Friday 31 May 2024

Open SSL check certs allowed Client certficates

 check server 

openssl s_client -connect IP:PORT -status -showcerts </dev/null


chain


Acceptable client certificate CA names

C = US, ST = California, L = dev, O = dev, OU = Certificate Authority, CN = dev1, emailAddress = dev

C = US, ST = California, L = Sunnyvale, O = dev, OU = Certificate Authority, CN = dev2, emailAddress = dev

Client Certificate Types: RSA sign, ECDSA sign

Requested Signature Algorithms: RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:ECDSA+SHA256:RSA+SHA384:ECDSA+SHA384:RSA+SHA512:ECDSA+SHA512

Shared Requested Signature Algorithms: RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:ECDSA+SHA256:RSA+SHA384:ECDSA+SHA384:RSA+SHA512:ECDSA+SHA512

Peer signing digest: SHA256

Peer signature type: RSA-PSS

Server Temp Key: ECDH, P-256, 256 bits



single 


Acceptable client certificate CA names

C = CA, ST = BC, L = VAN, O = Fortinet, CN = dev, emailAddress = dev@dev.com

Client Certificate Types: RSA sign, ECDSA sign

Requested Signature Algorithms: RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:ECDSA+SHA256:RSA+SHA384:ECDSA+SHA384:RSA+SHA512:ECDSA+SHA512

Shared Requested Signature Algorithms: RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:ECDSA+SHA256:RSA+SHA384:ECDSA+SHA384:RSA+SHA512:ECDSA+SHA512

Peer signing digest: SHA256

Peer signature type: RSA-PSS


No comments:

Post a Comment