CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = TRAEFIK DEFAULT CERT i:CN = TRAEFIK DEFAULT CERT a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Dec 25 19:24:02 2025 GMT; NotAfter: Dec 25 19:24:02 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDXjCCAkagAwIBAgIRAMSPToD4iQTnQi7K9+wFtDQwDQYJKoZIhvcNAQELBQAw HzEdMBsGA1UEAxMUVFJBRUZJSyBERUZBVUxUIENFUlQwHhcNMjUxMjI1MTkyNDAy WhcNMjYxMjI1MTkyNDAyWjAfMR0wGwYDVQQDExRUUkFFRklLIERFRkFVTFQgQ0VS VDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM6j0VkN1/YXdwbuqAUN Ui4tXL7fa6m/DHHb3ZL8YeR7D59CEcwckdlPg748y47txpSfuf7NY9dqCAMMYfn3 WUotq0Tsq62Vt63S1oDILpZBXLiZ+adV0RnQdZUQhc3qkLH7boUsMZh/6k7WUOXm O/zNxGngienm9JIMjm/sN3dcBKk5Ko0WnBMA2u7jFQLTXX9DznK7iAZ1lmh9mpJY noVzK0j+SEbxcCB5c3YtiQ4ibnwJk3+6SiSOwafYUAlwz1g82/EnAkOJ82CtkwX/ ziyVj3tf57vp1EXBZ8sZBr1zMRZlxmG7XhwER2b4Wo/KXmuy2T7SuRn25A6ti35+ ISMCAwEAAaOBlDCBkTAOBgNVHQ8BAf8EBAMCA7gwEwYDVR0lBAwwCgYIKwYBBQUH AwEwDAYDVR0TAQH/BAIwADBcBgNVHREEVTBTglFmYzNiMjI5NDZlYmNjNTFkNzRh ZGY2NzIzYTdmMDFjYy5mYzZmODJkOGVhZTAwYTZhZDVhMWMwNjNiOTAxODAwYi50 cmFlZmlrLmRlZmF1bHQwDQYJKoZIhvcNAQELBQADggEBAKuh+XJdsaXHoMOVlcbf /ej3LWgTG+dJwuCBPPv5y2c8oR/7nfoysFhFnYyYpCEtTXQKl0QgbA66XNbYKpIK LMAMFe24TrOxo7jxgXv69xE8z5s4gz3YiIXFppzZlWdNQtQ7zCK+hxESkfBySr50 TO6cSBsB7NHXm6xxNpdKn481VwCLSb7MDS9mUz/+yNKx0IZTt505gvBO4SfwqfWw /kUmfcvqY7zqb7T387h7K4Np+Yzdb6QUvtjazyPuukatIWZTZVGHcyNziSaf+oIO I4M3l4iSFowcgsnaQFMxxiQk+ZmRa5FVT8wBPENiwbYMvh3yQooLrvUU8SifmppK UPc= -----END CERTIFICATE----- subject=CN = TRAEFIK DEFAULT CERT issuer=CN = TRAEFIK DEFAULT CERT --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1406 bytes and written 408 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 2048 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 31E530D9F556AF8348A88A163D608744DF6BD37DDCE990DBA41C80F7A0A1C2AB Session-ID-ctx: Resumption PSK: 7C3C4ABA053784828DEABE129E6738E02252A9F57416D7FC35B66519FC85E6F7 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - e9 7b a2 66 7d 31 11 58-f6 23 6e 82 b9 4a 8f 6f .{.f}1.X.#n..J.o 0010 - 2e fb bc a6 12 18 d5 38-b5 bc 27 fe 3b 66 be 36 .......8..'.;f.6 0020 - a8 e6 bb 68 34 ad 0d 61-7e 4e b4 ca 2c db fe 2d ...h4..a~N..,..- 0030 - dc ff ef 58 f5 03 1e 83-23 71 99 19 27 4e 63 dc ...X....#q..'Nc. 0040 - 17 e3 49 a8 10 7d 5c 65-57 18 de c5 cb 10 a5 db ..I..}\eW....... 0050 - 38 c4 44 e8 e5 77 73 de-03 d6 7c 51 ea 77 8b ae 8.D..ws...|Q.w.. 0060 - 8d e3 bf 19 db 77 d2 aa-36 .....w..6 Start Time: 1767229753 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK