On Wed, Jul 8, 2015 at 10:17 PM, Francisco Reyes <li...@natserv.net> wrote:

> Anyone knows of a way to test the SSL connection such that it validates
> against the CA? Preferably an open source application. Connecting through
> psql works fine on SSL with what I have setup, but the application, xtuple,
> seems to still be having the issue.
>

openssl s_client -connect HOST:PORT -CAfile /path/to/CA.pem

check the man page for more options that will help you.

Here is what a bad connection looks like. This particular server does not
send along the necessary intermediate certificate:

% openssl s_client -connect filer:443
CONNECTED(00000003)
depth=0 OU = GT35717807, OU = See www.rapidssl.com/resources/cps (c)15, OU
= Domain Control Validated - RapidSSL(R), CN = *.int.kcilink.com
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 OU = GT35717807, OU = See www.rapidssl.com/resources/cps (c)15, OU
= Domain Control Validated - RapidSSL(R), CN = *.int.kcilink.com
verify error:num=21:unable to verify the first certificate
verify return:1
 [ ... ]
    Start Time: 1436468482
    Timeout   : 300 (sec)
    Verify return code: 21 (unable to verify the first certificate)


Here's what a good connection looks like where the server sends the
necessary intermediate certificate:

% openssl s_client -connect vk-dev:443
CONNECTED(00000003)
depth=2 C = US, O = GeoTrust Inc., CN = GeoTrust Global CA
verify return:1
depth=1 C = US, O = GeoTrust Inc., CN = RapidSSL SHA256 CA - G3
verify return:1
depth=0 OU = GT35717807, OU = See www.rapidssl.com/resources/cps (c)15, OU
= Domain Control Validated - RapidSSL(R), CN = *.int.kcilink.com
verify return:1
 [ ... ]
    Start Time: 1436468764
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)


The -verify_return_error option may help you as well.

Reply via email to