By using the openssl x509 we can review what's the certificate type and if it's a CA certificate.
Take this certificate chain where we have two certificats and we want to find out which one is a CA certificate from a usage standpoint
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDN9tfJ_Y1J0J90VHobvCj2IzXnA_UOHUuUL6TsLkqrdEQ2rs5_Q_7KuqDHpIxqimNu7DQQ1d27uEcCcDGNd2n5oPUU57sFlGhzfFvkXJogIl-D-n1Qw7csrk7bltf4F5Z2S3aFtT6kGY/s640/ca-chk.png)
Notice the CA: TRUE vrs the CA:FALSE if the former is set, then that's a indication it top of the chain and as a rootCA or intermediate certificate.
Take this Entrust Chain where we have a root, plus 2 intermediate certificates and finally the server
( I'm showing the CA: flags for the root and intermediates outputs truncated )
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-McG94VRWhLkvT0kYiyjB4SzYoJ84kHDuAHb1drjtNwr2CDDJXDO8q3OCigAA35mqMNZcCdsoMtBSTosnkumQUEEVmEQi0u2ChRVFAsKZxh12pHL-qWgEvrVESEaJ8yoWMgmIRjWy26k/s640/Screen+Shot+2016-10-27+at+10.04.57+PM.png)
( now at the end of the chain we have the server certificate, notice the CA:FALSE )
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYhd7cLd8MbX8dFOo_06er4czYo_HZpvRecteZm6AWo0Jtff8OtPdgD1M3Yk1j17QPsFJKp32hs3HHIkzU4HASM6W8kivfWtn1F6IxZ-YK0-PRxJgPdhZSWGhf3wVZJWOuR09v9BQBnQo/s640/Screen+Shot+2016-10-27+at+10.05.34+PM.png)
So you have a few means for validate the certificate and it's usage.
Ken
NSE ( network security expert) and Route/Switching Engineer
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( @ @ )=
o
/ \
No comments:
Post a Comment