OCSP (Online Certificate Status Protocol) verifies whether an SSL certificate is revoked. Without OCSP Stapling the browser queries the CA's OCSP server on every new TLS connection — adding 100-300ms and leaking URLs to the CA. OCSP Stapling: the server fetches the OCSP response ahead of time and "staples" it to the TLS handshake. Faster and more private.
Below: details, example, related terms, FAQ.
ssl_stapling on; ssl_stapling_verify on;ssl_stapling on;
ssl_stapling_verify on;
ssl_trusted_certificate /path/chain.pem;
resolver 1.1.1.1 valid=60s;SSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.
Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).
Full chain verification: from leaf certificate through intermediates to root CA.
Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.
Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.
SSL certificate monitoring
TLS config audit
HTTPS as ranking factor
customer trust
www and subdomains.Strict-Transport-Security header forces browsers to always use HTTPS.SSL certificate monitoring, check history and alerts 30 days before expiry.
Sign up freeNot technically but strongly recommended. 100-300ms speedup and user privacy protection.
Yes, fully. Let's Encrypt serves OCSP via ocsp.int-x3.letsencrypt.org.
CRL (Certificate Revocation List) is the full list of revoked certs a CA maintains. OCSP queries a single cert status — faster and lighter.