 |
Index for Section 1ssl |
|
 |
Alphabetical listing for S |
|
 |
Bottom of page |
|
sess_id(1ssl)
NAME
sess_id - SSL/TLS session handling utility
SYNOPSIS
openssl sess_id [-inform PEM | DER] [-outform PEM | DER] [-infilename]
[-outfilename] [-text] [-noout] [-contextID]
OPTIONS
-inform DER|PEM
Specifies the input format. The DER option uses an ASN1 DER encoded
format containing session details. The precise format can vary from
one version to the next. The PEM form is the default format. It
consists of the DER format base64 encoded with additional header
and footer lines.
-outformDER|PEM
Specifies the output format. The options have the same meaning as
the -inform option.
-infilename
Specifies the input filename to read session information from or
standard input by default.
-outfilename
Specifies the output filename to write session information to or
standard output if this option is not specified.
-text Prints out the various public or private key components in plain
text in addition to the encoded version.
-cert If a certificate is present in the session it will be output using
this option. If the -text option is also present then it will be
printed out in text form.
-noout Prevents output of the encoded version of the session.
-context ID
Sets the session id so the output session information uses the
supplied ID. The ID can be any string of characters. This option
usually is not used.
DESCRIPTION
The sess_id processes the encoded version of the SSL session structure and
optionally prints out SSL session details, such as the SSL session master
key, in human readable format. Since this is a diagnostic tool that needs
some knowledge of the SSL protocol to use properly, most users will not
need to use it.
NOTES
The PEM encoded session format uses the following header and footer lines:
-----BEGIN SSL SESSION PARAMETERS-----
-----END SSL SESSION PARAMETERS-----
Since the SSL session output contains the master key it is possible to read
the contents of an encrypted session using this information. Therefore
appropriate security precautions should be taken if the information is
being output by a real application. This is, however, strongly discouraged
and should only be used for debugging purposes.
RESTRICTIONS
The cipher and start time should be printed out in human readable form.
EXAMPLES
An example of typical output follows:
SSL-Session:
Protocol : TLSv1
Cipher : 0016
Session-ID: 871E62626C554CE95488823752CBD5F3673A3EF3DCE9C67BD916C809914B40ED
Session-ID-ctx: 01000000
Master-Key: A7CEFC571974BE02CAC305269DC59F76EA9F0B180CB6642697A68251F2D2BB57E51DBBB4C7885573192AE9AEE220FACD
Key-Arg : None
Start Time: 948459261
Timeout : 300 (sec)
Verify return code 0 (ok)
These are described below in more detail.
Protocol
The protocol in use - TLSv1, SSLv3 or SSLv2.
Cipher The cipher used. This is the actual raw SSL or TLS cipher code. See
the SSL or TLS specifications for more information.
Session-ID
The SSL session ID in hex format.
Session-ID-ctx
The session ID context in hex format.
Master-Key
The SSL session master key.
Key-Arg The key argument. This is only used in SSL v2.
Start Time
The session start time, represented as an integer in standard UNIX
format.
Timeout The timeout in seconds.
Verify return code
The return code when an SSL client certificate is verified.
SEE ALSO
Commands: ciphers(1ssl), s_server(1ssl)
 |
Index for Section 1ssl |
|
 |
Alphabetical listing for S |
|
 |
Top of page |
|