This is probably related to this Sectigo root certificate expiring. I'm still trying to figure out how to fix it but quick search shows that upgrading OS/OpenSSL/programming language versions may help.

After you request a Deluxe Assurance SSL certificate, follow these steps: . Prove you control the domain name(s). Verify your identity, address, and telephone number.; If you have requested an Extended Validation certificate, you will also need to verify that your company is eligible for extended validation. exploited using a crafted certificate with a lot of large SANs. However, I am wondering if an attack would be very limited because before this code runs, the program calls "gnutls_certificate_verify_peers2" function on that certificate. I.e. does GnuTLS guarantees at this stage, that any certificate validated using this function does only contain This is probably related to this Sectigo root certificate expiring. I'm still trying to figure out how to fix it but quick search shows that upgrading OS/OpenSSL/programming language versions may help. The individual and bundled certificates all seem to validate correctly with openssl verify (I can verify client certificates against intermediate or the bundle, and the intermediate certificate validates against the root certificate, i.e- it's all valid in every combination I can think of). Verify information on a certificate The Certificate Viewer dialog box provides user attributes and other information about a certificate. When others import your certificate, they often want to check your fingerprint information against the information they receive with the certificate.

Certificate Lookup | Texas Education Agency

The online certificate verification process can be used to verify that a certificate of filing or a certificate of fact has, in fact, been issued by the Corporations Section of the Texas Secretary of State. Enter the document number that appears at the bottom of the document you wish to verify, then click on the Validate button.

E-Verify

Check SSL Certificate installation and scan for vulnerabilities like DROWN, FREAK, Logjam, POODLE and Heartbleed. Verify Certification You can use this form to verify the Pega certifications for yourself or for potential team members as you assemble project teams. Search by email address TEA does not provide individually-prepared letters of professional standing, program detail, information or verification of Texas educator's certification status. If your state provides a PDF fillable form to verify your certificate, you may submit it through our help desk. Last Name First Name State Credential Type Credential Number Status Effective Date Expiration Date Actions