Created
October 5, 2015 15:27
-
-
Save OmgImAlexis/137505b35993825273d8 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ openssl s_client -connect kat.cr:443 -servername kat.cr | |
CONNECTED(00000003) | |
depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root | |
verify return:1 | |
depth=2 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO RSA Certification Authority | |
verify return:1 | |
depth=1 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO RSA Domain Validation Secure Server CA | |
verify return:1 | |
depth=0 OU = Domain Control Validated, OU = EssentialSSL Wildcard, CN = *.kat.cr | |
verify return:1 | |
--- | |
Certificate chain | |
0 s:/OU=Domain Control Validated/OU=EssentialSSL Wildcard/CN=*.kat.cr | |
i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA | |
1 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority | |
i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root | |
2 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA | |
i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority | |
3 s:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root | |
i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root | |
--- | |
Server certificate | |
-----BEGIN CERTIFICATE----- | |
MIIFQTCCBCmgAwIBAgIRAK3wxpSa3G2t/u+1bka7HpEwDQYJKoZIhvcNAQELBQAw | |
gZAxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAO | |
BgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMTYwNAYD | |
VQQDEy1DT01PRE8gUlNBIERvbWFpbiBWYWxpZGF0aW9uIFNlY3VyZSBTZXJ2ZXIg | |
Q0EwHhcNMTUwNDI0MDAwMDAwWhcNMTYwNDIzMjM1OTU5WjBWMSEwHwYDVQQLExhE | |
b21haW4gQ29udHJvbCBWYWxpZGF0ZWQxHjAcBgNVBAsTFUVzc2VudGlhbFNTTCBX | |
aWxkY2FyZDERMA8GA1UEAxQIKi5rYXQuY3IwggEiMA0GCSqGSIb3DQEBAQUAA4IB | |
DwAwggEKAoIBAQChDRNwEQhXEyacNmmCWXaq8Dhb4S6gKFW4ri2Ea7xvOk/IBUSs | |
v+Em9CbWi4sNvWR9IN66bk3vkR03hiR+Ut9QFKEWRn1IQfuKcpHyqQRfsZL60Dir | |
WQ7JhdbvPXVf0obrZq0egjX8i3gxVEXqhtk9jC8Dbq/hlpR84nBQQSeQtiG3nKaB | |
6goyG1yd19ty8P/eK08djM5KC2dI202y1zj800hMmqNJ31bzk6xQL3eBHFVtBopa | |
ybCcLoqEaMYWQ5Av0t0TS1Tv1KX9Ix4GEKn8pspsIhwiT5f/pOJL20Zi4Dzm/gnA | |
sm0rR8vsyWuhVFreOSqhkCE8Nl3Ju25Bn0n9AgMBAAGjggHNMIIByTAfBgNVHSME | |
GDAWgBSQr2o6lFoL2JDqElZz30O0Oija5zAdBgNVHQ4EFgQUKCLQQKxd1nzheBnG | |
VlGU6uuzX5MwDgYDVR0PAQH/BAQDAgWgMAwGA1UdEwEB/wQCMAAwHQYDVR0lBBYw | |
FAYIKwYBBQUHAwEGCCsGAQUFBwMCME8GA1UdIARIMEYwOgYLKwYBBAGyMQECAgcw | |
KzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLmNvbS9DUFMwCAYG | |
Z4EMAQIBMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly9jcmwuY29tb2RvY2EuY29t | |
L0NPTU9ET1JTQURvbWFpblZhbGlkYXRpb25TZWN1cmVTZXJ2ZXJDQS5jcmwwgYUG | |
CCsGAQUFBwEBBHkwdzBPBggrBgEFBQcwAoZDaHR0cDovL2NydC5jb21vZG9jYS5j | |
b20vQ09NT0RPUlNBRG9tYWluVmFsaWRhdGlvblNlY3VyZVNlcnZlckNBLmNydDAk | |
BggrBgEFBQcwAYYYaHR0cDovL29jc3AuY29tb2RvY2EuY29tMBsGA1UdEQQUMBKC | |
CCoua2F0LmNyggZrYXQuY3IwDQYJKoZIhvcNAQELBQADggEBAIPMgwwVsBmvhMcL | |
56GAVMfjL7wbOHwA81Aq1TvmNq4tZlUeeoRLfCKkMbG548uC9IKTVG7sXR8wnsbL | |
bLvpjXNUPUtHS1kwePxLaGAaVyOpQ/kgO2Xtpqi7ncJVBHfxtP/RH/aufdWTWOXd | |
9jackpvmxhN2K2puX1Szpasr7fZiiX/1gqIqzz54fSKdqUQS5sye9ujBI5wFZZcE | |
IoupBii31LVqw04mhYynwPIFOZloUC7Tc/OFnWBOtxF8B/YUUgE5fKlVE1dnKftn | |
Y3QJQxDabYe+I+aYgIsuNncnYQ9OGNLnyy9Ar94H7e+bYH5JfXaUtrbI0KT58zTf | |
lh7jkGU= | |
-----END CERTIFICATE----- | |
subject=/OU=Domain Control Validated/OU=EssentialSSL Wildcard/CN=*.kat.cr | |
issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA | |
--- | |
No client certificate CA names sent | |
Peer signing digest: SHA512 | |
Server Temp Key: ECDH, P-256, 256 bits | |
--- | |
SSL handshake has read 5904 bytes and written 459 bytes | |
--- | |
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384 | |
Server public key is 2048 bit | |
Secure Renegotiation IS supported | |
Compression: NONE | |
Expansion: NONE | |
No ALPN negotiated | |
SSL-Session: | |
Protocol : TLSv1.2 | |
Cipher : ECDHE-RSA-AES256-GCM-SHA384 | |
Session-ID: 98CE04DB7A9AC58ADBECF29193998AFD66704626DBF456E74CBB4334983FEB2E | |
Session-ID-ctx: | |
Master-Key: C6F94240C8D0D5D6C38C5166D4C97E55FE59657AD0345782014119CAC51E08719FA90F9B35C76285FC074CC9AD23B3F4 | |
Key-Arg : None | |
PSK identity: None | |
PSK identity hint: None | |
SRP username: None | |
Start Time: 1444058730 | |
Timeout : 300 (sec) | |
Verify return code: 0 (ok) | |
--- | |
closed |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment