vorca.cer: CN=Virtual Office Root CA,O=Cisco,OU=Castor (Root Certificate, Expiring 2035-04-17) detail info and audit record
Page content
CA Certificate Information and Audit Record
This certificate is root certificate used for the issuance of other certificates.
- Certificate Download URL: http://www.cisco.com/security/pki/certs/vorca.cer (in DER format )
- Serial Number : 204964403032500657537
- SHA-1 Fingerprint : 4059a8335442f63f77444eb8fb7076f9f8305415
- SHA-1 Fingerprint : 40:59:a8:33:54:42:f6:3f:77:44:4e:b8:fb:70:76:f9:f8:30:54:15
- SHA-256 Fingerprint : c2e1cc06a1ec705cc8de3bb8a1529ffdfc91f3f1ae8ac3937420a28f390367d3
- SHA-256 Fingerprint : c2:e1:cc:06:a1:ec:70:5c:c8:de:3b:b8:a1:52:9f:fd:fc:91:f3:f1:ae:8a:c3:93:74:20:a2:8f:39:03:67:d3
- Signature Hash Algorithm : sha256
- Subject
: CN=Virtual Office Root CA,O=Cisco,OU=Castor
- Organization Unit: Castor
- Organization: Cisco
- Common Name: Virtual Office Root CA
- Not Valid Before: 2018-04-17 16:17:48
- Not Valid After: 2035-04-17 16:17:48
- Issuer (Parent Certificate):
- Issuer Name: CN=Virtual Office Root CA,O=Cisco,OU=Castor
- Issuer Certificate URL: NA
- Audit Record:
- No public audit information was found by E2Encrypted.com. We update this information regularly, check back later.
Download certificate through curl
:
curl -sSL "http://www.cisco.com/security/pki/certs/vorca.cer" --output cert.crt
Download certificate through wget
:
wget -q "http://www.cisco.com/security/pki/certs/vorca.cer" --output-document=cert.crt
CA Certificate Detail Information
Use openssl x509
to decode DER certificate to get detail information:
openssl x509 -in cert.crt -inform der -text -noout
Use openssl x509
to decode PEM certificate to get detail information:
openssl x509 -in cert.crt -inform pem -text -noout
Decoded detail certificate information:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0b:1c:73:d6:9c:30:32:dd:81
Signature Algorithm: sha256WithRSAEncryption
Issuer: OU=Castor, O=Cisco, CN=Virtual Office Root CA
Validity
Not Before: Apr 17 16:17:48 2018 GMT
Not After : Apr 17 16:17:48 2035 GMT
Subject: OU=Castor, O=Cisco, CN=Virtual Office Root CA
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:cc:e4:10:8e:af:a1:bc:ae:12:bd:6c:df:9f:ee:
9e:ee:da:0f:33:ea:d5:7f:d7:95:99:4e:76:c8:2d:
95:91:25:fd:f3:50:ba:0c:3c:df:90:19:0c:fe:61:
72:cd:93:fd:e1:71:aa:99:86:00:25:bc:bd:dd:81:
fe:13:4c:e1:0e:b9:6b:1d:e4:9b:9a:1c:7b:e3:43:
02:af:9f:2f:29:a6:4f:a8:2d:cd:28:8c:8c:4a:28:
4e:fe:48:a6:a5:9e:0b:1b:e9:3c:07:79:49:bf:0c:
56:6f:40:ae:a2:79:2d:0f:78:2b:73:21:e1:8e:4f:
58:2f:27:17:b4:cf:7d:ce:e9:e7:21:51:63:f0:ae:
a9:f6:96:e8:8f:45:c4:05:23:1e:5d:bd:a4:1a:9e:
5d:36:e7:b2:d6:06:99:e6:a5:b6:cc:34:8b:d2:dd:
c3:d1:ab:f4:17:ac:79:1d:44:08:a8:c5:4c:50:a8:
3a:c6:9b:cf:61:2f:06:27:b1:c7:30:25:9d:7f:12:
11:6e:f5:91:67:82:70:90:a0:50:5b:a4:30:2a:d3:
16:86:48:5d:4d:f2:37:b6:26:b8:aa:8b:41:f7:85:
f3:88:fc:7d:81:3c:9a:26:01:8d:1f:ea:4a:9f:11:
90:44:b7:c3:c6:7d:c7:51:22:c1:e4:63:64:02:27:
79:b9
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Certificate Sign, CRL Sign
X509v3 Basic Constraints: critical
CA:TRUE
X509v3 Subject Key Identifier:
E2:CB:FB:8C:78:5D:E2:13:7A:97:7F:78:47:3E:FE:D0:8A:34:29:65
Signature Algorithm: sha256WithRSAEncryption
74:78:5c:e6:7d:e7:ec:25:7e:40:4c:a0:03:73:49:00:d4:70:
45:bd:a5:79:6d:a4:b0:e6:a3:a4:18:74:84:1d:4f:c0:fd:98:
78:6e:97:13:98:53:e6:2f:ab:0e:88:82:90:49:e1:94:45:14:
b6:ba:40:fb:dd:77:56:3c:fb:6a:a0:ef:5a:89:ab:55:7c:8d:
2d:30:9e:49:f5:71:d7:50:68:9c:dc:ce:ca:c9:68:aa:f9:da:
de:cf:b4:3a:75:96:c2:27:b0:d3:2b:ad:c7:55:11:19:5a:a2:
cf:32:fa:cb:83:f5:6d:9f:5e:4b:1d:7b:4b:4d:b0:3c:a2:7a:
46:dd:1d:61:a7:7d:bd:d5:f9:40:fa:8d:2a:0f:b0:9f:c3:5f:
b0:ae:69:7d:19:8f:c4:84:9c:5a:30:48:18:38:46:fc:fd:b3:
fa:79:2f:4e:a6:1f:60:fd:45:1e:b8:6c:43:ba:22:9a:3c:fb:
05:9e:d0:30:0e:06:75:00:d7:33:d6:9b:54:40:4e:b6:f5:9b:
d1:f2:58:88:75:e4:55:cf:25:05:5a:b7:10:48:41:64:cc:46:
29:5b:11:01:2b:6b:5f:1c:85:f0:ed:4d:9a:1c:ca:69:a8:52:
62:43:c2:d6:82:84:04:15:ab:37:e2:28:17:e3:77:16:dd:45:
76:e8:0a:20
CA Certificate in PEM Format
Use openssl x509
to convert certificate from DER
format to PEM
format:
openssl x509 -in cert.crt -inform der
Converted PEM
format certificate:
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Also see Top 1 Millions Domains CA Certificate List
Related Certificates
- airespace-root.cer: 1.2.840.113549.1.9.1=support@airespace.com,CN=Airespace Root CA,OU=Engineering,O=Airespace Inc.,L=San Jose,ST=California,C=US (Expiring: 2013-04-29)
- airespace-root-old.cer: 1.2.840.113549.1.9.1=support@airespace.com,CN=ca,OU=none,O=airespace Inc,L=San Jose,ST=California,C=US (Expiring: 2012-11-11)
- ACT2ECCSUDI.cer: CN=ACT2 ECC SUDI CA,O=Cisco (Expiring: 2099-09-07)
- ACT2SUDICA.cer: CN=ACT2 SUDI CA,O=Cisco (Expiring: 2029-05-14)
- cbarc2099.cer: CN=Cisco Basic Assurance Root CA 2099,O=Cisco (Expiring: 2099-05-26)
- CiscoClientCA001.cer: CN=Cisco Client CA 001,O=Cisco Systems (Expiring: 2019-05-14)
- eccroot.cer: CN=Cisco ECC Root CA,O=Cisco (Expiring: 2099-09-07)
- ceca.cer: CN=Cisco Employee CA,O=Cisco (Expiring: 2029-05-14)
- cmca3.cer: CN=Cisco Manufacturing CA III,O=Cisco (Expiring: 2099-05-26)
- cmca2.cer: CN=Cisco Manufacturing CA SHA2,O=Cisco (Expiring: 2037-11-12)
- cmca.cer: CN=Cisco Manufacturing CA,O=Cisco Systems (Expiring: 2029-05-14)
- rxcr2.cer: CN=Cisco RXC-R2,O=Cisco Systems,C=US (Expiring: 2034-07-09)
- crca2048.cer: CN=Cisco Root CA 2048,O=Cisco Systems (Expiring: 2029-05-14)
- crca2099.cer: CN=Cisco Root CA 2099,O=Cisco (Expiring: 2099-08-09)
- crcam1.cer: CN=Cisco Root CA M1,O=Cisco (Expiring: 2033-11-18)
- crcam2.cer: CN=Cisco Root CA M2,O=Cisco (Expiring: 2037-11-12)
- ssca.cer: CN=Cisco SSCA,O=Cisco Systems (Expiring: 2012-04-05)
- ssca2.cer: CN=Cisco SSCA2,O=Cisco Systems (Expiring: 2015-10-22)
- ssca3.cer: CN=Cisco SSCA3,O=Cisco Systems,C=US (Expiring: 2018-09-26)
- ciscoumbrellaroot.cer: CN=Cisco Umbrella Root CA,O=Cisco (Expiring: 2036-06-28)
- xsslr2.cer: CN=Cisco XSSL-R2,O=Cisco Systems,C=US (Expiring: 2034-07-09)
- hraca.cer: CN=HRA SubCA,OU=Rigel,O=Cisco (Expiring: 2035-04-17)
- itarca.cer: CN=IT Application Root CA,O=Cisco,OU=Pollux (Expiring: 2048-04-17)
- innerspace.cer: CN=Innerspace SubCA RSA,O=Cisco (Expiring: 2037-11-12)
- innerspace_sha256.cer: CN=Innerspace SubCA RSA,O=Cisco (Expiring: 2037-11-12)
- kca.cer: CN=Kafka SubCA,OU=Antares,O=Cisco (Expiring: 2048-04-17)
- sarca.cer: CN=Strong Authentication Root CA,O=Cisco,OU=Betelgeuse (Expiring: 2068-06-01)
- suasca.cer: CN=Strong User Authentication SubCA,OU=Canopus,O=Cisco (Expiring: 2068-06-01)
- test-root-ca-2048.cer: CN=TEST Root CA 2048,O=Cisco Systems (Expiring: 2034-02-19)
- vuefirca.cer: CN=Virtual UEFI Root CA,O=Cisco,OU=Toliman (Expiring: 2099-04-03)
- vuefisca.cer: CN=Virtual UEFI SubCA,OU=Antares,O=Cisco (Expiring: 2099-04-03)
- attca.cer: O=Cisco,CN=Attestation CA (Expiring: 2099-08-09)
- hasudi.cer: O=Cisco,CN=High Assurance SUDI CA (Expiring: 2099-08-09)