Certificate chain validator
Paste a PEM bundle. We walk each link — leaf → intermediate → root — verify signatures, check validity windows, and flag weak algorithms. Great for sanity-checking a bundle before you deploy it.
What gets checked
- Every cert parses as valid X.509 PEM
- Signatures verify between adjacent certs (leaf signed by intermediate, intermediate signed by root)
- Expiry / not-yet-valid windows
- Weak signature algorithms (MD5, SHA-1) and weak keys (RSA < 2048-bit)
- Self-signed root detection (complete chain)
Not checked (yet)
- Trust against OS / browser root store — we tell you the chain is internally consistent, not that a browser will trust it
- OCSP / CRL revocation status
- Certificate Transparency embedded SCTs
- CAB/Forum profile compliance