web analytics

SSL Testing Websites and Tools

Feb 25

SSL Testing WebSites.

In past couple of months I have come across many websites which helped me a lot to test and check SSL Installation and CSR. I would like to share the same with you.  There are many sites but today I am sharing with you special website which I think helped me a lot with SSL/TLS Testing and CSR testing.  List of websites are as below. I will later share features which I used on these websites and other information

1) SSLTools.com

2) redkestrel.co.uk

3) SSLshopper.com

4) secure.comodo.net/utilities/

-> 1) SSLTools.com


This is very great website I came across in past couple of months. It has great tools are available on this website. Following are description for the same:

1) CSR Decoder (http://ssltool.com/?action=csrDecodeOpenSSL)

CSR Decoder is great tool to check your CSR and verify that information you have filled in is correct and will be shown when you have your certificate from vendors.

2) SSL Certificate Checker (http://ssltool.com/?action=sslCheckOpenSSL)

Have you installed your certificate and want to check it. Here is another great tool to help you with SSL Certificate. It provides immanence information about SSL Certificate and will be very helpful after SSL Certificate installation.

3) OpenSSL S_client connector (http://ssltool.com/?action=sslCheckRawOpenSSL)

Great tool to help you to check the latest about SSL Certificate using OpenSSL s_client option. This tool provide you information like certificate details, CA authority and other stuff.

4) openssl s_client connector with full certificate output (http://ssltool.com/?action=sslCheckRawCertsOpenSSL)

Do you want more information about Certificate with this tool it will be great for you to understand SSL Certificate you have installed on your web server.

5) SSL Certificate Decoder (http://ssltool.com/?action=sslCertDecodeOpenSSL)

Do you have certificate you received from Vendor. Paste it at above URL and you will get all information you want for SSL Certificate  you are going to install on your server before you install it on server.

6) CSR Generator (http://ssltool.com/?action=csrGenerate)

Do you want to generate your own CSR. This tool will help you to generate one CSR for your SSL Certificate.

I will share other options available on SSLTool.com with you and my option about other website at next blog soon.

Write Gaurav Maniar (IT Manager, SSL Support Expert @ www.thesslstore.com, MCITP, MCSE, MCSA)

Enhanced by Zemanta
Read More

Venafi Survey: 78% of Organizations Experienced Downtime Due to Mismanaged Encryption This Year

Jan 21

View the original article here

Read More


Jan 15

SSLPersonas is a Firefox extension that adds a little color to your secure browsing experience. When browsing an SSL protected web-site, the extension provides in-your-face visual feedback regarding the security of the site via a theme in the Firefox chrome at the top and bottom of the browser interface. The themes are as follows:

Green indicates that you are on a website secured by an EV SSL certificate.   Green theme (click to enlarge)Blue indicates that you are on a website secured by a valid non-EV SSL certificate issued by a certification authority trusted by your browser.Orange indicates that the website you are on is only partially secure, probably due to mixed content (secure and unsecure). These websites are vulnerable to mixed content attacks such as session hi-jacking.

I was also looking for enhanced indications for SSL certificates are expired or have been revoked, but it appears that the developer is satisfied with the user interface that Firefox natively provides.

This extension may be useful to unsophisticated users (e.g., your Mom) that you want to keep safe. Just tell her to only put in her personal information when the themes are green or blue. If the theme is orange, then it is best if Mom not use that site.

Tags: , ,

This entry was posted on Thursday, December 16th, 2010 at 9:19 am and is filed under EV SSL, Secure Browsing. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.

View the original article here

Read More

Firesheep wake-up call

Jan 15

Much has been written this past week about Firesheep. The bottom line: website operators must properly deploy SSL end-to-end security.

Firesheep is a Firefox extension written by Eric Butler and was presented by Butler and security consultant, Ian Gallagher, this past weekend at ToorCon hacker conference in San Diego. Firesheep takes advantage of a known security vulnerability related to non-secure session cookies. When connected to a public Wi-Fi, the program captures non-secure session cookies of other users of the Wi-Fi hotspot. When an unsuspecting user logs into an insecure website known by Firesheep, their name and photo are displayed. The Firesheep user can then click on the other user and they are instantly logged in as them.

Impacted websites include Amazon, Basecamp, bit.ly, Cisco, CNET, Dropbox, Enom, Evernote, Facebook, Flickr, Github, Google, HackerNews, Harvest, Windows Live, NY Times, Pivotal Tracker, Slicehost, tumblr, Twitter, WordPress, Yahoo, and Yelp. A plugin system allows a Firesheep user to add their own sites.

There are many suggested solutions to fight Firesheep. These solutions include:

don’t use public Wi-Fionly use secure Wi-Fiuse a VPN serviceforce SSL by using a plug-in such as HTTPS-Everywhere or ForceTLS.use an anonymizer such as Tor

These are partial or in some cases impractical solutions that may or may not work. Worst of all, they require the security challenged end-user to perform an action or make a trust decision.

The point of Firesheep is to put all web-site operators on notice that they need to wake-up and properly secure their web-sites with full end-to-end encryption using SSL. This practice includes the use of secure cookies.

For other best practices on SSL deployment, see SSL Deployment Mistakes.

Tags: , ,

This entry was posted on Thursday, October 28th, 2010 at 11:20 am and is filed under SSL Deployment, Secure Browsing. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.

View the original article here

Read More

Cyber Monday

Jan 14

Monday, 29 November 2010 is Cyber Monday. What is Cyber Monday you might ask? Personally I had to get my terms straight between Black Friday, Cyber Monday, and Black Monday. Here’s a short refresher:

Black Friday is the Friday after the US Thanksgiving holiday when the Christmas holiday shopping season unofficially kicks off. It’s called black, because this is the time of the year when retailers finally start making a profit and come into the black.Cyber Monday is the Monday after Black Friday when all of the window shoppers start making their purchases online.Black Monday has nothing to do with Black Friday or Cyber Monday. In fact there have been many Black Mondays. The most significant of this generation was Monday, 15 October 1987, the largest one-day percentage decline recorded in stock market history.

Cyber Monday has become somewhat of a self-fulfilling prophecy. It has been deemed to be one of the biggest online shopping days of the year, so it has become one of the biggest shopping days of the year. Online retailers promote Cyber Monday. There are even Cyber Monday specific shopping sites such as cybermonday.com and cybermonday.net.

Now some words of advice for those taking advantage of Cyber Monday online deals:

Be careful with your personal and credit card information.Don’t shop from Wi-Fi hotspots as you never know if someone with Firesheep may be lurking about.Make sure that when it comes time to check-out that your information is being provided over SSL. Look for SSL trust indications such as the security lock icon in the browser chrome (not within the webpage), the https prefix in your address bar, or best of all, look for the EV SSL green security indicator.

Happy shopping.

Tags: , , , ,

This entry was posted on Sunday, November 28th, 2010 at 5:01 pm and is filed under EV SSL, Secure Browsing. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.

View the original article here

Read More

More than half a billion VeriSign seals displayed on a single day

Jan 14

Tim Callan’s SSL Blog – Online Security Tim Callan’s SSL Blog: More than half a billion VeriSign seals displayed on a single day Tim Callan’s SSL Blog Demystifying the Web’s Secure Backbone « VeriSign Trust Seal Dollar Day is tomorrow | Main | Shopzilla adds VeriSign seals to search results » More than half a billion VeriSign seals displayed on a single day

Last year during the holiday season, we announced that we’d seen more than 250 million VeriSign seals displayed on a single day. This October we saw that number exceed 500 million in a single day.

What is the source of this tremendous growth? It’s two things in combination. First, the number of seals on sites is up. More sites display the seal, and those sites on the average are higher volume. In fact, just the seals displayed on sites in October matched the number of seals on the highest shopping day of 2009.

The second factor is the widespread presence of VeriSign Seal-in-Search. Seal-in-Search is the function whereby third-party partners such as AVG and TheFind place VeriSign seals in their own search results adjacent to their listings for sites that use VeriSign branded SSL. Seal-in-Search partners now display a number of seals equalling the number displayed on web sites. As we add partners that number should continue to rise.

Posted by Tim Callan on November 19, 2010 11:01 AM
Post a comment (If you haven’t left a comment here before, you may need to be approved by the site owner before your comment will appear. Until then, it won’t appear on the entry. Thanks for waiting.)


Email Address:


Remember personal info?

Comments: (you may use HTML tags for style)

Categories Alexa-Netcraft index | Browsers | Firefox | Google Chrome | Internet Explorer 7 | Internet Explorer 8 | Opera | Safari | Cart whisperer | Code signing | Debian | Encryption strength | Events | Extended Validation SSL | GeoTrust | MD5 | Malware | Phishing | Recommended sites | Resellers | Revocation | Security seals | Symantec | Unprotected Web forms | VeriSign Identity Protection | VeriSign Trust Seal | Windows Vista | CardSpace | poetry | thawte | Archives November 2010 October 2010 September 2010 August 2010 July 2010 June 2010 May 2010 April 2010 March 2010 February 2010 January 2010 December 2009 November 2009 October 2009 August 2009 July 2009 May 2009 April 2009 March 2009 February 2009 January 2009 December 2008 November 2008 October 2008 September 2008 August 2008 July 2008 June 2008 May 2008 April 2008 March 2008 February 2008 January 2008 December 2007 November 2007 October 2007 September 2007 August 2007 July 2007 June 2007 May 2007 April 2007 March 2007 February 2007 January 2007 December 2006 November 2006 October 2006 September 2006 August 2006 July 2006 June 2006 May 2006 April 2006 March 2006 Recent Posts Shopzilla adds VeriSign seals to search results More than half a billion VeriSign seals displayed on a single day VeriSign Trust Seal Dollar Day is tomorrow e-Hallow’s Eve: The day more shoppers haunt the Internet for Halloween bargains GeoTrust leads the pack again Subdomain of TechCrunch blacklisted by Google for malware distribution Great session at the Online Trust and Cybersecurity Forum New malware attack affecting sites hosted by Go Daddy New video: Tim Callan shows heat maps of VeriSign seals in search results Code signing and Windows Phone 7 Subscribe to RSS FeedSubscribe Comments We encourage comments and look forward to hearing from you. All comments posted to this blog will be moderated. Please note that VeriSign may, in our sole discretion, remove comments if they are off topic or inappropriate. Powered by
Movable Type 4.21-en Disclaimer: Opinions expressed here and in any corresponding comments are the personal opinions of the original authors, not of VeriSign.

VeriSign Legal Notices

Read our Privacy Policy

View the original article here

Read More