How to get the Root CA Certificate Fingerprint using openssl
By using the following command, I can verify the sha1 fingerprint of the presented certificate: $ openssl s_client -connect hooks.slack.com:443 -showcerts < /dev/null 2>/dev/null | openssl x509 -in /dev/stdin -sha1 -noout -fingerprint SHA1 Fingerprint=AB:F0:5B:A9:1A:E0:AE:5F:CE:32:2E:7C:66:67:49:EC:DD:6D:6A:38 But what if I want to get the fingerprint of the Top Level Signing Authority? $ openssl s_client -connect hooks.slack.com:443 < /dev/null 2>/dev/null CONNECTED(00000003) --- Certificate chain 0 s:/C=US/ST=California/L=San Francisco/O=Slack Technologies, Inc/CN=*.slack.com i:/C=US/O