The certificate chain consists of two certificates. At level 0 there is the server certificate with some parsed information. s: is the subject line of the certificate and i: contains information about the issuing CA. This particular server (www.woot.com) has sent an intermediate certificate as well.

Certificate Chain is the certificate information for the trusted point. It is merely a concatenation of the certification chain, starting with the Intermediate Certificates, then the Root Certificate… OpenSSL create certificate chain with Root & Intermediate Install OpenSSL. On RHEL/CentOS 7/8 you can use yum or dnf respectively while on Ubuntu use apt … Certificate Chain Example. I see a lot of questions like Dec 08, 2017

You can verify the SSL certificate on your web server to make sure it is correctly installed, valid, trusted and doesn't give any errors to any of your users. To use the SSL Checker, simply enter your server's public hostname (internal hostnames aren't supported) in the box below and click the Check SSL button.

Verify a certificate with chain with golang crypto library - verify_certificate.go

How can I verify SSL certificates on the command line

Dec 20, 2019 How can I verify SSL certificates on the command line If you have the intermediate certificates are in a separate file, as they are in postfix and apache to name some, you can still verify the chain on the command line. bash. openssl verify -verbose -x509_strict <(cat my-domain.crt intermediate.crt) Most *nix shells. cat my-domain.crt intermediate.crt | openssl verify -verbose -x509_strict How To Verify SSL Certificate From A Shell Prompt - nixCraft