You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In order to validate this issue, you have to retrive all intermediate certificates as well. Unfortunately, the Nmap sslcert library only supports retrieving the final cert.
Here is my bash script for validating this:
pt-ssl-cert-rsa-size() {
printf'%s ''If you continue, all *.pem files in current directory will be deleted. Are you sure? (y/n) 'read ans
echoif [[ !$ans=~ ^[Yy]$ ]]
thenecho"exiting"returnfi
rm *.pem
forhostin"$@";doecho"$host:"# Download all certs, including intermediate, from HOSTNAME. Files are called cert0.pem, cert1.pem, based on chain number.
openssl s_client -showcerts -verify 5 -connect "$host":443 < /dev/null | awk '/BEGIN/,/END/{ if(/BEGIN/){a++}; out="cert"a".pem"; print >out}'# Loop through downloaded certs and get RSA key sizes.forfin*.pem;do
DATA=$(openssl x509 -in $f -text -noout)ifecho$DATA| grep --quiet "Public Key Algorithm: rsaEncryption";thenecho$DATA| grep "RSA Public-Key:"elseecho"(not RSA)"fidonedone
}
The text was updated successfully, but these errors were encountered:
In order to validate this issue, you have to retrive all intermediate certificates as well. Unfortunately, the Nmap sslcert library only supports retrieving the final cert.
Here is my bash script for validating this:
The text was updated successfully, but these errors were encountered: