0

I know we can retrieve the SSL cert with

openssl s_client -connect host:port 

command. Is there any way to find out the file system location of the cert that was used by the process handling the SSL traffic? Am I being very unreasonable?

8
  • 2
    I doubt that's possible: leaking this information could be a security risk. Commented Dec 25, 2016 at 19:46
  • 1
    It would depend on the service itself being awfully badly designed. If you do encounter one, you should file a major bug report. Commented Dec 25, 2016 at 19:47
  • Could it be that you meant the location of the CA certificates? Commented Dec 25, 2016 at 20:12
  • 1
    I'm voting to close this question as off-topic because what the OP asked for is simply not intended by design, nor is it really related to U&L. Commented Dec 26, 2016 at 18:13
  • 2
    @countermode The fact that it's impossible doesn't invalidate the question or make it off-topic. “It's impossible” (with explanation) is the proper answer. Commented Dec 26, 2016 at 22:00

1 Answer 1

6

No, you can't get that information. It's none of the TLS client's business. It's purely up to the server how and where it loads its certificate (and private key) from. It might not even come from a file on a filesystem but from, say, an HSM.

1
  • In some cases. including an IPS DLP or similar interceptor, the cert may be created on the fly and not ever stored anywhere. Commented Dec 27, 2016 at 8:21

You must log in to answer this question.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.