CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = TRAEFIK DEFAULT CERT i:CN = TRAEFIK DEFAULT CERT a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 14 23:47:28 2025 GMT; NotAfter: Nov 14 23:47:28 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDXTCCAkWgAwIBAgIQW4404H+FbRHV2Yl2ODDf4DANBgkqhkiG9w0BAQsFADAf MR0wGwYDVQQDExRUUkFFRklLIERFRkFVTFQgQ0VSVDAeFw0yNTExMTQyMzQ3Mjha Fw0yNjExMTQyMzQ3MjhaMB8xHTAbBgNVBAMTFFRSQUVGSUsgREVGQVVMVCBDRVJU MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4lPJRBVK9dmJbOAFd9It YjlPCv4PlAHXCeJRQyIlIQ4xHBKJ9bQdhYLRbMCko96MoPNh2XUZPcveJuUoHl6Z ogqBU/OYFQt064t3TA899/kuzR5V4C3WHlmEwwTMJMqOcFBp4dU+74QvNJfFW4L1 HnBct2V4gUNfJD1WnTwzHySb4xGufsq3K2poAbCT4EaGNSuSdHuCbjipQkgPAElk 16u0+68KDLUhyaldcge7D7ezqUXqu3/R7ikj7w/tlNPSjtzPV0J/LdMqRtSFqkCi aSUTcQqI4nKOWEa/wQHCekkKw/fLKkSh2ITm5LbBMuKXF5BrrB0fn8mlibctpniu VQIDAQABo4GUMIGRMA4GA1UdDwEB/wQEAwIDuDATBgNVHSUEDDAKBggrBgEFBQcD ATAMBgNVHRMBAf8EAjAAMFwGA1UdEQRVMFOCUWNjMjdmYTBmMWUyZmU5MzhlMDlk NTExOTRmMDkyOTQ3LjVlNWVlZTc5NzJkNzFhYTViOWZjN2YwMzQ1YzEwZjM0LnRy YWVmaWsuZGVmYXVsdDANBgkqhkiG9w0BAQsFAAOCAQEAWVNSwpAIzl1wXDXqz4yM 3d5Y3RcfLSda+ClXICZblK1m8itKCKuyGQbnClvxZzJbno+77klxzq1xhB+McnLe RMeFy4Px6AfIK8H36PEZ8LBvED1k+Q/+S28HOkqmX7XtSu0q19i0f/0qGXi+UVvM eye++xXayQXV/x7K86HNB0VjBF7QjSbqGTk0UoN5lsCyo/jKSW+B/r8R3sjkV8HX YlS4mMs28PkIA6LUM1S0F+/zudH9GyolsMFnrtxjgOszDCh44hNnQ/pMP85ZKEPm 4dZBmcjZGYWmWWym8gzwWvM7qTB1qvp+/Z030hCEWgm3N2sTnZv9SvOtd9feZYY5 JQ== -----END CERTIFICATE----- subject=CN = TRAEFIK DEFAULT CERT issuer=CN = TRAEFIK DEFAULT CERT --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1405 bytes and written 425 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 2048 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 128705137911FB1DB388B015E41B001604B1F08F97183A1FE32A7634D21C2EE1 Session-ID-ctx: Resumption PSK: 4596F8415448E8A59CDEBBC73F0955FAD872C4DC79546DB5279F3083681D2AC3 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - b4 15 33 71 21 cc f9 c9-ed 88 dc 25 dd 94 42 f6 ..3q!......%..B. 0010 - 93 1a f6 7c 11 51 56 59-a7 2a d3 e6 f7 88 1e e6 ...|.QVY.*...... 0020 - 8c 31 e0 f2 31 6c 12 4f-15 43 47 6a 23 70 7b eb .1..1l.O.CGj#p{. 0030 - 6d 2e 01 5b 01 78 fa 84-9c ea 26 93 b2 85 7f 08 m..[.x....&..... 0040 - 79 31 65 5e d5 59 ef dd-a1 18 20 3c 87 b7 2a 06 y1e^.Y.... <..*. 0050 - 02 8c b9 06 0c 40 46 81-26 c7 df 4e 02 70 c4 58 .....@F.&..N.p.X 0060 - 3a 73 8f 10 8b 09 15 59-7d :s.....Y} Start Time: 1767229507 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK