CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = TRAEFIK DEFAULT CERT i:CN = TRAEFIK DEFAULT CERT a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Dec 25 19:24:02 2025 GMT; NotAfter: Dec 25 19:24:02 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDXjCCAkagAwIBAgIRAMSPToD4iQTnQi7K9+wFtDQwDQYJKoZIhvcNAQELBQAw HzEdMBsGA1UEAxMUVFJBRUZJSyBERUZBVUxUIENFUlQwHhcNMjUxMjI1MTkyNDAy WhcNMjYxMjI1MTkyNDAyWjAfMR0wGwYDVQQDExRUUkFFRklLIERFRkFVTFQgQ0VS VDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM6j0VkN1/YXdwbuqAUN Ui4tXL7fa6m/DHHb3ZL8YeR7D59CEcwckdlPg748y47txpSfuf7NY9dqCAMMYfn3 WUotq0Tsq62Vt63S1oDILpZBXLiZ+adV0RnQdZUQhc3qkLH7boUsMZh/6k7WUOXm O/zNxGngienm9JIMjm/sN3dcBKk5Ko0WnBMA2u7jFQLTXX9DznK7iAZ1lmh9mpJY noVzK0j+SEbxcCB5c3YtiQ4ibnwJk3+6SiSOwafYUAlwz1g82/EnAkOJ82CtkwX/ ziyVj3tf57vp1EXBZ8sZBr1zMRZlxmG7XhwER2b4Wo/KXmuy2T7SuRn25A6ti35+ ISMCAwEAAaOBlDCBkTAOBgNVHQ8BAf8EBAMCA7gwEwYDVR0lBAwwCgYIKwYBBQUH AwEwDAYDVR0TAQH/BAIwADBcBgNVHREEVTBTglFmYzNiMjI5NDZlYmNjNTFkNzRh ZGY2NzIzYTdmMDFjYy5mYzZmODJkOGVhZTAwYTZhZDVhMWMwNjNiOTAxODAwYi50 cmFlZmlrLmRlZmF1bHQwDQYJKoZIhvcNAQELBQADggEBAKuh+XJdsaXHoMOVlcbf /ej3LWgTG+dJwuCBPPv5y2c8oR/7nfoysFhFnYyYpCEtTXQKl0QgbA66XNbYKpIK LMAMFe24TrOxo7jxgXv69xE8z5s4gz3YiIXFppzZlWdNQtQ7zCK+hxESkfBySr50 TO6cSBsB7NHXm6xxNpdKn481VwCLSb7MDS9mUz/+yNKx0IZTt505gvBO4SfwqfWw /kUmfcvqY7zqb7T387h7K4Np+Yzdb6QUvtjazyPuukatIWZTZVGHcyNziSaf+oIO I4M3l4iSFowcgsnaQFMxxiQk+ZmRa5FVT8wBPENiwbYMvh3yQooLrvUU8SifmppK UPc= -----END CERTIFICATE----- subject=CN = TRAEFIK DEFAULT CERT issuer=CN = TRAEFIK DEFAULT CERT --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1406 bytes and written 406 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 2048 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: BE5372906F60C66412F1AC89C12144164163CFEE36BCBF1BFACF4E2060556BE1 Session-ID-ctx: Resumption PSK: 85D1361BC37F9A818D3D06FCB191C52DC044ED6E4E7867C8A40FD72F52D4E86F PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - f9 fe a1 ee 08 89 d5 ac-02 8a 9a e7 cf 45 67 16 .............Eg. 0010 - 51 fd a2 b4 11 af ea 64-da 23 fa ff 56 2f 7d 70 Q......d.#..V/}p 0020 - 70 27 3c d3 84 a7 40 e2-10 fd 12 28 e1 63 77 ec p'<...@....(.cw. 0030 - e2 2c ac 5a cd 86 eb f9-fa f6 9f 76 37 c1 c4 8c .,.Z.......v7... 0040 - 4c 45 2c 7d 67 b2 96 c0-11 80 1d e4 9b bc 36 89 LE,}g.........6. 0050 - 0f 50 7a 80 04 d3 fa 58-2e a7 db 9c 39 13 c6 7d .Pz....X....9..} 0060 - 3e f4 f1 d8 82 ca 05 6a-45 >......jE Start Time: 1767237334 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK