CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = TRAEFIK DEFAULT CERT i:CN = TRAEFIK DEFAULT CERT a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Dec 25 19:24:02 2025 GMT; NotAfter: Dec 25 19:24:02 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDXjCCAkagAwIBAgIRAMSPToD4iQTnQi7K9+wFtDQwDQYJKoZIhvcNAQELBQAw HzEdMBsGA1UEAxMUVFJBRUZJSyBERUZBVUxUIENFUlQwHhcNMjUxMjI1MTkyNDAy WhcNMjYxMjI1MTkyNDAyWjAfMR0wGwYDVQQDExRUUkFFRklLIERFRkFVTFQgQ0VS VDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM6j0VkN1/YXdwbuqAUN Ui4tXL7fa6m/DHHb3ZL8YeR7D59CEcwckdlPg748y47txpSfuf7NY9dqCAMMYfn3 WUotq0Tsq62Vt63S1oDILpZBXLiZ+adV0RnQdZUQhc3qkLH7boUsMZh/6k7WUOXm O/zNxGngienm9JIMjm/sN3dcBKk5Ko0WnBMA2u7jFQLTXX9DznK7iAZ1lmh9mpJY noVzK0j+SEbxcCB5c3YtiQ4ibnwJk3+6SiSOwafYUAlwz1g82/EnAkOJ82CtkwX/ ziyVj3tf57vp1EXBZ8sZBr1zMRZlxmG7XhwER2b4Wo/KXmuy2T7SuRn25A6ti35+ ISMCAwEAAaOBlDCBkTAOBgNVHQ8BAf8EBAMCA7gwEwYDVR0lBAwwCgYIKwYBBQUH AwEwDAYDVR0TAQH/BAIwADBcBgNVHREEVTBTglFmYzNiMjI5NDZlYmNjNTFkNzRh ZGY2NzIzYTdmMDFjYy5mYzZmODJkOGVhZTAwYTZhZDVhMWMwNjNiOTAxODAwYi50 cmFlZmlrLmRlZmF1bHQwDQYJKoZIhvcNAQELBQADggEBAKuh+XJdsaXHoMOVlcbf /ej3LWgTG+dJwuCBPPv5y2c8oR/7nfoysFhFnYyYpCEtTXQKl0QgbA66XNbYKpIK LMAMFe24TrOxo7jxgXv69xE8z5s4gz3YiIXFppzZlWdNQtQ7zCK+hxESkfBySr50 TO6cSBsB7NHXm6xxNpdKn481VwCLSb7MDS9mUz/+yNKx0IZTt505gvBO4SfwqfWw /kUmfcvqY7zqb7T387h7K4Np+Yzdb6QUvtjazyPuukatIWZTZVGHcyNziSaf+oIO I4M3l4iSFowcgsnaQFMxxiQk+ZmRa5FVT8wBPENiwbYMvh3yQooLrvUU8SifmppK UPc= -----END CERTIFICATE----- subject=CN = TRAEFIK DEFAULT CERT issuer=CN = TRAEFIK DEFAULT CERT --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1406 bytes and written 406 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 2048 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: BD0C229AF282855E18A42B54EA0E7329FE1C1149421DC253A3AB9B7BC02EACB3 Session-ID-ctx: Resumption PSK: 72511BBFB80ACC7E47706770BED252D76EEFFDBE4584EDE3A9077B882C3417D3 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - 00 30 43 5d 25 0d 0b db-9e 8f 0c 57 f7 6a 3b b5 .0C]%......W.j;. 0010 - 63 b8 11 38 b1 0d 28 7a-3e c7 93 28 56 84 17 74 c..8..(z>..(V..t 0020 - 18 20 2b d4 2d 59 5e 2b-88 ce bd c7 b3 60 71 7e . +.-Y^+.....`q~ 0030 - 23 97 41 02 83 66 a5 e7-7b 85 c4 94 98 d1 30 23 #.A..f..{.....0# 0040 - d8 9e df 5c 62 a8 6b 64-06 82 56 10 a4 6f 96 a8 ...\b.kd..V..o.. 0050 - ef 7b f7 02 d8 33 d9 2f-ca df 90 d8 35 85 12 68 .{...3./....5..h 0060 - f9 9a 83 7c 81 c5 b2 39-db ...|...9. Start Time: 1767237234 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK