43 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
			
		
		
	
	
			43 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
stealchain
 | 
						|
 | 
						|
This is a utility to extract the verified X.509 chain from a TLS
 | 
						|
connection. It takes a list of sites on the command line; for each
 | 
						|
site that it can connect to, it will dump the certificates that the
 | 
						|
peer actually sent (and not the verified chain that is built from
 | 
						|
this).
 | 
						|
 | 
						|
It was written to assist in debugging issues with certificate chains.
 | 
						|
 | 
						|
There are a few knobs:
 | 
						|
 | 
						|
-ca allows the trusted CA roots to be specified via a PEM bundle of
 | 
						|
root certificates.
 | 
						|
 | 
						|
-sni specifies the server name for SNI. This applies to all hosts in
 | 
						|
the run; if this is run as
 | 
						|
 | 
						|
	$ stealchain -sni foo.com foo.com bar.com
 | 
						|
 | 
						|
it will attempt to use "foo.com" as the server name for both hosts.
 | 
						|
 | 
						|
-noverify skips certificate verification. This might be useful for seeing
 | 
						|
what certificates a server is actually sending.
 | 
						|
 | 
						|
 | 
						|
Examples:
 | 
						|
 | 
						|
 	$ stealchain kyleisom.net
 | 
						|
	[+] wrote kyleisom.net.pem.
 | 
						|
	$ readchain kyleisom.net.pem 
 | 
						|
	[+] kyleisom.net.pem:
 | 
						|
        	*.kyleisom.net
 | 
						|
	        COMODO RSA Domain Validation Secure Server CA
 | 
						|
 | 
						|
	$ stealchain google.com microsoft.com apple.com amazon.com
 | 
						|
	[+] wrote google.com.pem.
 | 
						|
	[+] wrote microsoft.com.pem.
 | 
						|
	[+] wrote apple.com.pem.
 | 
						|
	[+] wrote amazon.com.pem.
 | 
						|
 | 
						|
 |