| Name | Expiration date | Mapped domains | |
|---|---|---|---|
| Certificate for *.<domain>.com, <domain>.com | October 9, 2017 | (none) <== the old certificate | |
| my-cert-1 | November 8, 2018 | <domain>.com, *.<domain>.com, www.<domain>.com <== new certificate |
| Valid from | Tue, 11 Aug 2015 00:00:00 UTC |
| Valid until | Mon, 09 Oct 2017 23:59:59 UTC (expires in 26 days, 7 hours) |
Verify your SSL certificate and private key:
To verify that the private key and certificate match, you can use the openssl x509 and openssl rsacommands. Examples:
openssl x509 -noout -modulus -in concat.crt | openssl md5
openssl rsa -noout -modulus -in myserver.key.pem | openssl md5
Both the openssl x509 and openssl rsa commands should return the same output.
To verify that a certificate and its CA chain are valid, you can use the openssl verify command. For example:
openssl verify -verbose -CAfile concat.crt concat.crt
Valid from Tue, 11 Aug 2015 00:00:00 UTC
Valid until Mon, 09 Oct 2017 23:59:59 UTC (expires in 26 days, 5 hours)
Where are you seeing the new certificate?