1
在測試TLS安全性時,我經常使用grep
獲得openssl結果。例如:在grep期間抑制Openssl輸出
$ openssl s_client -tls1_2 -connect 172.11.15.32:443 </dev/null | grep 'IS s'
depth=0 C = US, ST = asd, O = Billing, CN = asdasd, emailAddress = [email protected]
verify error:num=18:self signed certificate
verify return:1
depth=0 C = US, ST = asd, O = Billing, CN = asdasd, emailAddress = [email protected]
verify return:1
DONE
Secure Renegotiation IS supported
然而,問題是,不管我用grep的,輸出始終包含在開始的時候,這些(或類似)行:
depth=0 C = US, ST = asd, O = Billing, CN = asdasd, emailAddress = [email protected]
verify error:num=18:self signed certificate
verify return:1
depth=0 C = US, ST = asd, O = Billing, CN = asdasd, emailAddress = [email protected]
verify return:1
是否有可能以某種方式抑制這些消息並只接收grep結果,如人們所期望的那樣?
這可能是因爲它的大部分輸出到stderr,它經過不'grep'使得它的任何動作(它只是檢查標準輸出)。只需使用'openssl 2>/dev/null'重定向它,然後相應地grep。 – fedorqui
@fedorqui這很快,並且確實解決了問題,謝謝! – ChildinTime