The attached application allows you to check the SSL configuration on your MokaFive? server component. You can run this against any server component.
Syntax:
certchk [-CAfile <cert1> [-CAfile <cert2> ...]] server<:port>
Example:
certchk m5.moka5.com:443
If SSL is correctly configured, you'll see a bunch of cert information, and then:
Chain is valid
What is it doing, exactly?
-
Certchk will reach out to the specified server and receive the SSL certificate chain that has been configured. It will first enumerate the certificates in the chain, and output the number of certs it finds.
-
Starting with the first certificate, it will check validity -- ie, expiry dates and whether or not it can verify the issuer. If it's chained to an upstream cert, it will then move to the next cert in the chain.
-
Upon reaching the uppermost cert in the chain, it will attempt to verify it against a set of root certificates that it has built in. This set is identical to the set included by the MokaFive? Player.
-
If at any point in this flow the verification is unsuccessful, it will stop and output the nature of the failure.