1SESS_ID(1)                          OpenSSL                         SESS_ID(1)
2
3
4

NAME

6       openssl-sess_id, sess_id - SSL/TLS session handling utility
7

SYNOPSIS

9       openssl sess_id [-help] [-inform PEM|DER] [-outform PEM|DER|NSS] [-in
10       filename] [-out filename] [-text] [-noout] [-context ID]
11

DESCRIPTION

13       The sess_id process the encoded version of the SSL session structure
14       and optionally prints out SSL session details (for example the SSL
15       session master key) in human readable format. Since this is a
16       diagnostic tool that needs some knowledge of the SSL protocol to use
17       properly, most users will not need to use it.
18

OPTIONS

20       -help
21           Print out a usage message.
22
23       -inform DER|PEM
24           This specifies the input format. The DER option uses an ASN1 DER
25           encoded format containing session details. The precise format can
26           vary from one version to the next.  The PEM form is the default
27           format: it consists of the DER format base64 encoded with
28           additional header and footer lines.
29
30       -outform DER|PEM|NSS
31           This specifies the output format. The PEM and DER options have the
32           same meaning and default as the -inform option. The NSS option
33           outputs the session id and the master key in NSS keylog format.
34
35       -in filename
36           This specifies the input filename to read session information from
37           or standard input by default.
38
39       -out filename
40           This specifies the output filename to write session information to
41           or standard output if this option is not specified.
42
43       -text
44           Prints out the various public or private key components in plain
45           text in addition to the encoded version.
46
47       -cert
48           If a certificate is present in the session it will be output using
49           this option, if the -text option is also present then it will be
50           printed out in text form.
51
52       -noout
53           This option prevents output of the encoded version of the session.
54
55       -context ID
56           This option can set the session id so the output session
57           information uses the supplied ID. The ID can be any string of
58           characters. This option won't normally be used.
59

OUTPUT

61       Typical output:
62
63        SSL-Session:
64            Protocol  : TLSv1
65            Cipher    : 0016
66            Session-ID: 871E62626C554CE95488823752CBD5F3673A3EF3DCE9C67BD916C809914B40ED
67            Session-ID-ctx: 01000000
68            Master-Key: A7CEFC571974BE02CAC305269DC59F76EA9F0B180CB6642697A68251F2D2BB57E51DBBB4C7885573192AE9AEE220FACD
69            Key-Arg   : None
70            Start Time: 948459261
71            Timeout   : 300 (sec)
72            Verify return code 0 (ok)
73
74       These are described below in more detail.
75
76       Protocol
77           This is the protocol in use TLSv1.3, TLSv1.2, TLSv1.1, TLSv1 or
78           SSLv3.
79
80       Cipher
81           The cipher used this is the actual raw SSL or TLS cipher code, see
82           the SSL or TLS specifications for more information.
83
84       Session-ID
85           The SSL session ID in hex format.
86
87       Session-ID-ctx
88           The session ID context in hex format.
89
90       Master-Key
91           This is the SSL session master key.
92
93       Start Time
94           This is the session start time represented as an integer in
95           standard Unix format.
96
97       Timeout
98           The timeout in seconds.
99
100       Verify return code
101           This is the return code when an SSL client certificate is verified.
102

NOTES

104       The PEM encoded session format uses the header and footer lines:
105
106        -----BEGIN SSL SESSION PARAMETERS-----
107        -----END SSL SESSION PARAMETERS-----
108
109       Since the SSL session output contains the master key it is possible to
110       read the contents of an encrypted session using this information.
111       Therefore, appropriate security precautions should be taken if the
112       information is being output by a "real" application. This is however
113       strongly discouraged and should only be used for debugging purposes.
114

BUGS

116       The cipher and start time should be printed out in human readable form.
117

SEE ALSO

119       ciphers(1), s_server(1)
120
122       Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
123
124       Licensed under the OpenSSL license (the "License").  You may not use
125       this file except in compliance with the License.  You can obtain a copy
126       in the file LICENSE in the source distribution or at
127       <https://www.openssl.org/source/license.html>.
128
129
130
1311.1.1k                            2021-03-26                        SESS_ID(1)
Impressum