CONNECTED(00000003) OCSP response: ====================================== OCSP Response Data: OCSP Response Status: successful (0x0) Response Type: Basic OCSP Response Version: 1 (0x0) Responder Id: C = US, O = Let's Encrypt, CN = E5 Produced At: Jan 27 17:27:00 2025 GMT Responses: Certificate ID: Hash Algorithm: sha1 Issuer Name Hash: 1E11C0C9ACFDA453EF4B2F6A732115604D54ADB9 Issuer Key Hash: 99CD29C3A15826AF7A7A4C845A8F738860B0DFDE Serial Number: 033CED2132F4B57528884F5BAFE1DB84A72F Cert Status: good This Update: Jan 27 17:27:00 2025 GMT Next Update: Feb 3 17:26:58 2025 GMT Signature Algorithm: ecdsa-with-SHA384 Signature Value: 30:64:02:30:4c:e5:16:8e:85:f3:a8:39:35:c8:d6:42:2b:59: c9:8c:40:5a:81:ae:06:04:81:7f:8a:cc:24:b7:be:ab:48:ff: 23:b0:31:85:11:f5:50:0a:f9:17:50:41:d3:93:48:08:02:30: 72:29:63:33:8c:c5:0d:ab:48:7e:54:c4:79:a1:57:50:4f:3e: 84:03:69:b0:d7:5a:3f:29:8c:7f:4e:0d:01:2d:78:e6:cd:2a: 10:8f:56:c2:da:08:07:35:e1:35:53:9a ====================================== --- Certificate chain 0 s:CN = aalberts.jp i:C = US, O = Let's Encrypt, CN = E5 a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Nov 29 14:52:22 2024 GMT; NotAfter: Feb 27 14:52:21 2025 GMT 1 s:C = US, O = Let's Encrypt, CN = E5 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDdzCCAv6gAwIBAgISAzztITL0tXUoiE9br+HbhKcvMAoGCCqGSM49BAMDMDIx CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF NTAeFw0yNDExMjkxNDUyMjJaFw0yNTAyMjcxNDUyMjFaMBYxFDASBgNVBAMTC2Fh bGJlcnRzLmpwMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE6jiMk6Ej4Q1rXSr8 +ZjlIhxSYOid1ORfQrC4duXmhumFjuE0q0O3/5pzhD5vgxrTMiJYRhHvwUOEw6yq UIN1iaOCAg4wggIKMA4GA1UdDwEB/wQEAwIHgDAdBgNVHSUEFjAUBggrBgEFBQcD AQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUbTmH/xLUFSGJxsbv wByO/3ZfcV0wHwYDVR0jBBgwFoAUnytfzzwhT50Et+0rLMTGcIvS1w0wVQYIKwYB BQUHAQEESTBHMCEGCCsGAQUFBzABhhVodHRwOi8vZTUuby5sZW5jci5vcmcwIgYI KwYBBQUHMAKGFmh0dHA6Ly9lNS5pLmxlbmNyLm9yZy8wFgYDVR0RBA8wDYILYWFs YmVydHMuanAwEwYDVR0gBAwwCjAIBgZngQwBAgEwggEFBgorBgEEAdZ5AgQCBIH2 BIHzAPEAdgCi4wrkRe+9rZt+OO1HZ3dT14JbhJTXK14bLMS5UKRH5wAAAZN4niwy AAAEAwBHMEUCIQDhDwRak9l76Nv1NVq+ZThIatavQknxOYe2x6ysgfJzegIgNV1V X+OnjV7XPIy4YLaWVKiK8SfgB3EXAmBB05KwpLcAdwDPEVbu1S58r/OHW9lpLpvp GnFnSrAX7KwB0lt3zsw7CAAAAZN4nixcAAAEAwBIMEYCIQDXklZu8HCNKoevE2UR +bnBp56kEGtC+kZT5StZo9W2fQIhANBwFys6Fsc8GywI+OJQXSEIWzsCpPVn/sb4 zmS+ryVLMAoGCCqGSM49BAMDA2cAMGQCMFmdUfCZeIFizkpEqxXw3SsA8lPas9Ne w2CD974rf6/szG+zvVrgoXr2PA4B6yy47AIwYHJanVGD2yJpPj9h0Y4fe60hTsKM VLBHBfoPbm9i+CLZEKkDqjkO62HrjOYcQvTk -----END CERTIFICATE----- subject=CN = aalberts.jp issuer=C = US, O = Let's Encrypt, CN = E5 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 2719 bytes and written 386 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: DB50BFDF13928938C5912B24E9BCF8D904CFB3E489C8954C29E3947099C497C6 Session-ID-ctx: Resumption PSK: 9D524304C3BD93011C812E944277F6E7895B83A4D0932C9CA4C3A34C6F4731F4 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - d3 09 8c 01 a2 23 2e 08-48 ff 91 3c 64 7f 8e 9f .....#..H..