Below are the results from testing the SSL at https://www.ssllabs.com/ssltest/index.html
It looks like we have two certificates. Am I reading that right? Does the SSL service (CloudFlare.com) that's using the certificate point to a particular Certificate?
What I can see here in the screenshot is an X.509 cert chain for a domain bungalowsoftware.com.
Typically the server during TLS handshake will send the leaf cert and intermediate CA certs - between 1 and n. The root CA cert technically could be sent as well, but I don't think this is a common practice.
You can see the same thing using
openssl
in your terminal:Expiry date of your leaf cert is Apr 26 00:25:59 2024 GMT.
That certificate expires on 26 April 2024.
The other certificates are the intermediate CAs E1 (Let's encrypt) and ISRG Root X2, and the root CA ISRG Root X1 trust anchor bundled in the certificate chain. Those are not yours.
A browser might show another, cross-signed root CA ISRG X2. Intermediate CA certificates should be bundled and sent along, root CA shouldn't as some mobile clients won't like them and it's of no use anyway as trust anchor need to be present in the client.