Provided by: openssl_1.0.1f-1ubuntu2.27_amd64 bug

NAME

       sess_id - SSL/TLS session handling utility

SYNOPSIS

       openssl sess_id [-inform PEM|DER] [-outform PEM|DER] [-in filename] [-out filename]
       [-text] [-noout] [-context ID]

DESCRIPTION

       The sess_id process the encoded version of the SSL session structure and optionally prints
       out SSL session details (for example the SSL session master key) in human readable format.
       Since this is a diagnostic tool that needs some knowledge of the SSL protocol to use
       properly, most users will not need to use it.

       -inform DER|PEM
           This specifies the input format. The DER option uses an ASN1 DER encoded format
           containing session details. The precise format can vary from one version to the next.
           The PEM form is the default format: it consists of the DER format base64 encoded with
           additional header and footer lines.

       -outform DER|PEM
           This specifies the output format, the options have the same meaning as the -inform
           option.

       -in filename
           This specifies the input filename to read session information from or standard input
           by default.

       -out filename
           This specifies the output filename to write session information to or standard output
           if this option is not specified.

       -text
           prints out the various public or private key components in plain text in addition to
           the encoded version.

       -cert
           if a certificate is present in the session it will be output using this option, if the
           -text option is also present then it will be printed out in text form.

       -noout
           this option prevents output of the encoded version of the session.

       -context ID
           this option can set the session id so the output session information uses the supplied
           ID. The ID can be any string of characters. This option wont normally be used.

OUTPUT

       Typical output:

        SSL-Session:
            Protocol  : TLSv1
            Cipher    : 0016
            Session-ID: 871E62626C554CE95488823752CBD5F3673A3EF3DCE9C67BD916C809914B40ED
            Session-ID-ctx: 01000000
            Master-Key: A7CEFC571974BE02CAC305269DC59F76EA9F0B180CB6642697A68251F2D2BB57E51DBBB4C7885573192AE9AEE220FACD
            Key-Arg   : None
            Start Time: 948459261
            Timeout   : 300 (sec)
            Verify return code 0 (ok)

       Theses are described below in more detail.

       Protocol
           this is the protocol in use TLSv1, SSLv3 or SSLv2.

       Cipher
           the cipher used this is the actual raw SSL or TLS cipher code, see the SSL or TLS
           specifications for more information.

       Session-ID
           the SSL session ID in hex format.

       Session-ID-ctx
           the session ID context in hex format.

       Master-Key
           this is the SSL session master key.

       Key-Arg
           the key argument, this is only used in SSL v2.

       Start Time
           this is the session start time represented as an integer in standard Unix format.

       Timeout
           the timeout in seconds.

       Verify return code
           this is the return code when an SSL client certificate is verified.

NOTES

       The PEM encoded session format uses the header and footer lines:

        -----BEGIN SSL SESSION PARAMETERS-----

        -----END SSL SESSION PARAMETERS-----
       Since the SSL session output contains the master key it is possible to read the contents
       of an encrypted session using this information. Therefore appropriate security precautions
       should be taken if the information is being output by a "real" application. This is
       however strongly discouraged and should only be used for debugging purposes.

BUGS

       The cipher and start time should be printed out in human readable form.

SEE ALSO

       ciphers(1), s_server(1)