badssl.com for a list of test subdomains, including:
Stock Ubuntu VM, DNS A records for
*.badssl.com. pointing to the VM.
Testing and development
Follow the instructions to install Docker.
Clone into the badssl repo by running
git clone https://github.com/chromium/badssl.com && cd badssl.com.
In order to access the various badssl subdomains locally you will need to add them to your system hosts file. Run
make list-hostsand copy and paste the output into
Start Docker by running
You can now navigate to
badssl.testin your browser, and you should see a certificate error.
The badssl root certificate is at
certs/sets/test/gen/crt/ca-root.crt. In order to get the rest of the badssl subdomains working, you will need to add this to your machine's list of trusted certificates.
certs/sets/test/gen/crt/ca-root.crtinto the login section of the program Keychain Access. A BadSSL Root Certificate Authority entry should appear in the list. Double-click on this entry and select "Always Trust" from the drop-down menu next to "Secure Sockets Layer (SSL)." Close the window to save your changes.
If you are already familiar with this process, you can instead run this command:
security add-trusted-cert -r trustRoot -p ssl \ -k "$HOME/Library/Keychains/login.keychain" certs/sets/test/gen/crt/ca-root.crt
In order to preserve the client and root certificates even after running
make clean, run:
cd certs/sets/test mkdir -p pregen/crt pregen/key cp gen/crt/ca-root.crt pregen/crt/ca-root.crt cp gen/crt/client.crt pregen/crt/client.crt cp gen/crt/client-ca-root.crt pregen/crt/client-ca-root.crt cp gen/key/ca-root.key pregen/key/ca-root.key cp gen/key/client.key pregen/key/client.key cp gen/key/client-ca-root.key pregen/key/client-ca-root.key
badssl.com is hosted on Google Cloud infrastructure and co-maintained by:
Several public badssl.com certificates required special issuance processes. Most certificates were graciously issued for free, thanks to help from:
- Vincent Lynch, The SSL Store (
- Richard Barnes, Mozilla (
- Clint Wilson, DigiCert (most wildcards)
- Andrew Ayer, SSLMate (
- Rob Stradling, Comodo (
Various subdomains and test pages are also implemented by external contributors.
badssl.com is meant for manual testing of security UI in web clients.
Most subdomains are likely to have stable functionality, but anything could change without notice. If you would like a documented guarantee for a particular use case, please file an issue. (Alternatively, you could make a fork and host your own copy.)
badssl.com is not an official Google product. It is offered "AS-IS" and without any warranties.