43 lines
1.1 KiB
Plaintext
43 lines
1.1 KiB
Plaintext
|
stealchain
|
||
|
|
||
|
This is a utility to extract the verified X.509 chain from a TLS
|
||
|
connection. It takes a list of sites on the command line; for each
|
||
|
site that it can connect to, it will dump the certificates that the
|
||
|
peer actually sent (and not the verified chain that is built from
|
||
|
this).
|
||
|
|
||
|
It was written to assist in debugging issues with certificate chains.
|
||
|
|
||
|
There are a few knobs:
|
||
|
|
||
|
-ca allows the trusted CA roots to be specified via a PEM bundle of
|
||
|
root certificates.
|
||
|
|
||
|
-sni specifies the server name for SNI. This applies to all hosts in
|
||
|
the run; if this is run as
|
||
|
|
||
|
$ stealchain -sni foo.com foo.com bar.com
|
||
|
|
||
|
it will attempt to use "foo.com" as the server name for both hosts.
|
||
|
|
||
|
-noverify skips certificate verification. This might be useful for seeing
|
||
|
what certificates a server is actually sending.
|
||
|
|
||
|
|
||
|
Examples:
|
||
|
|
||
|
$ stealchain kyleisom.net
|
||
|
[+] wrote kyleisom.net.pem.
|
||
|
$ readchain kyleisom.net.pem
|
||
|
[+] kyleisom.net.pem:
|
||
|
*.kyleisom.net
|
||
|
COMODO RSA Domain Validation Secure Server CA
|
||
|
|
||
|
$ stealchain google.com microsoft.com apple.com amazon.com
|
||
|
[+] wrote google.com.pem.
|
||
|
[+] wrote microsoft.com.pem.
|
||
|
[+] wrote apple.com.pem.
|
||
|
[+] wrote amazon.com.pem.
|
||
|
|
||
|
|