Sunday, August 23, 2020

Sslmerge - Tool To Help You Build A Valid SSL Certificate Chain From The Root Certificate To The End-User Certificate


Is an open source tool to help you build a valid SSL certificate chain from the root certificate to the end-user certificate. Also can help you fix the incomplete certificate chain and download all missing CA certificates.

How To Use
It's simple:
# Clone this repository
git clone https://github.com/trimstray/sslmerge

# Go into the repository
cd sslmerge

# Install
./setup.sh install

# Run the app
sslmerge -i /data/certs -o /data/certs/chain.crt
  • symlink to bin/sslmerge is placed in /usr/local/bin
  • man page is placed in /usr/local/man/man8

Parameters
Provides the following options:
  Usage:
sslmerge <option|long-option>

Examples:
sslmerge --in Root.crt --in Intermediate1.crt --in Server.crt --out bundle_chain_certs.crt
sslmerge --in /tmp/certs --out bundle_chain_certs.crt --with-root
sslmerge -i Server.crt -o bundle_chain_certs.crt

Options:
--help show this message
--debug displays information on the screen (debug mode)
-i, --in add certificates to merge (certificate file, multiple files or directory with ssl certificates)
-o, --out saves the result (chain) to file
--with-root add root certificate to the certificate chain

How it works
Let's start with ssllabs certificate chain. They are delivered together with the sslmerge and can be found in the example/ssllabs.com directory which additionally contains the all directory (containing all the certificates needed to assemble the chain) and the server_certificate directory (containing only the server certificate).
The correct chain for the ssllabs.com domain (the result of the openssl command):
Certificate chain
0 s:/C=US/ST=California/L=Redwood City/O=Qualys, Inc./CN=ssllabs.com
i:/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Certification Authority - L1K
1 s:/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Certification Authority - L1K
i:/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2009 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - G2
2 s:/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2009 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - G2
i:/C=US/O=Entrust, Inc./OU=www.entrust.net/CPS is incorporated by reference/OU=(c) 2006 Entrust, Inc./CN=Entrust Root Certification Authority
The above code presents a full chain consisting of:
  • Identity Certificate (Server Certificate)
    issued for ssllabs.com by Entrust Certification Authority - L1K
  • Intermediate Certificate
    issued for Entrust Certification Authority - L1K by Entrust Root Certification Authority - G2
  • Intermediate Certificate
    issued for Entrust Root Certification Authority - G2 by Entrust Root Certification Authority
  • Root Certificate (Self-Signed Certificate)
    issued for Entrust Root Certification Authority by Entrust Root Certification Authority

Scenario 1
In this scenario, we will chain all delivered certificates. Example of running the tool:

Scenario 2
In this scenario, we only use the server certificate and use it to retrieve the remaining required certificates. Then, as above, we will combine all the provided certificates. Example of running the tool:

Certificate chain
In order to create a valid chain, you must provide the tool with all the necessary certificates. It will be:
  • Server Certificate
  • Intermediate CAs and Root CAs
This is very important because without it you will not be able to determine the beginning and end of the chain.
However, if you look inside the generated chain after generating with sslmerge, you will not find the root certificate there. Why?
Because self-signed root certificates need not/should not be included in web server configuration. They serve no purpose (clients will always ignore them) and they incur a slight performance (latency) penalty because they increase the size of the SSL handshake.
If you want to add a root certificate to the certificate chain, call the utility with the --with-root parameter.

Certification Paths
Sslmerge allows use of two certification paths:

Output comments
When generating the chain of certificates, sslmerge displays comments with information about certificates, including any errors.
Here is a list of all possibilities:

not found identity (end-user, server) certificate
The message is displayed in the absence of a server certificate that is the beginning of the chain. This is a unique case because in this situation the sslmerge ends its operation displaying only this information. The server certificate is the only certificate required to correctly create a chain. Without this certificate, the correct chain will not be created.

found correct identity (end-user, server) certificate
The reverse situation here - message displayed when a valid server certificate is found.

not found first intermediate certificate
This message appears when the first of the two intermediate certificates is not found. This information does not explicitly specify the absence of a second intermediate certificate and on the other hand it allows to determine whether the intermediate certificate to which the server certificate was signed exists. Additionally, it can be displayed if the second intermediate certificate has been delivered.

not found second intermediate certificate
Similar to the above, however, it concerns the second intermediate certificate. However, it is possible to create the chain correctly using the second certification path, e.g. using the first intermediate certificate and replacing the second with the main certificate.

one or more intermediate certificate not found
This message means that one or all of the required intermediate certificates are missing and displayed in the absence of the root certificate.

found 'n' correct intermediate certificate(s)
This message indicates the number of valid intermediate certificates.

not found correct root certificate
The lack of the root certificate is treated as a warning. Of course, when configuring certificates on the server side, it is not recommended to attach a root certificate, but if you create it with the sslmerge, it treats the chain as incomplete displaying information about the incorrect creation of the chain.

an empty CN field was found in one of the certificates
This message does not inform about the error and about the lack of the CN field what can happen with some certificates (look at example/google.com). Common Name field identifies the host name associated with the certificate. There is no requirement in RFC3280 for an Issuer DN to have a CN. Most CAs do include a CN in the Issuer DN, but some don't, such as this Equifax CA.

Requirements
Sslmerge uses external utilities to be installed before running:

Other

Contributing
See this.

Project architecture
See this.


Related word


  1. Hacking Tools Pc
  2. Usb Pentest Tools
  3. Bluetooth Hacking Tools Kali
  4. Hacker Tools Windows
  5. Top Pentest Tools
  6. Hacker Tools For Ios
  7. Pentest Tools For Windows
  8. Hack Tools For Games
  9. Hack Tools
  10. Tools Used For Hacking
  11. Pentest Reporting Tools
  12. Pentest Tools Download
  13. Hack Tools For Pc
  14. Hacking Tools For Games
  15. Free Pentest Tools For Windows
  16. Pentest Tools
  17. Termux Hacking Tools 2019
  18. Hacking Tools Kit
  19. Pentest Tools Tcp Port Scanner
  20. Hacker
  21. Pentest Tools Free
  22. Pentest Tools Linux
  23. Hacking Tools For Mac
  24. Pentest Tools Download
  25. Hackrf Tools
  26. Hack Tools For Windows
  27. Hack Tools Github
  28. Pentest Tools Linux
  29. Pentest Tools For Mac
  30. Hacking Tools For Windows 7
  31. Github Hacking Tools
  32. Hacker Tools Free Download
  33. Hackers Toolbox
  34. Hack Tools
  35. Pentest Tools Kali Linux
  36. Pentest Tools For Mac
  37. Growth Hacker Tools
  38. Hacking App
  39. What Are Hacking Tools
  40. Hackers Toolbox
  41. Tools 4 Hack
  42. Pentest Tools For Mac
  43. Hack Tool Apk
  44. Hack Tools For Ubuntu
  45. Hack Website Online Tool
  46. Hack Tools Github
  47. Hacker Tools 2019
  48. Hacking Apps
  49. Nsa Hack Tools Download
  50. What Is Hacking Tools
  51. Hacking Tools Mac
  52. Hak5 Tools
  53. Hack Website Online Tool
  54. Hack Tools Mac
  55. Hacking Tools Online
  56. New Hack Tools
  57. Black Hat Hacker Tools
  58. Hacking Tools Hardware
  59. Hacking Tools Download
  60. Pentest Tools Url Fuzzer
  61. Pentest Tools For Ubuntu
  62. Hacker Tools List
  63. Pentest Automation Tools
  64. Pentest Box Tools Download
  65. Hacking Tools And Software
  66. Underground Hacker Sites
  67. Hackrf Tools
  68. Hack Tools
  69. Hacker
  70. Usb Pentest Tools
  71. Hacking Tools
  72. Pentest Tools Nmap
  73. Hacker Tools For Ios
  74. Hack Tools Github
  75. Nsa Hack Tools Download
  76. Pentest Tools For Ubuntu
  77. Hackers Toolbox
  78. Ethical Hacker Tools
  79. Pentest Tools Tcp Port Scanner
  80. Hackers Toolbox
  81. Hacker Tool Kit
  82. Black Hat Hacker Tools
  83. Hacking Tools Free Download
  84. Hacker Tools Free Download
  85. Pentest Tools Url Fuzzer
  86. Hacker Tools Mac
  87. What Are Hacking Tools
  88. Hacking Tools Software
  89. Pentest Tools Bluekeep
  90. Hacker Tools
  91. Bluetooth Hacking Tools Kali
  92. Hacks And Tools
  93. Hack Tools
  94. Hack Tool Apk
  95. Hacking Tools
  96. Physical Pentest Tools
  97. Hacking Tools And Software
  98. Hacker Tools Online
  99. Hack Website Online Tool
  100. Computer Hacker
  101. Hack Tools For Mac
  102. Pentest Tools Linux
  103. Beginner Hacker Tools
  104. Hack Tools
  105. What Is Hacking Tools
  106. Hack Tools
  107. Hacker Tools List
  108. Hack Tools Mac
  109. Hacker Hardware Tools
  110. Nsa Hack Tools Download
  111. Pentest Tools Apk
  112. Android Hack Tools Github
  113. Hacking Tools Pc
  114. Pentest Tools Framework
  115. Pentest Tools Free
  116. What Are Hacking Tools
  117. Hacking Tools And Software
  118. Hack Website Online Tool
  119. Hacking Tools Online

No comments:

Post a Comment