# Test TLS connection and show certificate
openssl s_client -connectgridwire.io:443# Show only certificate info
openssl s_client -connectgridwire.io:443-showcerts < /dev/null
# Test specific TLS version
openssl s_client -connectgridwire.io:443-tls1_2
openssl s_client -connectgridwire.io:443-tls1_3# Check if TLS 1.0 is enabled (should fail on secure servers)
openssl s_client -connectgridwire.io:443-tls1# Show supported ciphers
openssl ciphers -v 'ALL:!ADH:@STRENGTH'
# Test specific cipher
openssl s_client -connectgridwire.io:443-cipherECDHE-RSA-AES256-GCM-SHA384
# Certificate chain (top to bottom)Root CA Self-signed. Trusted by OS/browser. Offline for security.
↓
Intermediate CA Signed by Root. Online. Issues end-entity certs.
↓
End-Entity Cert Your domain cert. Signed by Intermediate.
# Browser verifies: End-Entity → Intermediate → Root (in trust store)# Missing intermediate = SSL error even if cert is valid
// certificate types
DV (Domain Validated) Proves domain ownership only. Fast. Let's Encrypt.
OV (Org Validated) Org identity verified. Medium trust. Days to issue.
EV (Extended Validated) Full org vetting. Highest trust. Weeks to issue.
Wildcard *.domain.com — covers all subdomains (one level)
SAN/Multi-domain Multiple domains in one cert (Subject Alt Names)
Self-Signed Not trusted by browsers. Dev/internal use only.