D-Link router owners got a reprieve, as D-Link had previously partnered with Dyn to offer limited free DDNS services for D-Link users.However, could claim they were a D-Link user and use the free service… While the techniques in this document should help people author HTML that conforms to "Web Content Accessibility Guidelines 1.0", these techniques are neither guarantees of conformance nor the only way an author might produce conforming content.
Validity: Not Before Feb 27 2015 Inadvertent disclosure --- six months of nothing --- Sep 3 2015 GMT.
(Malicious code already signed by the key will still be trusted until revocation occurs.) $ openssl x509 -in 0.-noout -fingerprint | sed 's/://g' SHA1 Fingerprint=3EB44E5FFE6DC72DED703E99902722DB38FFD1CB $ openssl x509 -in 0.-noout -serial serial=5067339614C5CC219C489D40420F3BF9 $ sha256sum CSC3-2010529d1b6a0588d91bf2f8dc25e35b52d54f2865499d2d4fd6153f488bb1e90e73 *CSC3-2010$ openssl crl -inform der -in CSC3-2010-noout -text | grep -A1 "Serial Number: 5067" Serial Number: 5067339614C5CC219C489D40420F3BF9 Revocation Date: Sep 3 2015 GMT command for yourself: I have put the D-Link certificates and the verbose OCSP output on Paste Bin. - For authorized use only, CN=Veri Sign Class 3 Public Primary Certification Authority - G5 Subject Public Key Info: Public Key Algorithm: rsa Encryption Public-Key: (2048 bit) Modulus: 00:af::29:7a:35:9e:60:0c:aa:e7:4b:3b: 4e:dc:7c:bc:3c:45:1c:bb:2b:e0:fe::f: 08:a::f5:f1:ad:c:5d:22:e8: 2a:aa:a:b3:8f:f8:b:b7:b1:b7:4b:b3:fe: 8f:7e::ec:ef:43:db::61:cf:60:0d: a4:d8:de:f8:e0:c:3d::eb:49:ca:59: :e5:2b:8f:1b:9f:eb:f5:a:c: d:6a:52:4b:d2:8f:e:4d:d: 7b:c:f6:b3:dc::db:7b:5d:4b:56:d: bf::a1:b0:f4:a:f2:af:1c::e5: f:ef:90:b9:e:e4:dd:3a:b:ff:02: ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:ac:f2:f6: f0:3d:af:dd::19:1d:1c:40:cb:: :d:fe:ac:2a:52:c7:8f:d:e4:8d: :3c::cb:fe:47:bd:2b:7e:4f:c: ae:0e:9d:d4:d:c:e:7e:e5:3f: 9f:73:b:0a:cf:5d:3f::8a:ee:53:e8: Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Basic Constraints: critical CA: TRUE X509v3 Key Usage: critical Certificate Sign, CRL Sign 184.108.40.206.220.127.116.11.12: 0_.].[0Y0W0U..image/gif0!
Update 2016-09-29, 1/2: Coming back to this post a year later, I checked Virus Total and, yes, they now list the file signature as revoked under the "File detail" tab. Validity: Not After Sep 17 2015 report Sep 18 2015 The uk report Sep 20 2015 This question here posted.
In order to enhance security, the certificate revocation checking feature has been enabled by default starting in Java 7 Update 25.
Before Java will attempt to launch a signed application, the associated certificate will be validated to ensure that it has not been revoked by the issuing authority.