CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = 2.j.gramin.jp i:C = US, O = Let's Encrypt, CN = E7 a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Nov 28 20:15:38 2025 GMT; NotAfter: Feb 26 20:15:37 2026 GMT 1 s:C = US, O = Let's Encrypt, CN = E7 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDhzCCAw6gAwIBAgISBtN187YvglyB/eoCPCx7KqsXMAoGCCqGSM49BAMDMDIx CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF NzAeFw0yNTExMjgyMDE1MzhaFw0yNjAyMjYyMDE1MzdaMBgxFjAUBgNVBAMTDTIu ai5ncmFtaW4uanAwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQHTJuzUnkIQ7Qr OFKU7Eu7T2QB0uwDYpQ4tVlDPFKVBjpz4uMNg8eqWkOoP5UmM/DNcBxUN/OoC6w9 beqBRfCWo4ICHDCCAhgwDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQGCCsGAQUF BwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRPQLunNLeLZD05 pt7fSYAT9iR2zTAfBgNVHSMEGDAWgBSuSJ7chx1EoG/aouVgdAR4wpwAgDAyBggr BgEFBQcBAQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly9lNy5pLmxlbmNyLm9yZy8w GAYDVR0RBBEwD4INMi5qLmdyYW1pbi5qcDATBgNVHSAEDDAKMAgGBmeBDAECATAt BgNVHR8EJjAkMCKgIKAehhxodHRwOi8vZTcuYy5sZW5jci5vcmcvMjQuY3JsMIIB BQYKKwYBBAHWeQIEAgSB9gSB8wDxAHYAGYbUxyiqb/66A294Kk0BkarOLXIxD67O XXBBLSVMx9QAAAGazFDz+wAABAMARzBFAiEAoz1CwppcIfPXvVXOpi5Fol/DPZKF W9nQJG6IUdSBNYsCIB0ePmVDylQeD5qz/sg9dBSlGSipXaKnvu4NKgzmkNynAHcA lpdkv1VYl633Q4doNwhCd+nwOtX2pPM2bkakPw/KqcYAAAGazFD0ZgAABAMASDBG AiEApE6q52GyFLAwcIc65aFmJ7k7Y35Br60sbnnMqLAuCZ0CIQD09CPU3cv6Fk+N mEnETzUvbmfmGvFlPpaX7c6Ra454OTAKBggqhkjOPQQDAwNnADBkAjAr1GyZTQ5l e7u2vaRzPDjjivdcTXiZFn9tYdjqcfkQdIyHHdOKohjgf9NTOk5iKdQCMFNvCf5Z w8KVbtHWsT59JYoN7+YTA1BYqX17goW38mTj3AsaWEgVhCQaW2RlgIeTNQ== -----END CERTIFICATE----- subject=CN = 2.j.gramin.jp issuer=C = US, O = Let's Encrypt, CN = E7 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 2386 bytes and written 388 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 842723CBABEF2BE4B265AAF86E2C197CDD1A31E432AA9356372849E50C2F4D85 Session-ID-ctx: Resumption PSK: CB0F9B7B6982CCC7FE4E50AB27518EE82100F6A980B67C74967B881382033EF3 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - 65 4b d1 ad 9f c8 fc 44-c0 51 f5 b5 43 f7 6c ba eK.....D.Q..C.l. 0010 - c1 b3 93 bd 2d fc 11 2b-f6 5d 76 f1 0c 5b 3a 2c ....-..+.]v..[:, 0020 - cb f6 aa 3c 21 db b4 a5-29 49 c9 4f 53 84 90 31 ... 0060 - 58 df 09 c3 59 b1 91 ce-49 X...Y...I Start Time: 1767229436 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK