Created
September 22, 2017 23:07
-
-
Save febbraro/dbf2fc20156d37642bc5b69a2f9d4c64 to your computer and use it in GitHub Desktop.
SSL/TLS errors on phish.in
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
>> httpdiff --method HEAD https://s3.amazonaws.com/phase2.public/audio/32020.mp3 https://phish.in/audio/000/032/020/32020.mp3 | |
Doing HEAD: | |
https://s3.amazonaws.com/phase2.public/audio/32020.mp3 | |
https://phish.in/audio/000/032/020/32020.mp3 | |
Error doing HEAD https://phish.in/audio/000/032/020/32020.mp3: x509: certificate signed by unknown authority |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
>> openssl s_client -connect phish.in:443 | |
CONNECTED(00000003) | |
depth=0 /OU=Domain Control Validated/OU=PositiveSSL/CN=phish.in | |
verify error:num=20:unable to get local issuer certificate | |
verify return:1 | |
depth=0 /OU=Domain Control Validated/OU=PositiveSSL/CN=phish.in | |
verify error:num=27:certificate not trusted | |
verify return:1 | |
depth=0 /OU=Domain Control Validated/OU=PositiveSSL/CN=phish.in | |
verify error:num=21:unable to verify the first certificate | |
verify return:1 | |
--- | |
Certificate chain | |
0 s:/OU=Domain Control Validated/OU=PositiveSSL/CN=phish.in | |
i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA | |
--- | |
Server certificate | |
-----BEGIN CERTIFICATE----- | |
MIIFPTCCBCWgAwIBAgIRAItcQLZ2V9iG5ykdPZkzDAAwDQYJKoZIhvcNAQELBQAw | |
gZAxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAO | |
BgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMTYwNAYD | |
VQQDEy1DT01PRE8gUlNBIERvbWFpbiBWYWxpZGF0aW9uIFNlY3VyZSBTZXJ2ZXIg | |
Q0EwHhcNMTcwODI3MDAwMDAwWhcNMjAwODI2MjM1OTU5WjBMMSEwHwYDVQQLExhE | |
b21haW4gQ29udHJvbCBWYWxpZGF0ZWQxFDASBgNVBAsTC1Bvc2l0aXZlU1NMMREw | |
DwYDVQQDEwhwaGlzaC5pbjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB | |
AJDRFU9x7ERqIY9gIcUAH0VQQWzuahpSWixg05MjCTQlKWyE+dF6GhtOcBLa90xW | |
ekORAppsVi896CRwjaEGZ0GJ1eTJCgZtdNdP9T6ibrRNhDmeepnjqttP9SJTFbF9 | |
HPW9h80A/eWuwqwPVZKqOEMi4M8z3OEB82JIchCA1atZ2cIzmfrE8BCOb2ownKxn | |
01qWu1YH2zZmQM46Z/F7OenWr0B/HiZHANgCGDbmzTVduNLr4HztgqbU9iyDhrA9 | |
i7BfR/ZbNEMQQnD9y8eE+ywPOC7NiTwNSWO055gLdeQtE8iS/S2OHpuPV1kcaOOG | |
mUfsSyshEQU78S0yLSxXumUCAwEAAaOCAdMwggHPMB8GA1UdIwQYMBaAFJCvajqU | |
WgvYkOoSVnPfQ7Q6KNrnMB0GA1UdDgQWBBQmmyslM8K4b3cp2IWbk0q0dShfkzAO | |
BgNVHQ8BAf8EBAMCBaAwDAYDVR0TAQH/BAIwADAdBgNVHSUEFjAUBggrBgEFBQcD | |
AQYIKwYBBQUHAwIwTwYDVR0gBEgwRjA6BgsrBgEEAbIxAQICBzArMCkGCCsGAQUF | |
BwIBFh1odHRwczovL3NlY3VyZS5jb21vZG8uY29tL0NQUzAIBgZngQwBAgEwVAYD | |
VR0fBE0wSzBJoEegRYZDaHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPUlNB | |
RG9tYWluVmFsaWRhdGlvblNlY3VyZVNlcnZlckNBLmNybDCBhQYIKwYBBQUHAQEE | |
eTB3ME8GCCsGAQUFBzAChkNodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9S | |
U0FEb21haW5WYWxpZGF0aW9uU2VjdXJlU2VydmVyQ0EuY3J0MCQGCCsGAQUFBzAB | |
hhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wIQYDVR0RBBowGIIIcGhpc2guaW6C | |
DHd3dy5waGlzaC5pbjANBgkqhkiG9w0BAQsFAAOCAQEANaGNkuCW/3uQbLdOg9Be | |
aOGHbwC7lWZJfq+BIQSdrIu5ddsqQCw4R06s/H+jbU1ngu2RABFMqzvtbzHklHV8 | |
bpgQ3umtQ0ma1rk0aFGnSlqEf5l32TzCv/tVDtGaLVyiWfBhZJiZvvJQjVomF1az | |
d+mbgOypLb2FJ7Oezv4hoUkSHS4gdXXA9kfWOMxN4ptcu86Xhu3xV8ZpbETNQmkn | |
9djp2OGPxra/wnNOaPFM1c3DPxxuHHqVOc0cJqKXnLLcblzSIIl/DV+E+KCliFvp | |
EkHSG4xKsKX7SB6MQgspkZsMORI0XP5feCmP62zGpuvtaz/2L4GGbkBgn2SA9V14 | |
Rw== | |
-----END CERTIFICATE----- | |
subject=/OU=Domain Control Validated/OU=PositiveSSL/CN=phish.in | |
issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA | |
--- | |
No client certificate CA names sent | |
--- | |
SSL handshake has read 2300 bytes and written 456 bytes | |
--- | |
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA | |
Server public key is 2048 bit | |
Secure Renegotiation IS supported | |
Compression: NONE | |
Expansion: NONE | |
SSL-Session: | |
Protocol : TLSv1 | |
Cipher : DHE-RSA-AES256-SHA | |
Session-ID: 0F8C0EA10EC6970B553EB8B755EA8B034DC73BB3BB61226CD515CFCBE987FC06 | |
Session-ID-ctx: | |
Master-Key: 422B58069433BC6E3AC260B43C404FA250A6F831633AFE3E8165E028A5306FB164AC30195CBF8C6A5F2BC9D64E143A79 | |
Key-Arg : None | |
Start Time: 1506121012 | |
Timeout : 300 (sec) | |
Verify return code: 21 (unable to verify the first certificate) | |
--- | |
closed |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment