HTTP/1.1 200 OK
Server: nginx
Date: Sat, 05 Apr 2025 10:27:02 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Set-Cookie: PHPSESSID=m9pj5uruis18qioij6te429fc5; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Pingback: http://blog.ed.ted.com/xmlrpc.php
Link: <https://wp.me/4ewUQ>; rel=shortlink
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:79:87:01:9d:05:7d:ca:0b:ab:92:d7:f3:5e:a5:bc:c3:28
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, O=Let's Encrypt, CN=R10
Validity
Not Before: Feb 26 20:39:20 2025 GMT
Not After : May 27 20:39:19 2025 GMT
Subject: CN=*.blog.ed.ted.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:ec:a3:ac:33:97:8a:22:51:29:67:5b:e7:c6:6c:
a8:53:ad:ca:dd:26:63:87:bf:61:94:56:c3:8f:05:
48:b2:ae:e8:ad:2d:24:11:86:64:d0:c6:31:4f:cf:
64:d2:60:bd:36:6f:17:3e:f7:ae:a0:f9:e0:ca:98:
59:f2:a6:ee:06:cf:ff:1d:ae:ec:74:a3:cc:32:75:
c6:0e:19:f2:a0:fe:97:4f:c5:7c:86:3c:04:b8:58:
c6:97:e3:5d:3a:38:37:89:23:eb:d2:54:dc:18:ea:
76:5b:7d:70:27:78:a9:1f:34:cb:73:b3:97:3e:5f:
ac:aa:9b:2f:d0:27:2c:6a:33:9e:0d:e5:27:55:ab:
3f:67:a3:15:76:64:4d:5b:ec:e2:24:30:f1:30:aa:
c1:99:33:ec:1c:4e:3e:e0:f9:7f:62:50:fe:5a:a5:
7f:24:a2:78:64:1f:78:39:f4:78:3c:51:8c:5c:cf:
60:10:d2:b5:3c:0d:3e:8d:52:67:1b:56:98:36:95:
35:c4:87:22:c9:a4:ee:c6:88:cd:dc:ad:d1:cb:e4:
fc:ee:2f:01:4e:e4:3f:70:7a:29:00:d0:a2:8e:ec:
cb:a6:07:14:30:64:1a:b7:ca:a3:88:a3:74:21:bb:
d3:af:d6:28:75:df:74:85:b4:6f:59:72:e8:5c:17:
c4:73
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Subject Key Identifier:
F7:1C:C4:56:F3:C9:F7:6B:3A:48:25:69:11:C6:70:70:59:12:69:E7
X509v3 Authority Key Identifier:
BB:BC:C3:47:A5:E4:BC:A9:C6:C3:A4:72:0C:10:8D:A2:35:E1:C8:E8
Authority Information Access:
OCSP - URI:http://r10.o.lencr.org
CA Issuers - URI:http://r10.i.lencr.org/
X509v3 Subject Alternative Name:
DNS:*.blog.ed.ted.com, DNS:blog.ed.ted.com
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.1
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53:
D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7
Timestamp : Feb 26 21:37:50.739 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:44:02:20:65:61:1E:DB:8F:26:33:16:38:88:90:5F:
D6:3A:C0:B1:EE:CA:2D:AD:2A:B5:64:DB:F7:F4:53:1D:
41:5D:EC:D2:02:20:5E:27:86:AF:D7:08:C2:3C:0B:04:
31:D2:6C:0E:70:7A:94:76:E6:A0:D5:25:9E:A7:DD:A9:
A5:ED:54:F9:57:29
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 4E:75:A3:27:5C:9A:10:C3:38:5B:6C:D4:DF:3F:52:EB:
1D:F0:E0:8E:1B:8D:69:C0:B1:FA:64:B1:62:9A:39:DF
Timestamp : Feb 26 21:37:50.727 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:46:02:21:00:C0:00:69:4D:2A:B1:41:CD:63:0C:8E:
72:0A:D6:19:2B:98:FF:4E:5B:F0:1E:6F:BC:F4:DF:F3:
1D:DA:E9:4F:CE:02:21:00:C5:6A:0D:C2:2F:BB:BB:27:
83:10:43:C1:0D:3B:D8:F4:BB:4F:B4:70:BB:BC:FF:0A:
8A:E8:07:91:74:81:AD:4D
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
7b:4c:b9:aa:02:d6:f5:8b:7f:74:f9:39:03:4a:56:1f:77:da:
d3:72:23:d5:b3:83:71:ba:c7:91:f7:10:4c:2e:ff:4a:d2:7c:
6a:fe:f2:89:60:6d:b6:71:2e:85:eb:53:89:dd:92:3c:e2:18:
95:a8:55:7a:f8:d6:53:61:e7:9c:7e:1b:35:f3:67:c3:14:3a:
7f:7c:4f:8f:f8:3b:6d:39:6b:9b:a8:2f:8d:4d:18:91:bb:0d:
34:c1:46:49:4c:7a:a3:28:f4:ec:ee:bc:ed:e0:95:12:23:09:
c4:c0:3c:68:86:3d:0f:94:ae:d1:32:55:09:b5:1e:5e:73:35:
93:40:ba:5a:99:56:ee:ad:d3:c5:8a:ca:40:1b:88:98:84:43:
a4:bd:88:e8:60:a7:9b:c5:62:f3:ed:7b:2b:06:c4:ae:9d:95:
ec:6f:10:14:86:06:e2:75:f0:a4:22:3a:af:6c:63:bf:72:12:
03:25:88:21:e2:0d:0c:88:74:ae:ec:fc:8a:a6:58:61:2f:ac:
be:b0:8e:ae:56:0e:fd:3b:17:f3:ab:8c:26:7d:9a:96:3a:0f:
c2:d1:c0:17:15:0f:73:63:ad:be:6b:89:ff:fe:36:be:dc:ed:
96:60:14:53:05:6c:17:58:5b:28:fd:52:7f:d8:af:fa:4b:3c:
08:8b:0d:e8
Vulnerabilities