证书信息
信任状态 | 可信 |
是 | |
通用名称 | lencr.org |
颁发者 | E5 |
启用SNI | 是 |
弱密钥检测 | 否 |
加密算法 | ECDSA 256 bits |
签名算法 | ECDSAWithSHA384 |
证书透明(CT) | 是 (Apple: (来自证书,有效)) |
证书品牌 | ISRG Root X1 |
证书类型 | DV SSL |
开始时间 | 2024-10-08 23:33:56 |
结束时间 | 2025-01-06 23:33:55 |
吊销状态 | 正常 |
OCSP装订状态 | 不支持 |
OCSP 必须装订 | 否 |
组织机构 | -- |
部门 | -- |
备用名称 | lencr.org letsencrypt.com letsencrypt.org www.lencr.org www.letsencrypt.com ...... 查看全部 lencr.org letsencrypt.com letsencrypt.org www.lencr.org www.letsencrypt.com www.letsencrypt.org |
证书链信息 了解详细 下载证书链
颁发给: | lencr.org(根证书来自服务器,会增加额外的握手开销) |
颁发者: | E5 |
加密算法: | ECDSA 256 bits |
签名算法: | ECDSAWithSHA384 |
证书指纹: | DEF2440EA6CCB189C7CC9F4DC3EB10FA491AD861 |
公钥PIN值: | qGRRRGJbQJCFc1vfxMQcmKQ2375M2z9IYg2+MqsbhAQ= |
有效期: | 2024-10-08 ~ 2025-01-06 (剩余 15 天) |
颁发给: | E5(根证书来自服务器,会增加额外的握手开销) |
颁发者: | ISRG Root X1 |
加密算法: | ECDSA 384 bits |
签名算法: | SHA256WithRSA |
证书指纹: | 5F28D9C589EE4BF31A11B78C72B8D13F079DDC45 |
公钥PIN值: | NYbU7PBwV4y9J67c4guWTki8FJ+uudrXL0a4V4aRcrg= |
有效期: | 2024-03-13 ~ 2027-03-13 (剩余 810 天) |
颁发给: | ISRG Root X1(根证书来自服务器,会增加额外的握手开销) |
颁发者: | ISRG Root X1 |
加密算法: | RSA 4096 bits |
签名算法: | SHA256WithRSA |
证书指纹: | CABD2A79A1076A31F21D253635CB039D4329A5E8 |
公钥PIN值: | C5+lpZ7tcVwmwQIMcRtPbsQtWLABXhQzejna0wHFr8M= |
有效期: | 2015-06-04 ~ 2035-06-04 (剩余 3816 天) |
颁发给: | lencr.org (根证书来自服务器,会增加额外的握手开销) |
颁发者: | E5 |
有效期: | 2024-10-08 ~ 2025-01-06 (剩余 15 天) |
颁发给: | E5 (根证书来自服务器,会增加额外的握手开销) |
颁发者: | ISRG Root X1 |
有效期: | 2024-03-13 ~ 2027-03-13 (剩余 810 天) |
颁发给: | ISRG Root X1 (根证书来自服务器,会增加额外的握手开销) |
颁发者: | ISRG Root X1 |
有效期: | 2015-06-04 ~ 2035-06-04 (剩余 3816 天) |
信任状态 | 域名不匹配 (主流浏览器访问不受影响,影响少数不支持SNI的旧浏览器) |
否 | |
通用名称 | *.netlify.app (不匹配) |
颁发者 | DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
启用SNI | 否 |
弱密钥检测 | 否 |
加密算法 | ECDSA 256 bits |
签名算法 | SHA256WithRSA |
证书透明(CT) | 是 (Apple: (来自证书,有效)) |
证书品牌 | DigiCert |
证书类型 | OV SSL |
开始时间 | 2024-01-15 08:00:00 |
结束时间 | 2025-02-15 07:59:59 |
吊销状态 | 正常 |
OCSP装订状态 | 不支持 |
OCSP 必须装订 | 否 |
组织机构 | Netlify, Inc |
部门 | -- |
备用名称 | *.netlify.app netlify.app *.netlify.app netlify.app |
证书链信息 了解详细 下载证书链
颁发给: | *.netlify.app(根证书来自服务器,会增加额外的握手开销) |
颁发者: | DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
加密算法: | ECDSA 256 bits |
签名算法: | SHA256WithRSA |
证书指纹: | B08EE9A5C3D9B5C1FFB6517ADF98CF2D2818419B |
公钥PIN值: | DFv0rPImhleLzIvctvEusBa5wnzQ/+aSqyW18y26L+s= |
有效期: | 2024-01-15 ~ 2025-02-15 (剩余 54 天) |
颁发给: | DigiCert Global G2 TLS RSA SHA256 2020 CA1(根证书来自服务器,会增加额外的握手开销) |
颁发者: | DigiCert Global Root G2 |
加密算法: | RSA 2048 bits |
签名算法: | SHA256WithRSA |
证书指纹: | 1B511ABEAD59C6CE207077C0BF0E0043B1382612 |
公钥PIN值: | Wec45nQiFwKvHtuHxSAMGkt19k+uPSw9JlEkxhvYPHk= |
有效期: | 2021-03-30 ~ 2031-03-30 (剩余 2288 天) |
颁发给: | DigiCert Global Root G2(根证书来自服务器,会增加额外的握手开销) |
颁发者: | DigiCert Global Root G2 |
加密算法: | RSA 2048 bits |
签名算法: | SHA256WithRSA |
证书指纹: | DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 |
公钥PIN值: | i7WTqTvh0OioIruIfFR4kMPnBqrS2rdiVPl/s2uC/CY= |
有效期: | 2013-08-01 ~ 2038-01-15 (剩余 4772 天) |
颁发给: | *.netlify.app (根证书来自服务器,会增加额外的握手开销) |
颁发者: | DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
有效期: | 2024-01-15 ~ 2025-02-15 (剩余 54 天) |
颁发给: | DigiCert Global G2 TLS RSA SHA256 2020 CA1 (根证书来自服务器,会增加额外的握手开销) |
颁发者: | DigiCert Global Root G2 |
有效期: | 2021-03-30 ~ 2031-03-30 (剩余 2288 天) |
颁发给: | DigiCert Global Root G2 (根证书来自服务器,会增加额外的握手开销) |
颁发者: | DigiCert Global Root G2 |
有效期: | 2013-08-01 ~ 2038-01-15 (剩余 4772 天) |
支持协议
TLS 1.3 | 支持 | ||
TLS 1.2 | 支持 | ||
TLS 1.1 | 不支持 | ||
TLS 1.0 | 不支持 | 0 | |
SSL 3 | 不支持 | ||
SSL 2 | 不支持 |
支持的加密套件
TLS 1.3 (服务器顺序优先) |
TLS_AES_128_GCM_SHA256 (0x1301) 128 bits FS 名称:TLS_AES_128_GCM_SHA256 代码:0x1301 描述:ECDH x25519 (eq. 3072 bits RSA) 加密强度:128 bits 正向加密:YES 是否安全:YES TLS_AES_256_GCM_SHA384 (0x1302) 256 bits FS 名称:TLS_AES_256_GCM_SHA384 代码:0x1302 描述:ECDH x25519 (eq. 3072 bits RSA) 加密强度:256 bits 正向加密:YES 是否安全:YES TLS_CHACHA20_POLY1305_SHA256 (0x1303) 256 bits FS 名称:TLS_CHACHA20_POLY1305_SHA256 代码:0x1303 描述:ECDH x25519 (eq. 3072 bits RSA) 加密强度:256 bits 正向加密:YES 是否安全:YES |
TLS 1.2 (服务器顺序优先) |
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xC02B) 128 bits FS 名称:TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 代码:0xC02B 描述:ECDH secp256r1 (eq. 3072 bits RSA) 加密强度:128 bits 正向加密:YES 是否安全:YES TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xC02C) 256 bits FS 名称:TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 代码:0xC02C 描述:ECDH secp256r1 (eq. 3072 bits RSA) 加密强度:256 bits 正向加密:YES 是否安全:YES TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xCCA9) 256 bits FS 名称:TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 代码:0xCCA9 描述:ECDH secp256r1 (eq. 3072 bits RSA) 加密强度:256 bits 正向加密:YES 是否安全:YES |
协议详情
HTTP/2 | 支持 | |
新型的TLS配置 | 是 | |
支持TLS 1.3 | 支持 | |
期望CT | 不支持 | |
OCSP装订 | 不支持 | |
预防降级攻击 | 未知 | 针对同时支持两种以上协议的情况(不包括SSL2) |
正向保密 | 支持 | |
HTTP严格传输安全(HSTS) | 支持 | max-age=31536000 |
公钥固定(HPKP) | 不支持 | |
公钥固定报告 | 不支持 | |
XSS保护 | 支持 | 1; mode=block |
CAA | 不支持 | |
NPN | 不支持 | |
ALPN | 支持 | h2,http/1.1 |
TLS心跳(扩展) | 不支持 | |
支持的EC椭圆曲线 | 支持 | secp256r1,x25519 |
SSL2握手兼容 | 不支持 | |
会话恢复(caching) | 不支持 | 服务端没有分配SessionID |
会话恢复(Ticket) | 不支持 | |
STARTTLS | 不支持 | |
过长的ClientHello兼容 | 不支持 | |
未知TLS版本兼容 | 不支持 | |
不正确的SNI警告 | 不支持 | |
DH公钥参数重用 | 否 | 不支持DHE系列的加密套件 |
ECDH公钥参数重用 | 否 | |
服务端安全重协商 | 支持 | |
客户端安全重协商 | 不支持 | |
客户端不安全重协商 | 不支持 | |
支持RC4套件 | 不支持 | |
是否为邮件服务器 | 否 |
SSL漏洞
是否影响 | 危险系数 | 说明 | |
---|---|---|---|
因系统升级改造,相关功能暂停服务! | |||
DROWN 漏洞 | |||
OpenSSL Padding Oracle 攻击 | |||
FREAK漏洞 | |||
Logjam漏洞 | |||
OpenSSL CCS 注入漏洞 | |||
心血漏洞(Heartbleed) | |||
POODLE漏洞 | |||
CRIME漏洞 |
客户端握手模拟
Android 4.4.2 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Android 5.0.0 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Android 6.0 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Android 7.0 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
Android 8.0 No FS1 No SNI2 | 握手失败 (handshake_failure) | |||
Android 9.0 No FS1 No SNI2 | 握手失败 (handshake_failure) | |||
Baiduspider/2.0 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Googlebot/2.0 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
YandexBot July 2018 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
360Spider July 2018 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
SougouSpider July 2018 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Baidu HTTPS认证 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
BingPreview Jan 2015 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Chrome 49 / XP SP3 No FS1 No SNI2 | 握手失败 (handshake_failure) | |||
Chrome 51 / Win 7 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Chrome 63 /macOS High Sierra 10.13.2 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Chrome 69 / Win 10 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Chrome 71 / Win 10 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.3 | TLS_AES_128_GCM_SHA256 | |
Chrome 80 / Win 10 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.3 | TLS_AES_128_GCM_SHA256 | |
Firefox 31.3.0 ESR / Win 7 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 47 / Win 7 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 49 / XP SP3 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 49 / Win 7 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 57 /macOS High Sierra 10.13.2 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 62 / Win 10 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 64 / win 10 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.3 | TLS_AES_128_GCM_SHA256 | |
Firefox 73 / Win 10 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.3 | TLS_AES_128_GCM_SHA256 | |
IE 6 / XP No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 7 / Vista No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 8 / XP No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 8-10 / Win 7 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 11 / Win 7 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
IE 11 / Win 8.1 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
IE 10 / Win Phone 8.0 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 11 / Win Phone 8.1 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
IE 11 / Win Phone 8.1 Update No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
IE 11 / Win 10 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Edge 13 / Win 10 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Edge 13 / Win Phone 10 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Java 6u45 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Java 7u25 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Java 8u31 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Java 11.0.3 No FS1 No SNI2 | 握手失败 (illegal_paramerter) | |||
OpenSSL 0.9.8y No FS1 No SNI2 | 握手失败 (protocol_version) | |||
OpenSSL 1.0.1l No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
OpenSSL 1.0.2e No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Openssl 1.1.1 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Safari 5.1.9 / OS X 10.6.8 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Safari 6 / iOS 6.0.1 No FS1 No SNI2 | 握手失败 (handshake_failure) | |||
Safari 6.0.4 / OS X 10.8.4 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Safari 7 / iOS 7.1 No FS1 No SNI2 | 握手失败 (handshake_failure) | |||
Safari 7 / OS X 10.9 No FS1 No SNI2 | 握手失败 (handshake_failure) | |||
Safari 8 / iOS 8.4 No FS1 No SNI2 | 握手失败 (handshake_failure) | |||
Safari 8 / OS X 10.10 No FS1 No SNI2 | 握手失败 (handshake_failure) | |||
Safari 9 / iOS 9 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Safari 9 / OS X 10.11 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Safari 10 / iOS 10 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Safari 10 / OS X 10.12 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Apple ATS 9 / iOS 9 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
Yahoo Slurp Jan 2015 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
UC浏览器 6 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
360浏览器 13 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
360极速浏览器 8 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
360浏览器 12 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.3 | TLS_AES_128_GCM_SHA256 | |
360浏览器 8 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
QQ浏览器 9 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
世界之窗浏览器 7 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
猎豹浏览器 6 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
傲游浏览器 5 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
搜狗浏览器 7 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS | |
百度浏览器 8 No FS1 No SNI2 | ECDSA(SHA384) | TLSv1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 FS |
证书兼容性测试
ECC | ECC | |
---|---|---|
Android 2.3 (Gingerbread) | ||
Android 4.0 (Ice Cream Sandwich) | ||
Android 4.1 (Jelly Bean) | ||
Android 4.2 (Jelly Bean) | ||
Android 4.3 (Jelly Bean) | ||
Android 4.4 (KitKat) | ||
Android 5.0 (Lollipop) | ||
Android 5.1 (Lollipop) | ||
Android 6.0 (Marshmallow) | ||
Android 7.0 (Android Nougat) | ||
Android 7.1 (Android Nougat) | ||
Android 8.0 (Android Oreo) | ||
Android 9.0 (Android Pie) | ||
Android 10.0 (Android Q) | ||
Android 11.0 (Android R) | ||
iOS 5-6 | ||
iOS 7 | ||
iOS 8 | ||
iOS 9 | ||
iOS 10 | ||
iOS 11 | ||
iOS 12 | ||
iOS 13 | ||
iOS 14 | ||
OS X 10.9 (Mavericks) | ||
OS X 10.10 (Yosemite) | ||
OS X 10.11 (Eicapitan) | ||
OS X 10.12 (Sierra) | ||
OS X 10.13 (High Sierra) | ||
OS X 10.14 (Mojave) | ||
java 7u181 | ||
java 8u161 | ||
java_8u181 | ||
java_8u202 | ||
java 9 | ||
java 10 | ||
java 11 | ||
java 12 | ||
java 13 | ||
java 17 | ||
Firefox 3.0 | ||
Firefox 3.5 | ||
Firefox 3.6 | ||
Firefox 6.0 | ||
Firefox 16 | ||
Firefox 23 | ||
Firefox 32 | ||
Firefox 42 | ||
Firefox 50 | ||
Firefox 51 | ||
Firefox 54 | ||
Firefox 58 | ||
Firefox 63 | ||
Firefox 65 | ||
Windows XP | ||
Windows 7 | ||
Windows 8 | ||
Windows 10 |
配置指南:
说明:
- SNI:服务器名称指示,这是一个的TLS扩展,允许服务器在相同的IP和端口上部署多个证书。
- PFS:PFS(perfect forward secrecy)完全正向保密,要求一个密钥只能用于一个连接,一个密钥被破解,并不影响其他密钥的安全性。
- HPKP:公钥固定,这是一种https网站防止攻击者使用CA错误颁发的证书进行中间人攻击的一种安全机制。
- HSTS:这是一个响应头,用来强制启用HTTPS协议,解决301跳转的劫持的问题。
- OCSP:Online Certificate Status Protocol 证书吊销状态在线检查协议。
- OCSP Stapling:OCSP装订,通过TLS握手时传输吊销状态,加快SSL完成握手的速度。
登录后查看更多信息
登录