证书信息
信任状态 | 可信 |
是 | |
通用名称 | www.xiaoz.me |
颁发者 | TrustAsia RSA DV TLS CA G3 |
启用SNI | 是 |
弱密钥检测 | 否 |
加密算法 | RSA 2048 bits |
签名算法 | SHA384WithRSA |
证书透明(CT) | 是 (Apple: (来自证书,有效)) |
证书品牌 | TrustAsia |
证书类型 | DV SSL |
开始时间 | 2024-04-17 08:00:00 |
结束时间 | 2025-04-18 07:59:59 |
吊销状态 | 正常 |
OCSP装订状态 | 正常 |
OCSP 必须装订 | 否 |
组织机构 | -- |
部门 | -- |
备用名称 |
www.xiaoz.me xiaoz.me www.xiaoz.me xiaoz.me |
证书链信息 了解详细 下载证书链

颁发给: | www.xiaoz.me(根证书来自服务器,会增加额外的握手开销) |
颁发者: | TrustAsia RSA DV TLS CA G3 |
加密算法: | RSA 2048 bits |
签名算法: | SHA384WithRSA |
证书指纹: | 5096C6FB76BB8CC87F72F3D755908869C4C0B344 |
公钥PIN值: | Ky6lu075T4AisPVS8kUkJp4Qi5+PQwShitbBCxzSRGw= |
有效期: | 2024-04-17 ~ 2025-04-18 (剩余 34 天) |

颁发给: | TrustAsia RSA DV TLS CA G3(根证书来自服务器,会增加额外的握手开销) |
颁发者: | USERTrust RSA Certification Authority |
加密算法: | RSA 3072 bits |
签名算法: | SHA384WithRSA |
证书指纹: | D7FD69705CBB61708066FF39A562D737E4EA77CE |
公钥PIN值: | B/N1Dbk37d8gadFssO90DgDkAmm6ZJJMG8xYPOwEHLM= |
有效期: | 2022-04-20 ~ 2032-04-20 (剩余 2593 天) |

颁发给: | USERTrust RSA Certification Authority(根证书来自服务器,会增加额外的握手开销) |
颁发者: | AAA Certificate Services |
加密算法: | RSA 4096 bits |
签名算法: | SHA384WithRSA |
证书指纹: | D89E3BD43D5D909B47A18977AA9D5CE36CEE184C |
公钥PIN值: | x4QzPSC810K5/cMjb05Qm4k3Bw5zBn4lTdO/nEW/Td4= |
有效期: | 2019-03-12 ~ 2029-01-01 (剩余 1388 天) |

颁发给: | AAA Certificate Services(根证书来自服务器,会增加额外的握手开销) |
颁发者: | AAA Certificate Services |
加密算法: | RSA 2048 bits |
签名算法: | SHA1WithRSA |
证书指纹: | D1EB23A46D17D68FD92564C2F1F1601764D8E349 |
公钥PIN值: | vRU+17BDT2iGsXvOi76E7TQMcTLXAqj0+jGPdW7L1vM= |
有效期: | 2004-01-01 ~ 2029-01-01 (剩余 1388 天) |

颁发给: | www.xiaoz.me (根证书来自服务器,会增加额外的握手开销) |
颁发者: | TrustAsia RSA DV TLS CA G3 |
有效期: | 2024-04-17 ~ 2025-04-18 (剩余 34 天) |

颁发给: | TrustAsia RSA DV TLS CA G3 (根证书来自服务器,会增加额外的握手开销) |
颁发者: | USERTrust RSA Certification Authority |
有效期: | 2022-04-20 ~ 2032-04-20 (剩余 2593 天) |

颁发给: | USERTrust RSA Certification Authority (根证书来自服务器,会增加额外的握手开销) |
颁发者: | AAA Certificate Services |
有效期: | 2019-03-12 ~ 2029-01-01 (剩余 1388 天) |

颁发给: | AAA Certificate Services (根证书来自服务器,会增加额外的握手开销) |
颁发者: | AAA Certificate Services |
有效期: | 2004-01-01 ~ 2029-01-01 (剩余 1388 天) |
信任状态 | 域名不匹配 (主流浏览器访问不受影响,影响少数不支持SNI的旧浏览器) |
否 | |
通用名称 | ai.xiaow365.com (不匹配) |
颁发者 | TrustAsia RSA DV TLS CA G2 |
启用SNI | 否 |
弱密钥检测 | 否 |
加密算法 | RSA 2048 bits |
签名算法 | SHA384WithRSA |
证书透明(CT) | 是 (Apple: (来自证书,有效)) |
证书品牌 | TrustAsia |
证书类型 | DV SSL |
开始时间 | 2024-02-26 08:00:00 |
结束时间 | 2025-02-26 07:59:59 |
吊销状态 | 正常 |
OCSP装订状态 | 正常 |
OCSP 必须装订 | 否 |
组织机构 | -- |
部门 | -- |
备用名称 |
ai.xiaow365.com ai.xiaow365.com |
证书链信息 了解详细 下载证书链

颁发给: | ai.xiaow365.com(根证书来自服务器,会增加额外的握手开销) |
颁发者: | TrustAsia RSA DV TLS CA G2 |
加密算法: | RSA 2048 bits |
签名算法: | SHA384WithRSA |
证书指纹: | E5102068FE31170FA620110B76D88AFB906CFA4C |
公钥PIN值: | lSEdNgSTUpg6R0aged+/JzZmsUNfIFx+egv3yFRwgds= |
有效期: | 2024-02-26 ~ 2025-02-26 (剩余 -17 天) |

颁发给: | TrustAsia RSA DV TLS CA G2(根证书来自服务器,会增加额外的握手开销) |
颁发者: | AAA Certificate Services |
加密算法: | RSA 3072 bits |
签名算法: | SHA256WithRSA |
证书指纹: | F34DDECF3EA10BD2E2F6308ED1CE537B093578B3 |
公钥PIN值: | vPjNqvoQM9P5euex2cOxX4mZokDnoELI4/2mE8DY0iU= |
有效期: | 2022-01-10 ~ 2029-01-01 (剩余 1388 天) |

颁发给: | AAA Certificate Services(根证书来自服务器,会增加额外的握手开销) |
颁发者: | AAA Certificate Services |
加密算法: | RSA 2048 bits |
签名算法: | SHA1WithRSA |
证书指纹: | D1EB23A46D17D68FD92564C2F1F1601764D8E349 |
公钥PIN值: | vRU+17BDT2iGsXvOi76E7TQMcTLXAqj0+jGPdW7L1vM= |
有效期: | 2004-01-01 ~ 2029-01-01 (剩余 1388 天) |

颁发给: | ai.xiaow365.com (根证书来自服务器,会增加额外的握手开销) |
颁发者: | TrustAsia RSA DV TLS CA G2 |
有效期: | 2024-02-26 ~ 2025-02-26 (剩余 -17 天) |

颁发给: | TrustAsia RSA DV TLS CA G2 (根证书来自服务器,会增加额外的握手开销) |
颁发者: | AAA Certificate Services |
有效期: | 2022-01-10 ~ 2029-01-01 (剩余 1388 天) |

颁发给: | AAA Certificate Services (根证书来自服务器,会增加额外的握手开销) |
颁发者: | AAA Certificate Services |
有效期: | 2004-01-01 ~ 2029-01-01 (剩余 1388 天) |
支持协议
TLS 1.3 | 支持 | ||
TLS 1.2 | 支持 | ||
TLS 1.1 | 不支持 | ||
TLS 1.0 | 不支持 | 0 | |
SSL 3 | 不支持 | ||
SSL 2 | 不支持 |
支持的加密套件
TLS 1.3 (服务器没有顺序偏好) |
TLS_AES_128_GCM_SHA256 (0x1301) 128 bits FS
名称:TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 (0x1302) 256 bits FS
名称:TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 (0x1303) 256 bits FS
名称:TLS_CHACHA20_POLY1305_SHA256 |
TLS 1.2 (服务器没有顺序偏好) |
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xCCA8) 256 bits FS
名称:TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xC02F) 128 bits FS
名称:TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xC030) 256 bits FS
名称:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xC027) 128 bits FS
名称:TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xC028) 256 bits FS
名称:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xC013) 128 bits FS
名称:TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xC014) 256 bits FS
名称:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_GCM_SHA256 (0x9C) 128 bits
名称:TLS_RSA_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_256_GCM_SHA384 (0x9D) 256 bits
名称:TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_128_CBC_SHA256 (0x3C) 128 bits
名称:TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 (0x3D) 256 bits
名称:TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA (0x2F) 128 bits
名称:TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA (0x35) 256 bits
名称:TLS_RSA_WITH_AES_256_CBC_SHA |
协议详情
HTTP/2 | 支持 | |
新型的TLS配置 | 是 | |
支持TLS 1.3 | 支持 | |
期望CT | 不支持 | |
OCSP装订 | 支持 | |
预防降级攻击 | 未知 | 针对同时支持两种以上协议的情况(不包括SSL2) |
正向保密 | 支持 | |
HTTP严格传输安全(HSTS) | 不支持 | |
公钥固定(HPKP) | 不支持 | |
公钥固定报告 | 不支持 | |
XSS保护 | 不支持 | |
CAA | 不支持 | |
NPN | 支持 | h2,http/1.1 |
ALPN | 支持 | h2,http/1.1 |
TLS心跳(扩展) | 不支持 | |
支持的EC椭圆曲线 | 支持 | x25519,secp256r1,x448,secp521r1,secp384r1 (服务器顺序优先) |
SSL2握手兼容 | 支持 | |
会话恢复(caching) | 未知 | |
会话恢复(Ticket) | 不支持 | |
STARTTLS | 不支持 | |
过长的ClientHello兼容 | 不支持 | |
未知TLS版本兼容 | 不支持 | |
不正确的SNI警告 | 不支持 | |
DH公钥参数重用 | 否 | 不支持DHE系列的加密套件 |
ECDH公钥参数重用 | 否 | |
服务端安全重协商 | 支持 | |
客户端安全重协商 | 支持 | |
客户端不安全重协商 | 不支持 | |
支持RC4套件 | 不支持 | |
是否为邮件服务器 | 否 |
SSL漏洞
是否影响 | 危险系数 | 说明 | |
---|---|---|---|
因系统升级改造,相关功能暂停服务! | |||
DROWN 漏洞 | |||
OpenSSL Padding Oracle 攻击 | |||
FREAK漏洞 | |||
Logjam漏洞 | |||
OpenSSL CCS 注入漏洞 | |||
心血漏洞(Heartbleed) | |||
POODLE漏洞 | |||
CRIME漏洞 |
客户端握手模拟
Android 4.4.2 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Android 5.0.0 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Android 6.0 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Android 7.0 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
Android 8.0 No FS1 No SNI2 | 握手失败 (handshake_failure) | |||
Android 9.0 No FS1 No SNI2 | 握手失败 (handshake_failure) | |||
Baiduspider/2.0 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Googlebot/2.0 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
YandexBot July 2018 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
360Spider July 2018 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
SougouSpider July 2018 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Baidu HTTPS认证 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
BingPreview Jan 2015 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Chrome 49 / XP SP3 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
Chrome 51 / Win 7 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
Chrome 63 /macOS High Sierra 10.13.2 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
Chrome 69 / Win 10 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
Chrome 71 / Win 10 No FS1 No SNI2 | RSA(SHA384) | TLSv1.3 | TLS_AES_128_GCM_SHA256 | |
Chrome 80 / Win 10 No FS1 No SNI2 | RSA(SHA384) | TLSv1.3 | TLS_AES_128_GCM_SHA256 | |
Firefox 31.3.0 ESR / Win 7 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Firefox 47 / Win 7 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
Firefox 49 / XP SP3 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
Firefox 49 / Win 7 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
Firefox 57 /macOS High Sierra 10.13.2 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
Firefox 62 / Win 10 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
Firefox 64 / win 10 No FS1 No SNI2 | RSA(SHA384) | TLSv1.3 | TLS_AES_128_GCM_SHA256 | |
Firefox 73 / Win 10 No FS1 No SNI2 | RSA(SHA384) | TLSv1.3 | TLS_AES_128_GCM_SHA256 | |
IE 6 / XP No FS1 No SNI2 | 握手失败 (handshake_failure) | |||
IE 7 / Vista No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 8 / XP No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 8-10 / Win 7 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 11 / Win 7 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 FS | |
IE 11 / Win 8.1 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 FS | |
IE 10 / Win Phone 8.0 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
IE 11 / Win Phone 8.1 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 FS | |
IE 11 / Win Phone 8.1 Update No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > http/1.1 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 FS | |
IE 11 / Win 10 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Edge 13 / Win 10 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Edge 13 / Win Phone 10 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Java 6u45 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Java 7u25 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Java 8u31 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Java 11.0.3 No FS1 No SNI2 | 握手失败 (illegal_paramerter) | |||
OpenSSL 0.9.8y No FS1 No SNI2 | 握手失败 (protocol_version) | |||
OpenSSL 1.0.1l No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
OpenSSL 1.0.2e No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Openssl 1.1.1 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
Safari 5.1.9 / OS X 10.6.8 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Safari 6 / iOS 6.0.1 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 FS | |
Safari 6.0.4 / OS X 10.8.4 No FS1 No SNI2 | 握手失败 (protocol_version) | |||
Safari 7 / iOS 7.1 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 FS | |
Safari 7 / OS X 10.9 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 FS | |
Safari 8 / iOS 8.4 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 FS | |
Safari 8 / OS X 10.10 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 FS | |
Safari 9 / iOS 9 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Safari 9 / OS X 10.11 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Safari 10 / iOS 10 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Safari 10 / OS X 10.12 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Apple ATS 9 / iOS 9 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
Yahoo Slurp Jan 2015 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
UC浏览器 6 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
360浏览器 13 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
360极速浏览器 8 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
360浏览器 12 No FS1 No SNI2 | RSA(SHA384) | TLSv1.3 | TLS_AES_128_GCM_SHA256 | |
360浏览器 8 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
QQ浏览器 9 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
世界之窗浏览器 7 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
猎豹浏览器 6 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
傲游浏览器 5 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 FS | |
搜狗浏览器 7 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 > h2 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 FS | |
百度浏览器 8 No FS1 No SNI2 | RSA(SHA384) | TLSv1.2 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 FS |
证书兼容性测试
RSA1 | RSA2 | |
---|---|---|
Android 2.3 (Gingerbread) | ||
Android 4.0 (Ice Cream Sandwich) | ||
Android 4.1 (Jelly Bean) | ||
Android 4.2 (Jelly Bean) | ||
Android 4.3 (Jelly Bean) | ||
Android 4.4 (KitKat) | ||
Android 5.0 (Lollipop) | ||
Android 5.1 (Lollipop) | ||
Android 6.0 (Marshmallow) | ||
Android 7.0 (Android Nougat) | ||
Android 7.1 (Android Nougat) | ||
Android 8.0 (Android Oreo) | ||
Android 9.0 (Android Pie) | ||
Android 10.0 (Android Q) | ||
Android 11.0 (Android R) | ||
iOS 5-6 | ||
iOS 7 | ||
iOS 8 | ||
iOS 9 | ||
iOS 10 | ||
iOS 11 | ||
iOS 12 | ||
iOS 13 | ||
iOS 14 | ||
OS X 10.9 (Mavericks) | ||
OS X 10.10 (Yosemite) | ||
OS X 10.11 (Eicapitan) | ||
OS X 10.12 (Sierra) | ||
OS X 10.13 (High Sierra) | ||
OS X 10.14 (Mojave) | ||
java 7u181 | ||
java 8u161 | ||
java_8u181 | ||
java_8u202 | ||
java 9 | ||
java 10 | ||
java 11 | ||
java 12 | ||
java 13 | ||
java 17 | ||
Firefox 3.0 | ||
Firefox 3.5 | ||
Firefox 3.6 | ||
Firefox 6.0 | ||
Firefox 16 | ||
Firefox 23 | ||
Firefox 32 | ||
Firefox 42 | ||
Firefox 50 | ||
Firefox 51 | ||
Firefox 54 | ||
Firefox 58 | ||
Firefox 63 | ||
Firefox 65 | ||
Windows XP | ||
Windows 7 | ||
Windows 8 | ||
Windows 10 |
配置指南:
说明:
- SNI:服务器名称指示,这是一个的TLS扩展,允许服务器在相同的IP和端口上部署多个证书。
- PFS:PFS(perfect forward secrecy)完全正向保密,要求一个密钥只能用于一个连接,一个密钥被破解,并不影响其他密钥的安全性。
- HPKP:公钥固定,这是一种https网站防止攻击者使用CA错误颁发的证书进行中间人攻击的一种安全机制。
- HSTS:这是一个响应头,用来强制启用HTTPS协议,解决301跳转的劫持的问题。
- OCSP:Online Certificate Status Protocol 证书吊销状态在线检查协议。
- OCSP Stapling:OCSP装订,通过TLS握手时传输吊销状态,加快SSL完成握手的速度。
登录后查看更多信息
登录当我的域名 www.xiaoz.me 的证书到期前30天和前7天
通过 邮箱提醒我。
提示:您目前部署了2张证书,我们会对可信的1张证书进行到期提醒。
邮件订阅