The sess_id command processes the encoded version of the SSL session structure and optionally prints out SSL session details (for example the SSL session master key) in human readable format. Since this is a diagnostic tool that needs some knowledge of the SSL protocol to use properly, most users will not need to use it.
Print out a usage message.
specifies the input format. The DER option uses an ASN1 DER encoded format containing session details. The precise format can vary from one version to the next. The PEM form is the default format: it consists of the DER format base64 encoded with additional header and footer lines.
specifies the output format, the PEM and DER options have the same meaning and default as the
-informoption. The NSS option outputs the session id and the master key in NSS keylog format. -infilename
specifies the input file name to read session information from or standard input by default.
specifies the output file name to write session information to or standard output if this option is not specified.
prints out the various public or private key components in plain text in addition to the encoded version.
if a certificate is present in the session it will be output using this option, if the
-textoption is also present then it will be printed out in text form. -noout
prevents output of the encoded version of the session.
sets the session id so the output session information uses the supplied ID. The ID can be any string of characters. This option will not normally be used.
SSL-Session: Protocol : TLSv1 Cipher : 0016 Session-ID: 871E62626C554CE95488823752CBD5F3673A3EF3DCE9C67BD916C809914B40ED Session-ID-ctx: 01000000 Master-Key: A7CEFC571974BE02CAC305269DC59F76EA9F0B180CB6642697A68251F2D2BB57E51DBBB4C7885573192AE9AEE220FACD Key-Arg : None Start Time: 948459261 Timeout : 300 (sec) Verify return code 0 (ok)
Theses are described below in more detail.
this is the protocol in use TLSv1.3, TLSv1.2, TLSv1.1, TLSv1 or SSLv3.
the cipher used this is the actual raw SSL or TLS cipher code, see the SSL or TLS specifications for more information.
the SSL session ID in hex format.
the session ID context in hex format.
this is the SSL session master key.
- Start Time
this is the session start time represented as an integer in standard UNIX format.
the timeout in seconds.
- Verify return code
this is the return code when an SSL client certificate is verified.
The PEM encoded session format uses the header and footer lines:
-----BEGIN SSL SESSION PARAMETERS----- -----END SSL SESSION PARAMETERS-----
Since the SSL session output contains the master key it is possible to read the contents of an encrypted session using this information. Therefore appropriate security precautions should be taken if the information is being output by a "real" application. This is however strongly discouraged and should only be used for debugging purposes.
The cipher and start time should be printed out in human readable form.
Copyright 2016-2017 The OpenSSL Project Authors. All Rights Reserved.
Licensed under the OpenSSL license (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or here: OpenSSL.
PTC MKS Toolkit for System Administrators
PTC MKS Toolkit for Developers
PTC MKS Toolkit for Interoperability
PTC MKS Toolkit for Professional Developers
PTC MKS Toolkit for Professional Developers 64-Bit Edition
PTC MKS Toolkit for Enterprise Developers
PTC MKS Toolkit for Enterprise Developers 64-Bit Edition
PTC MKS Toolkit 10.3 Documentation Build 39.