1SESS_ID(1) OpenSSL SESS_ID(1)
2
3
4
6 sess_id - SSL/TLS session handling utility
7
9 openssl sess_id [-inform PEM|DER] [-outform PEM|DER] [-in filename]
10 [-out filename] [-text] [-noout] [-context ID]
11
13 The sess_id process the encoded version of the SSL session structure
14 and optionally prints out SSL session details (for example the SSL
15 session master key) in human readable format. Since this is a
16 diagnostic tool that needs some knowledge of the SSL protocol to use
17 properly, most users will not need to use it.
18
19 -inform DER|PEM
20 This specifies the input format. The DER option uses an ASN1 DER
21 encoded format containing session details. The precise format can
22 vary from one version to the next. The PEM form is the default
23 format: it consists of the DER format base64 encoded with
24 additional header and footer lines.
25
26 -outform DER|PEM
27 This specifies the output format, the options have the same meaning
28 as the -inform option.
29
30 -in filename
31 This specifies the input filename to read session information from
32 or standard input by default.
33
34 -out filename
35 This specifies the output filename to write session information to
36 or standard output if this option is not specified.
37
38 -text
39 prints out the various public or private key components in plain
40 text in addition to the encoded version.
41
42 -cert
43 if a certificate is present in the session it will be output using
44 this option, if the -text option is also present then it will be
45 printed out in text form.
46
47 -noout
48 this option prevents output of the encoded version of the session.
49
50 -context ID
51 this option can set the session id so the output session
52 information uses the supplied ID. The ID can be any string of
53 characters. This option wont normally be used.
54
56 Typical output:
57
58 SSL-Session:
59 Protocol : TLSv1
60 Cipher : 0016
61 Session-ID: 871E62626C554CE95488823752CBD5F3673A3EF3DCE9C67BD916C809914B40ED
62 Session-ID-ctx: 01000000
63 Master-Key: A7CEFC571974BE02CAC305269DC59F76EA9F0B180CB6642697A68251F2D2BB57E51DBBB4C7885573192AE9AEE220FACD
64 Key-Arg : None
65 Start Time: 948459261
66 Timeout : 300 (sec)
67 Verify return code 0 (ok)
68
69 Theses are described below in more detail.
70
71 Protocol
72 this is the protocol in use TLSv1, SSLv3 or SSLv2.
73
74 Cipher
75 the cipher used this is the actual raw SSL or TLS cipher code, see
76 the SSL or TLS specifications for more information.
77
78 Session-ID
79 the SSL session ID in hex format.
80
81 Session-ID-ctx
82 the session ID context in hex format.
83
84 Master-Key
85 this is the SSL session master key.
86
87 Key-Arg
88 the key argument, this is only used in SSL v2.
89
90 Start Time
91 this is the session start time represented as an integer in
92 standard Unix format.
93
94 Timeout
95 the timeout in seconds.
96
97 Verify return code
98 this is the return code when an SSL client certificate is verified.
99
101 The PEM encoded session format uses the header and footer lines:
102
103 -----BEGIN SSL SESSION PARAMETERS-----
104 -----END SSL SESSION PARAMETERS-----
105
106 Since the SSL session output contains the master key it is possible to
107 read the contents of an encrypted session using this information.
108 Therefore appropriate security precautions should be taken if the
109 information is being output by a "real" application. This is however
110 strongly discouraged and should only be used for debugging purposes.
111
113 The cipher and start time should be printed out in human readable form.
114
116 ciphers(1), s_server(1)
117
118
119
1201.0.1e 2013-02-11 SESS_ID(1)