This application checks a DANE TLS Service. It connects to the specified TLS service and then attempts to authenticate its TLS server certificate according to its corresponding DANE TLSA records in the DNS.
Port: 443
Domain name: johnscott.me
Checking Transcript:
Host: johnscott.me Port: 443 SNI: johnscott.me DNS TLSA RRset: qname: _443._tcp.johnscott.me. 3 1 1 4255623d4db4263d02248265355d76d2ce506f41d102b651b0b32ac4eebc9a0a IP Addresses found: 2600:3c03::f03c:93ff:fef6:24 172.104.214.157 ## Checking johnscott.me 2600:3c03::f03c:93ff:fef6:24 port 443 DANE TLSA 3 1 1 [4255623d..]: not checked Result: FAILED: dial tcp [2600:3c03::f03c:93ff:fef6:24]:443: connect: no route to host ## Checking johnscott.me 172.104.214.157 port 443 DANE TLSA 3 1 1 [4255623d..]: OK matched EE certificate ## Peer Certificate Chain: 0 CN=johnscott.me CN=R3,O=Let's Encrypt,C=US 1 CN=R3,O=Let's Encrypt,C=US CN=ISRG Root X1,O=Internet Security Research Group,C=US 2 CN=ISRG Root X1,O=Internet Security Research Group,C=US CN=DST Root CA X3,O=Digital Signature Trust Co. ## PKIX Certificate Chain 0: 0 CN=johnscott.me CN=R3,O=Let's Encrypt,C=US 1 CN=R3,O=Let's Encrypt,C=US CN=ISRG Root X1,O=Internet Security Research Group,C=US 2 CN=ISRG Root X1,O=Internet Security Research Group,C=US CN=ISRG Root X1,O=Internet Security Research Group,C=US ## DANE Certificate Chain 0: 0 CN=johnscott.me CN=R3,O=Let's Encrypt,C=US 1 CN=R3,O=Let's Encrypt,C=US CN=ISRG Root X1,O=Internet Security Research Group,C=US 2 CN=ISRG Root X1,O=Internet Security Research Group,C=US CN=DST Root CA X3,O=Digital Signature Trust Co. ## TLS Connection Info: TLS version: 1.3 CipherSuite: TLS_AES_128_GCM_SHA256 ## End-Entity Certificate Info: X509 version: 3 Serial#: 3cbcbbcdbe5304858bbf491e990b84285a4 Subject: CN=johnscott.me Issuer: CN=R3,O=Let's Encrypt,C=US SAN dNSName: johnscott.me Signature Algorithm: SHA256-RSA PublicKey Algorithm: RSA 2048-Bits Inception: 2023-08-13 01:21:45 +0000 UTC Expiration: 2023-11-11 01:21:44 +0000 UTC KU: DigitalSignature KeyEncipherment EKU: ServerAuth ClientAuth Is CA?: false SKI: c02263f5a35281ae50485ff437bb477afcec6446 AKI: 142eb317b75856cbae500940e61faf9d8b14c2c6 OSCP Servers: [http://r3.o.lencr.org] CA Issuer URL: [http://r3.i.lencr.org/] CRL Distribution: [] Policy OIDs: [2.23.140.1.2.1] Result: DANE OK [1] Authentication succeeded for some (1 of 2) peers.