CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = TRAEFIK DEFAULT CERT i:CN = TRAEFIK DEFAULT CERT a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 18 10:39:08 2024 GMT; NotAfter: Nov 18 10:39:08 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDXTCCAkWgAwIBAgIQQo02fBcO/2arze4VDVMk7DANBgkqhkiG9w0BAQsFADAf MR0wGwYDVQQDExRUUkFFRklLIERFRkFVTFQgQ0VSVDAeFw0yNDExMTgxMDM5MDha Fw0yNTExMTgxMDM5MDhaMB8xHTAbBgNVBAMTFFRSQUVGSUsgREVGQVVMVCBDRVJU MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwM+B1Pb8uOOkBdfRzFit 784gVH1tBh4GZouieHhuA70VLxLnFzxrZHOo6KETqBEPdfHbxx6KWHWv9oL6F6HL crtL67u1Mx2cN0KR8qq2RXKTJK72jZ6idavjNCeTDYgwBcm4+B85Jdbyg4B7iHx0 +rqz9eIyfwSY7Qse5moZIUZ2muJl2UNHtj/Ah1q4Tgx7ZEjDgvvJZG87IepXgBk6 70uiDXr4qw/3lBzG4qN+EYY6Z6HB0dyBJyuJ5/WwM0qhiCV/7fybT58wTXplOtAA jmqjolNre1as2rUeX4jAxMwu3l5NGMheSsafhfyWDUpsczghRzaiRInmRCA+/qNp lwIDAQABo4GUMIGRMA4GA1UdDwEB/wQEAwIDuDATBgNVHSUEDDAKBggrBgEFBQcD ATAMBgNVHRMBAf8EAjAAMFwGA1UdEQRVMFOCUTAyYmI5NjEwM2IwMThkNDQyZjFm ODc2ZDYyNThiMDc3LjliODMwZmZlZjU4OWIyNTIwOGNkYzA3Nzk0ZDhhNmY4LnRy YWVmaWsuZGVmYXVsdDANBgkqhkiG9w0BAQsFAAOCAQEANmh2GhbeNnPGiq9gml9g NuvHDEM/lbY2rtxbHOVDqRyI7QPhLx4sPacwpAPGfoCVTN9sbVbgYCUe5KlALM2B aan8Kl45ipCZT2KrZbRG+wJpkjZXtDMkQk5CiIUxGH/s8HMlmDpxFVcHZ/V3vA3U cTKyqm4m6TSwjnhE7DXh1E4sfMw4FAWMZSO8RJPC1x67kiQ6xAkja6OnuVzKZtk7 7cFUg2YdIe1n1/1jDAGFhKQvctagltCQDUyqyQntFxm0LspcGZcfFH+K5s3ggzZ5 vo8TKvIDDjJ5NKOzKHh7qAafJEVQ4mmPx8/0DsZfz01KL7jtGNB6yAyJPaPXoL9n +g== -----END CERTIFICATE----- subject=CN = TRAEFIK DEFAULT CERT issuer=CN = TRAEFIK DEFAULT CERT --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1405 bytes and written 382 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 2048 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: D054E93A8B18A65E9C80AD797C475DACBC4CCEA787433FE05ACD723DE504704F Session-ID-ctx: Resumption PSK: D9DAAE11CC3DB24429709D2B67646078D15755F2C79AA2D04F33D9A2418917F9 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - 59 84 71 8f 54 fa e6 84-59 6f 56 a5 c4 d8 89 10 Y.q.T...YoV..... 0010 - 85 55 dd 88 e6 74 46 0f-d5 63 d9 32 7c 4f b7 4b .U...tF..c.2|O.K 0020 - 6e 30 b3 b0 62 24 51 1e-ee 48 f3 61 fa 1f 24 b2 n0..b$Q..H.a..$. 0030 - b3 4b 9b dd 98 ec 88 9a-cf ef 76 e9 83 b5 6b ca .K........v...k. 0040 - 91 e6 e0 cc 1c c0 b5 bf-b5 40 ec a4 b5 d7 ad d4 .........@...... 0050 - 4f 7d 5b 2e 50 cd ab 9a-e3 f7 79 a6 6a 3f 7d 4e O}[.P.....y.j?}N 0060 - e7 e7 ac 63 74 ec 38 df-3b 64 4e fb f1 d6 85 10 ...ct.8.;dN..... 0070 - 57 W Start Time: 1732178489 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK