1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144
|
certdump
Dump a PEM file containing certificates.
It takes a number of files on the command line which should contain
at least one certificate, and dumps the certificates found in those
files. If the -l flag is given, it is assumed the file is a bundle and
only the leaf certificate will be shown.
Certificates may also be passed on standard input; no arguments, or a
single "-" argument, inform certdump that it should read certificates
from standard input. This allows chaining, à la
cfssl bundle -domain example.net | jq .bundle | certdump
Example (kyleisom.pem and tyrfingr.pem are the bundled certificates
for two of my sites):
$ certdump *.pem
--kyleisom.pem ---
CERTIFICATE
Subject: /*.kyleisom.net/OU=Domain Control Validated/OU=PositiveSSL Wildcard
Issuer: /COMODO RSA Domain Validation Secure Server CA/C=GB/O=COMODO CA
Limited/L=Salford/ST=Greater Manchester
Signature algorithm: RSA / SHA256
Details:
Public key: RSA-2048
Serial number: 140424811868659069090147614569911695367
AKI: 90:AF:6A:3A:94:5A:0B:D8:90:EA:12:56:73:DF:43:B4:3A:28:DA:E7
SKI: 64:07:29:EA:3A:FE:2C:00:48:62:FB:22:E4:E9:72:7E:2F:0F:C3:2D
Valid from: 2014-11-16T00:00:00+0000
until: 2015-11-16T23:59:59+0000
Key usages: key encipherment, digital signature
Extended usages: server auth, client auth
Basic constraints: valid
SANs: *.kyleisom.net, kyleisom.net
CERTIFICATE
Subject: /COMODO RSA Domain Validation Secure Server CA/C=GB/O=COMODO CA
Limited/L=Salford/ST=Greater Manchester
Issuer: /COMODO RSA Certification Authority/C=GB/O=COMODO CA
Limited/L=Salford/ST=Greater Manchester
Signature algorithm: RSA / SHA384
Details:
Public key: RSA-2048
Serial number: 57397899145990363081023081275480378375
AKI: BB:AF:7E:02:3D:FA:A6:F1:3C:84:8E:AD:EE:38:98:EC:D9:32:32:D4
SKI: 90:AF:6A:3A:94:5A:0B:D8:90:EA:12:56:73:DF:43:B4:3A:28:DA:E7
Valid from: 2014-02-12T00:00:00+0000
until: 2029-02-11T23:59:59+0000
Key usages: cert sign, crl sign, digital signature
Extended usages: server auth, client auth
Basic constraints: valid, is a CA certificate, max path length 0
SANs:
---tyrfingr.pem ---
CERTIFICATE
Subject: /*.tyrfingr.is/OU=Domain Control Validated/OU=PositiveSSL Wildcard
Issuer: /COMODO RSA Domain Validation Secure Server CA/C=GB/O=COMODO CA
Limited/L=Salford/ST=Greater Manchester
Signature algorithm: RSA / SHA256
Details:
Public key: RSA-2048
Serial number: 129805972439942088783496286074667556011
AKI: 90:AF:6A:3A:94:5A:0B:D8:90:EA:12:56:73:DF:43:B4:3A:28:DA:E7
SKI: C6:25:79:D7:A7:9A:85:BE:7F:DE:3B:3D:7A:B7:2E:96:DE:46:05:D7
Valid from: 2014-10-03T00:00:00+0000
until: 2015-10-03T23:59:59+0000
Key usages: key encipherment, digital signature
Extended usages: server auth, client auth
Basic constraints: valid
SANs: *.tyrfingr.is, tyrfingr.is
CERTIFICATE
Subject: /COMODO RSA Domain Validation Secure Server CA/C=GB/O=COMODO CA
Limited/L=Salford/ST=Greater Manchester
Issuer: /COMODO RSA Certification Authority/C=GB/O=COMODO CA
Limited/L=Salford/ST=Greater Manchester
Signature algorithm: RSA / SHA384
Details:
Public key: RSA-2048
Serial number: 57397899145990363081023081275480378375
AKI: BB:AF:7E:02:3D:FA:A6:F1:3C:84:8E:AD:EE:38:98:EC:D9:32:32:D4
SKI: 90:AF:6A:3A:94:5A:0B:D8:90:EA:12:56:73:DF:43:B4:3A:28:DA:E7
Valid from: 2014-02-12T00:00:00+0000
until: 2029-02-11T23:59:59+0000
Key usages: cert sign, digital signature, crl sign
Extended usages: server auth, client auth
Basic constraints: valid, is a CA certificate, max path length 0
SANs:
CERTIFICATE
Subject: /COMODO RSA Certification Authority/C=GB/O=COMODO CA
Limited/L=Salford/ST=Greater Manchester
Issuer: /AddTrust External CA Root/C=SE/O=AddTrust AB/OU=AddTrust External TTP
Network
Signature algorithm: RSA / SHA384
Details:
Public key: RSA-4096
Serial number: 52374340215108295845375962883522092578
AKI: AD:BD:98:7A:34:B4:26:F7:FA:C4:26:54:EF:03:BD:E0:24:CB:54:1A
SKI: BB:AF:7E:02:3D:FA:A6:F1:3C:84:8E:AD:EE:38:98:EC:D9:32:32:D4
Valid from: 2000-05-30T10:48:38+0000
until: 2020-05-30T10:48:38+0000
Key usages: digital signature, crl sign, cert sign
Basic constraints: valid, is a CA certificate
SANs:
$ certdump *.pem
--kyleisom.pem ---
CERTIFICATE
Subject: /*.kyleisom.net/OU=Domain Control Validated/OU=PositiveSSL Wildcard
Issuer: /COMODO RSA Domain Validation Secure Server CA/C=GB/O=COMODO CA
Limited/L=Salford/ST=Greater Manchester
Signature algorithm: RSA / SHA256
Details:
Public key: RSA-2048
Serial number: 140424811868659069090147614569911695367
AKI: 90:AF:6A:3A:94:5A:0B:D8:90:EA:12:56:73:DF:43:B4:3A:28:DA:E7
SKI: 64:07:29:EA:3A:FE:2C:00:48:62:FB:22:E4:E9:72:7E:2F:0F:C3:2D
Valid from: 2014-11-16T00:00:00+0000
until: 2015-11-16T23:59:59+0000
Key usages: digital signature, key encipherment
Extended usages: server auth, client auth
Basic constraints: valid
SANs: *.kyleisom.net, kyleisom.net
--tyrfingr.pem ---
CERTIFICATE
Subject: /*.tyrfingr.is/OU=Domain Control Validated/OU=PositiveSSL Wildcard
Issuer: /COMODO RSA Domain Validation Secure Server CA/C=GB/O=COMODO CA
Limited/L=Salford/ST=Greater Manchester
Signature algorithm: RSA / SHA256
Details:
Public key: RSA-2048
Serial number: 129805972439942088783496286074667556011
AKI: 90:AF:6A:3A:94:5A:0B:D8:90:EA:12:56:73:DF:43:B4:3A:28:DA:E7
SKI: C6:25:79:D7:A7:9A:85:BE:7F:DE:3B:3D:7A:B7:2E:96:DE:46:05:D7
Valid from: 2014-10-03T00:00:00+0000
until: 2015-10-03T23:59:59+0000
Key usages: digital signature, key encipherment
Extended usages: server auth, client auth
Basic constraints: valid
SANs: *.tyrfingr.is, tyrfingr.is
This same result could be had with
$ cfssl bundle -domain kyleisom.net | jq .bundle | certdump
|