2C4D489BA8FBA88EF6F95DCCF7BE0 |
公钥PIN值: | g8CsdcpyAKxmLoWFvMd2hC7ZDUy7L4E2NYOi1i8qEtE= |
有效期: | 2024-07-08 ~ 2025-08-09 (剩余 226 天) |
颁发给: | GlobalSign RSA OV SSL CA 2018(根证书来自服务器,会增加额外的握手开销) |
颁发者: | GlobalSign |
加密算法: | RSA 2048 bits |
签名算法: | SHA256WithRSA |
证书指纹: | DFE83023062B997682708B4EAB8E819AFF5D9775 |
公钥PIN值: | hETpgVvaLC0bvcGG3t0cuqiHvr4XyP2MTwCiqhgRWwU= |
有效期: | 2018-11-21 ~ 2028-11-21 (剩余 1426 天) |
颁发给: | GlobalSign(根证书来自服务器,会增加额外的握手开销) |
颁发者: | GlobalSign Root CA |
加密算法: | RSA 2048 bits |
签名算法: | SHA256WithRSA |
证书指纹: | 0BBFAB97059595E8D1EC48E89EB8657C0E5AAE71 |
公钥PIN值: | cGuxAXyFXFkWm61cF4HPWX8S0srS9j0aSqN0k4AP+4A= |
有效期: | 2018-09-19 ~ 2028-01-28 (剩余 1128 天) |
颁发给: | GlobalSign Root CA(根证书来自服务器,会增加额外的握手开销) |
颁发者: | GlobalSign Root CA |
加密算法: | RSA 2048 bits |
签名算法: | SHA1WithRSA |
证书指纹: | B1BC968BD4F49D622AA89A81F2150152A41D829C |
公钥PIN值: | K87oWBWM9UZfyddvDfoxL+8lpNyoUB2ptGtn0fv6G2Q= |
有效期: | 1998-09-01 ~ 2028-01-28 (剩余 1128 天) |
颁发给: | baidu.com (根证书来自服务器,会增加额外的握手开销) |
颁发者: | GlobalSign RSA OV SSL CA 2018 |
有效期: | 2024-07-08 ~ 2025-08-09 (剩余 226 天) |
颁发给: | GlobalSign RSA OV SSL CA 2018 (根证书来自服务器,会增加额外的握手开销) |
颁发者: | GlobalSign |
有效期: | 2018-11-21 ~ 2028-11-21 (剩余 1426 天) |
颁发给: | GlobalSign (根证书来自服务器,会增加额外的握手开销) |
颁发者: | GlobalSign Root CA |
有效期: | 2018-09-19 ~ 2028-01-28 (剩余 1128 天) |
颁发给: | GlobalSign Root CA (根证书来自服务器,会增加额外的握手开销) |
颁发者: | GlobalSign Root CA |
有效期: | 1998-09-01 ~ 2028-01-28 (剩余 1128 天) |
支持协议
TLS 1.3 | 不支持 | ||
TLS 1.2 | 支持 | ||
TLS 1.1 | 不支持 | ||
TLS 1.0 | 不支持 | 0 | |
SSL 3 | 不支持 | ||
SSL 2 | 不支持 |
支持的加密套件
TLS 1.2 (服务器顺序优先) |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xC02F) 128 bits FS 名称:TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 代码:0xC02F 描述:ECDH x25519 (eq. 3072 bits RSA) 加密强度:128 bits 正向加密:YES 是否安全:YES TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xC013) 128 bits FS 名称:TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 代码:0xC013 描述:ECDH x25519 (eq. 3072 bits RSA) 加密强度:128 bits 正向加密:YES 是否安全:YES TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xC014) 256 bits FS 名称:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 代码:0xC014 描述:ECDH x25519 (eq. 3072 bits RSA) 加密强度:256 bits 正向加密:YES 是否安全:YES TLS_RSA_WITH_AES_128_CBC_SHA (0x2F) 128 bits 名称:TLS_RSA_WITH_AES_128_CBC_SHA 代码:0x2F 描述: 加密强度:128 bits 正向加密:NO 是否安全:WEAK TLS_RSA_WITH_AES_256_CBC_SHA (0x35) 256 bits 名称:TLS_RSA_WITH_AES_256_CBC_SHA 代码:0x35 描述: 加密强度:256 bits 正向加密:NO 是否安全:WEAK |
协议详情
HTTP/2 | 不支持 | |
新型的TLS配置 | 是 | |
支持TLS 1.3 | 不支持 | |
期望CT | 不支持 | |
OCSP装订 | 不支持 | |
预防降级攻击 | 未知 | 针对同时支持两种以上协议的情况(不包括SSL2) |
正向保密 | 支持 | |
HTTP严格传输安全(HSTS) | 不支持 | |
公钥固定(HPKP) | 不支持 | |
公钥固定报告 | 不支持 | |
XSS保护 | 不支持 | |
CAA | 不支持 | |
NPN | 不支持 | |
ALPN | 支持 | http/1.1 |
TLS心跳(扩展) | 不支持 | |
支持的EC椭圆曲线 | 支持 | x25519,secp256r1 (服务器顺序优先) |
SSL2握手兼容 | 支持 | |
会话恢复(caching) | 支持 | |
会话恢复(Ticket) | 支持 | |
STARTTLS | 不支持 | |
过长的ClientHello兼容 | 不支持 | |
未知TLS版本兼容 | 不支持 | |
不正确的SNI警告 | 不支持 | |
DH公钥参数重用 | 否 | 不支持DHE系列的加密套件 |
ECDH公钥参数重用 | 否 | |
服务端安全重协商 | 支持 | |
客户端安全重协商 | 不支持 | |
客户端不安全重协商 | 不支持 | |
支持RC4套件 | 不支持 | |
是否为邮件服务器 | 否 |
SSL漏洞
是否影响 | 危险系数 | 说明 | |
---|---|---|---|
因系统升级改造,相关功能暂停服务! | |||
DROWN 漏洞 | |||
OpenSSL Padding Oracle 攻击 | |||
FREAK漏洞 | |||
Logjam漏洞 | |||
OpenSSL CCS 注入漏洞 | |||
心血漏洞(Heartbleed) | |||
POODLE漏洞 | |||
CRIME漏洞 |
客户端握手模拟
Android 4.4.2 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Android 5.0.0 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Android 6.0 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Android 7.0 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Android 8.0 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Android 9.0 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Baiduspider/2.0 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Googlebot/2.0 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
YandexBot July 2018 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
360Spider July 2018 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
SougouSpider July 2018 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Baidu HTTPS认证 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
BingPreview Jan 2015 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Chrome 49 / XP SP3 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Chrome 51 / Win 7 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Chrome 63 /macOS High Sierra 10.13.2 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Chrome 69 / Win 10 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Chrome 71 / Win 10 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Chrome 80 / Win 10 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 31.3.0 ESR / Win 7 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 47 / Win 7 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 49 / XP SP3 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 49 / Win 7 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 57 /macOS High Sierra 10.13.2 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 62 / Win 10 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 64 / win 10 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 73 / Win 10 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
IE 6 / XP No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 7 / Vista No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 8 / XP No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 8-10 / Win 7 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 11 / Win 7 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA FS | |
IE 11 / Win 8.1 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA FS | |
IE 10 / Win Phone 8.0 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 11 / Win Phone 8.1 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA FS | |
IE 11 / Win Phone 8.1 Update No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA FS | |
IE 11 / Win 10 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Edge 13 / Win 10 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Edge 13 / Win Phone 10 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Java 6u45 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Java 7u25 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Java 8u31 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Java 11.0.3 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
OpenSSL 0.9.8y No FS1 No SNI2 | 握手失败 (protocol_version) | |||
OpenSSL 1.0.1l No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
OpenSSL 1.0.2e No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Openssl 1.1.1 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Safari 5.1.9 / OS X 10.6.8 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Safari 6 / iOS 6.0.1 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA FS | |
Safari 6.0.4 / OS X 10.8.4 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Safari 7 / iOS 7.1 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA FS | |
Safari 7 / OS X 10.9 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA FS | |
Safari 8 / iOS 8.4 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA FS | |
Safari 8 / OS X 10.10 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA FS | |
Safari 9 / iOS 9 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Safari 9 / OS X 10.11 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Safari 10 / iOS 10 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Safari 10 / OS X 10.12 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Apple ATS 9 / iOS 9 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Yahoo Slurp Jan 2015 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
UC浏览器 6 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
360浏览器 13 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
360极速浏览器 8 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
360浏览器 12 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
360浏览器 8 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
QQ浏览器 9 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
世界之窗浏览器 7 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
猎豹浏览器 6 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
傲游浏览器 5 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
搜狗浏览器 7 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
百度浏览器 8 No FS1 No SNI2 | RSA(SHA256) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA FS |
证书兼容性测试
RSA | |
---|---|
Android 2.3 (Gingerbread) | |
Android 4.0 (Ice Cream Sandwich) | |
Android 4.1 (Jelly Bean) | |
Android 4.2 (Jelly Bean) | |
Android 4.3 (Jelly Bean) | |
Android 4.4 (KitKat) | |
Android 5.0 (Lollipop) | |
Android 5.1 (Lollipop) | |
Android 6.0 (Marshmallow) | |
Android 7.0 (Android Nougat) | |
Android 7.1 (Android Nougat) | |
Android 8.0 (Android Oreo) | |
Android 9.0 (Android Pie) | |
Android 10.0 (Android Q) | |
Android 11.0 (Android R) | |
iOS 5-6 | |
iOS 7 | |
iOS 8 | |
iOS 9 | |
iOS 10 | |
iOS 11 | |
iOS 12 | |
iOS 13 | |
iOS 14 | |
OS X 10.9 (Mavericks) | |
OS X 10.10 (Yosemite) | |
OS X 10.11 (Eicapitan) | |
OS X 10.12 (Sierra) | |
OS X 10.13 (High Sierra) | |
OS X 10.14 (Mojave) | |
java 7u181 | |
java 8u161 | |
java_8u181 | |
java_8u202 | |
java 9 | |
java 10 | |
java 11 | |
java 12 | |
java 13 | |
java 17 | |
Firefox 3.0 | |
Firefox 3.5 | |
Firefox 3.6 | |
Firefox 6.0 | |
Firefox 16 | |
Firefox 23 | |
Firefox 32 | |
Firefox 42 | |
Firefox 50 | |
Firefox 51 | |
Firefox 54 | |
Firefox 58 | |
Firefox 63 | |
Firefox 65 | |
Windows XP | |
Windows 7 | |
Windows 8 | |
Windows 10 |
配置指南:
说明:
- SNI:服务器名称指示,这是一个的TLS扩展,允许服务器在相同的IP和端口上部署多个证书。
- PFS:PFS(perfect forward secrecy)完全正向保密,要求一个密钥只能用于一个连接,一个密钥被破解,并不影响其他密钥的安全性。
- HPKP:公钥固定,这是一种https网站防止攻击者使用CA错误颁发的证书进行中间人攻击的一种安全机制。
- HSTS:这是一个响应头,用来强制启用HTTPS协议,解决301跳转的劫持的问题。
- OCSP:Online Certificate Status Protocol 证书吊销状态在线检查协议。
- OCSP Stapling:OCSP装订,通过TLS握手时传输吊销状态,加快SSL完成握手的速度。
登录后查看更多信息
登录