Difference between revisions of "Openssl s client"
Jump to navigation
Jump to search
↑ https://serverfault.com/questions/139728/how-to-download-the-ssl-certificate-from-a-website
(12 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | + | {{lc}} | |
+ | [[openssl s_client -connect]] | ||
+ | openssl s_client -connect www.example.com:443 -servername example.com | ||
+ | [[openssl s_client -showcerts]] | ||
− | * <code>echo -n | openssl s_client -connect HOST:PORTNUMBER | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > /tmp/$SERVERNAME.cert</code> <ref>https://serverfault.com/questions/139728/how-to-download-the-ssl-certificate-from-a-website</ref> | + | |
+ | |||
+ | * <code>[[openssl s_client -showcerts]] -connect YOUR_DOMAIN.COM:443</code> | ||
+ | |||
+ | * <code>echo -n | [[openssl s_client -connect]] HOST:PORTNUMBER | [[sed -ne]] '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > /tmp/$SERVERNAME.cert</code> <ref>https://serverfault.com/questions/139728/how-to-download-the-ssl-certificate-from-a-website</ref> | ||
depth=0 C = XX, ST = YY, L = XXXXX, O = ORGA, OU = RND, CN = YOUR_DOMAIN.COM | depth=0 C = XX, ST = YY, L = XXXXX, O = ORGA, OU = RND, CN = YOUR_DOMAIN.COM | ||
Line 10: | Line 17: | ||
verify return:1 | verify return:1 | ||
DONE | DONE | ||
+ | |||
+ | |||
+ | openssl s_client -servername <NAME> -connect <HOST:PORT> 2>/dev/null | [[openssl x509]] -noout -dates | ||
+ | |||
+ | |||
+ | [[openssl s client -connect]] | ||
+ | |||
+ | == Activities == | ||
+ | * [[How to check certification expiration date from command line]] | ||
+ | |||
+ | == Related terms == | ||
+ | * <code>[[wget]]</code> | ||
== See also == | == See also == | ||
+ | * {{openssl s_client}} | ||
* {{openssl}} | * {{openssl}} | ||
* {{OpenSSL}} | * {{OpenSSL}} | ||
[[Category:Security]] | [[Category:Security]] |
Latest revision as of 16:05, 11 February 2024
openssl s_client -connect openssl s_client -connect www.example.com:443 -servername example.com openssl s_client -showcerts
openssl s_client -showcerts -connect YOUR_DOMAIN.COM:443
echo -n | openssl s_client -connect HOST:PORTNUMBER | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > /tmp/$SERVERNAME.cert
[1]
depth=0 C = XX, ST = YY, L = XXXXX, O = ORGA, OU = RND, CN = YOUR_DOMAIN.COM verify error:num=20:unable to get local issuer certificate verify return:1 depth=0 C = XX, ST = YY, L = XXXXX, O = ORGA, OU = RND, CN = YOUR_DOMAIN.COM verify error:num=21:unable to verify the first certificate verify return:1 DONE
openssl s_client -servername <NAME> -connect <HOST:PORT> 2>/dev/null | openssl x509 -noout -dates
openssl s client -connect
Activities[edit]
Related terms[edit]
See also[edit]
openssl, openssl s_client
openssl
[rand | s_client | passwd
|openssl req
|openssl rsa
|openssl genrsa
|openssl x509
|openssl ca
|openssl verify
|openssl ec
|openssl dgst
|openssl pkcs12
|openssl asn1parse
|openssl help
|.cer to .pem, openssl version
- OpenSSL: RSA, ECDSA, WolfSSL, AES, Diffie-Hellman (DH) key-exchange,
/etc/ssl/openssl.cnf
, OpenSSL v3
Advertising: