stealchain

command
v1.5.4 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: May 4, 2023 License: ISC Imports: 9 Imported by: 0

README

stealchain

This is a utility to extract the verified X.509 chain from a TLS
connection. It takes a list of sites on the command line; for each
site that it can connect to, it will dump the certificates that the
peer actually sent (and not the verified chain that is built from
this).

It was written to assist in debugging issues with certificate chains.

There are a few knobs:

-ca allows the trusted CA roots to be specified via a PEM bundle of
root certificates.

-sni specifies the server name for SNI. This applies to all hosts in
the run; if this is run as

	$ stealchain -sni foo.com foo.com bar.com

it will attempt to use "foo.com" as the server name for both hosts.

-noverify skips certificate verification. This might be useful for seeing
what certificates a server is actually sending.


Examples:

 	$ stealchain kyleisom.net
	[+] wrote kyleisom.net.pem.
	$ readchain kyleisom.net.pem 
	[+] kyleisom.net.pem:
        	*.kyleisom.net
	        COMODO RSA Domain Validation Secure Server CA

	$ stealchain google.com microsoft.com apple.com amazon.com
	[+] wrote google.com.pem.
	[+] wrote microsoft.com.pem.
	[+] wrote apple.com.pem.
	[+] wrote amazon.com.pem.


Documentation

The Go Gopher

There is no documentation for this package.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL