To verify a web server's certificate:
openssl s_client -connect <domain name>:443
There is more information available on Bruce's blog post about verifying certificates.
sudo mkdir /usr/share/local/ca-certificates if it doesn't already existopenssl x509 -in mypem.pem -inform PEM -out mycrt.crtsudo mv mycrt.crt /usr/share/local/ca-certificates/mycrt.crtsudo update-ca-certificatesNote that applications that have their own CA certificate stores will need to be updated also. Firefox is one such example, as is Chef.
For Chef, do the following after the above:
echo "export SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt" > /etc/profile.d/add_ssl_cert_file_for_chef.sh
/etc/pki/ca-trust/source/anchors/my-cert.crtsudo update-ca-trustFor Chef, do the following after the above:
echo "export SSL_CERT_FILE=/etc/pki/tls/certs/ca-bundle.crt" > /etc/profile.d/add_ssl_cert_file_for_chef.sh
tcpflow -p -c -i eth0 port 80 | grep -oE '(GET|POST|HEAD) .* HTTP/1.[01]|Host: .*'
(\d*\.\d*\.\d*\.\d*) \- \- \[(.*)\] "(\w*) (.*) HTTP\/\d\.\d" (\d*) (\d*) "(.*)" "(.*)" (\d*\.\d*) (\d*\.\d*)