Skip to content

Instantly share code, notes, and snippets.

@dottedmag
Created October 29, 2021 17:27
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save dottedmag/a8b0d9cb097ce3646e3f2d86f4b025a5 to your computer and use it in GitHub Desktop.
Save dottedmag/a8b0d9cb097ce3646e3f2d86f4b025a5 to your computer and use it in GitHub Desktop.
$ host -t NS freedesktop.org
freedesktop.org name server gabe.freedesktop.org.
freedesktop.org name server opus.spi-inc.org.
@dottedmag
Copy link
Author

dottedmag commented Oct 29, 2021

$ host gitlab.freedesktop.org opus.spi-inc.org.    
Using domain server:
Name: opus.spi-inc.org.
Address: 89.16.166.54#53
Aliases: 

gitlab.freedesktop.org has address 147.75.198.156
gitlab.freedesktop.org mail is handled by 10 gabe.freedesktop.org.

@dottedmag
Copy link
Author

dottedmag commented Oct 29, 2021

% openssl s_client -connect 147.75.198.156:443
CONNECTED(00000003)
depth=0 O = Acme Co, CN = Kubernetes Ingress Controller Fake Certificate
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 O = Acme Co, CN = Kubernetes Ingress Controller Fake Certificate
verify error:num=21:unable to verify the first certificate
verify return:1
---
Certificate chain
 0 s:/O=Acme Co/CN=Kubernetes Ingress Controller Fake Certificate
   i:/O=Acme Co/CN=Kubernetes Ingress Controller Fake Certificate
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/O=Acme Co/CN=Kubernetes Ingress Controller Fake Certificate
issuer=/O=Acme Co/CN=Kubernetes Ingress Controller Fake Certificate
---
No client certificate CA names sent
Server Temp Key: ECDH, X25519, 253 bits
---
SSL handshake has read 1358 bytes and written 293 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES128-GCM-SHA256
    Session-ID: D6F73092ACCE5B28976A5243702B39365353307D6E3AB3B32BBCAFAD0F410A08
    Session-ID-ctx: 
    Master-Key: EC5567DDF463D5CAE685A8CB08776907F619991C774917445AF732A440A5B29FA49CF87B82E3AA96E4FF929F42C300E4
    Start Time: 1635528494
    Timeout   : 7200 (sec)
    Verify return code: 21 (unable to verify the first certificate)
---
DONE

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment