CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = TRAEFIK DEFAULT CERT i:CN = TRAEFIK DEFAULT CERT a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 18 10:39:08 2024 GMT; NotAfter: Nov 18 10:39:08 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDXTCCAkWgAwIBAgIQQo02fBcO/2arze4VDVMk7DANBgkqhkiG9w0BAQsFADAf MR0wGwYDVQQDExRUUkFFRklLIERFRkFVTFQgQ0VSVDAeFw0yNDExMTgxMDM5MDha Fw0yNTExMTgxMDM5MDhaMB8xHTAbBgNVBAMTFFRSQUVGSUsgREVGQVVMVCBDRVJU MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwM+B1Pb8uOOkBdfRzFit 784gVH1tBh4GZouieHhuA70VLxLnFzxrZHOo6KETqBEPdfHbxx6KWHWv9oL6F6HL crtL67u1Mx2cN0KR8qq2RXKTJK72jZ6idavjNCeTDYgwBcm4+B85Jdbyg4B7iHx0 +rqz9eIyfwSY7Qse5moZIUZ2muJl2UNHtj/Ah1q4Tgx7ZEjDgvvJZG87IepXgBk6 70uiDXr4qw/3lBzG4qN+EYY6Z6HB0dyBJyuJ5/WwM0qhiCV/7fybT58wTXplOtAA jmqjolNre1as2rUeX4jAxMwu3l5NGMheSsafhfyWDUpsczghRzaiRInmRCA+/qNp lwIDAQABo4GUMIGRMA4GA1UdDwEB/wQEAwIDuDATBgNVHSUEDDAKBggrBgEFBQcD ATAMBgNVHRMBAf8EAjAAMFwGA1UdEQRVMFOCUTAyYmI5NjEwM2IwMThkNDQyZjFm ODc2ZDYyNThiMDc3LjliODMwZmZlZjU4OWIyNTIwOGNkYzA3Nzk0ZDhhNmY4LnRy YWVmaWsuZGVmYXVsdDANBgkqhkiG9w0BAQsFAAOCAQEANmh2GhbeNnPGiq9gml9g NuvHDEM/lbY2rtxbHOVDqRyI7QPhLx4sPacwpAPGfoCVTN9sbVbgYCUe5KlALM2B aan8Kl45ipCZT2KrZbRG+wJpkjZXtDMkQk5CiIUxGH/s8HMlmDpxFVcHZ/V3vA3U cTKyqm4m6TSwjnhE7DXh1E4sfMw4FAWMZSO8RJPC1x67kiQ6xAkja6OnuVzKZtk7 7cFUg2YdIe1n1/1jDAGFhKQvctagltCQDUyqyQntFxm0LspcGZcfFH+K5s3ggzZ5 vo8TKvIDDjJ5NKOzKHh7qAafJEVQ4mmPx8/0DsZfz01KL7jtGNB6yAyJPaPXoL9n +g== -----END CERTIFICATE----- subject=CN = TRAEFIK DEFAULT CERT issuer=CN = TRAEFIK DEFAULT CERT --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1405 bytes and written 383 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 2048 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 7D0387195560B78DC0381D1C511CB9A8FA5352FCD861D2B6428A3F8DECB6238E Session-ID-ctx: Resumption PSK: 139DC4A456F3E3201114CEBA5D9B3C35E23DCD2D850092C1165816663DF40A80 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - 59 84 71 8f 54 fa e6 84-59 6f 56 a5 c4 d8 89 10 Y.q.T...YoV..... 0010 - 94 51 b7 38 ae 52 3e e3-1c 0c c2 a2 68 33 68 9e .Q.8.R>.....h3h. 0020 - 78 4a 09 47 2d c8 e6 87-f7 8d d0 44 37 70 23 ac xJ.G-......D7p#. 0030 - 7b 0a 34 d7 25 ac 05 ca-28 89 b6 63 4f b3 33 06 {.4.%...(..cO.3. 0040 - 33 2c 06 a6 d8 42 1a 32-71 fc 7f 6e 2a b8 64 dd 3,...B.2q..n*.d. 0050 - 26 13 58 ee 07 36 10 e2-7d 01 ac c4 6a 0f 4a fe &.X..6..}...j.J. 0060 - d6 bd 90 e0 a6 5b 34 db-15 48 b2 93 ca 27 40 dc .....[4..H...'@. 0070 - cc . Start Time: 1732182216 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK