Re: How to "unwrap" S/MIME messages using openssl?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> On Apr 6, 2017, at 1:25 PM, Blumenthal, Uri - 0553 - MITLL <uri@xxxxxxxxxx> wrote:
> 
> I’m trying to debug the case of a (bad) email client sending encrypted S/MIME email that the recipient cannot decrypt (we suspect the problem is that the sender chooses a wrong public key/certificate to encrypt to).
>  
> Unfortunately, recipient email clients do not help figuring this out. All they say is “you do not have the right key…”.
>  
> My goal is to “unwrap” the CMS/SMIME message, and print out some identity of the recipient key/cert (anything that would allow me to tie this email to any of the keys I have, or to ascertain that it’s none of those) would help greatly. Printing out other details, such as “algorithms used” would also be helpful.
>  
> I’m sure it’s possible to write an application to do that. But I strongly suspect that the “openssl” command line tool would be able to address this problem. 
>  
> Would somebody on this list please show me how I can print the “metadata” (yes, that big word ☺) of the S/MIME email using openssl?

For S/MIME input:

   $ openssl cms -in cms.eml -cmsout -print

For DER input:

   $ openssl cms -inform DER -in cms.der -cmsout -print

-- 
	Viktor.

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux