CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = TRAEFIK DEFAULT CERT i:CN = TRAEFIK DEFAULT CERT a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Dec 25 19:24:02 2025 GMT; NotAfter: Dec 25 19:24:02 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDXjCCAkagAwIBAgIRAMSPToD4iQTnQi7K9+wFtDQwDQYJKoZIhvcNAQELBQAw HzEdMBsGA1UEAxMUVFJBRUZJSyBERUZBVUxUIENFUlQwHhcNMjUxMjI1MTkyNDAy WhcNMjYxMjI1MTkyNDAyWjAfMR0wGwYDVQQDExRUUkFFRklLIERFRkFVTFQgQ0VS VDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM6j0VkN1/YXdwbuqAUN Ui4tXL7fa6m/DHHb3ZL8YeR7D59CEcwckdlPg748y47txpSfuf7NY9dqCAMMYfn3 WUotq0Tsq62Vt63S1oDILpZBXLiZ+adV0RnQdZUQhc3qkLH7boUsMZh/6k7WUOXm O/zNxGngienm9JIMjm/sN3dcBKk5Ko0WnBMA2u7jFQLTXX9DznK7iAZ1lmh9mpJY noVzK0j+SEbxcCB5c3YtiQ4ibnwJk3+6SiSOwafYUAlwz1g82/EnAkOJ82CtkwX/ ziyVj3tf57vp1EXBZ8sZBr1zMRZlxmG7XhwER2b4Wo/KXmuy2T7SuRn25A6ti35+ ISMCAwEAAaOBlDCBkTAOBgNVHQ8BAf8EBAMCA7gwEwYDVR0lBAwwCgYIKwYBBQUH AwEwDAYDVR0TAQH/BAIwADBcBgNVHREEVTBTglFmYzNiMjI5NDZlYmNjNTFkNzRh ZGY2NzIzYTdmMDFjYy5mYzZmODJkOGVhZTAwYTZhZDVhMWMwNjNiOTAxODAwYi50 cmFlZmlrLmRlZmF1bHQwDQYJKoZIhvcNAQELBQADggEBAKuh+XJdsaXHoMOVlcbf /ej3LWgTG+dJwuCBPPv5y2c8oR/7nfoysFhFnYyYpCEtTXQKl0QgbA66XNbYKpIK LMAMFe24TrOxo7jxgXv69xE8z5s4gz3YiIXFppzZlWdNQtQ7zCK+hxESkfBySr50 TO6cSBsB7NHXm6xxNpdKn481VwCLSb7MDS9mUz/+yNKx0IZTt505gvBO4SfwqfWw /kUmfcvqY7zqb7T387h7K4Np+Yzdb6QUvtjazyPuukatIWZTZVGHcyNziSaf+oIO I4M3l4iSFowcgsnaQFMxxiQk+ZmRa5FVT8wBPENiwbYMvh3yQooLrvUU8SifmppK UPc= -----END CERTIFICATE----- subject=CN = TRAEFIK DEFAULT CERT issuer=CN = TRAEFIK DEFAULT CERT --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1406 bytes and written 404 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 2048 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 09600E142EF2F694E18F249C4BF2E3C0CBFCE398DB02ED937D49E62055C59EEF Session-ID-ctx: Resumption PSK: CE585CB2FBB14F32142BB03D2ED95EAAC1CCE009A01BBEE27EB05D472C4051C1 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - 9f 9d 67 43 c3 f3 e3 9d-ad 65 8f 9b 97 c0 5c 7f ..gC.....e....\. 0010 - 49 7f d6 4a ae bd 11 4b-c7 34 c2 3b fb 7e 13 fe I..J...K.4.;.~.. 0020 - bc ca 8b 57 54 93 04 db-8a 03 9d cd 5c 04 3a f9 ...WT.......\.:. 0030 - 39 f4 bc 1d 63 82 d4 34-9e 95 87 5c 28 ab 1e cc 9...c..4...\(... 0040 - c9 e4 73 6f 57 00 3c e5-a2 d1 93 35 00 88 44 13 ..soW.<....5..D. 0050 - 29 e8 7a b9 4f 68 74 02-6c 0e 30 9c 66 8d 91 5f ).z.Oht.l.0.f.._ 0060 - 5e 50 43 dc 61 d7 c0 74-f1 ^PC.a..t. Start Time: 1767237336 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK