CONNECTED(00000003) OCSP response: ====================================== OCSP Response Data: OCSP Response Status: successful (0x0) Response Type: Basic OCSP Response Version: 1 (0x0) Responder Id: C = US, O = Let's Encrypt, CN = E5 Produced At: Nov 18 16:14:00 2024 GMT Responses: Certificate ID: Hash Algorithm: sha1 Issuer Name Hash: 1E11C0C9ACFDA453EF4B2F6A732115604D54ADB9 Issuer Key Hash: 99CD29C3A15826AF7A7A4C845A8F738860B0DFDE Serial Number: 04469BC450C05E81D719A16DAA2F7B8A93C6 Cert Status: good This Update: Nov 18 16:14:00 2024 GMT Next Update: Nov 25 16:13:58 2024 GMT Signature Algorithm: ecdsa-with-SHA384 Signature Value: 30:64:02:30:0b:70:e7:6e:4c:dd:1d:49:d5:9c:9f:a3:c7:43: 90:d1:d6:9f:83:51:d9:a2:4a:ad:c4:61:1f:6e:71:17:d1:e9: 65:4b:7d:b0:ae:39:cd:04:4d:58:ea:e1:f1:d9:cd:aa:02:30: 48:ef:01:6c:92:b0:93:f0:fc:19:dc:29:2f:cb:01:b8:34:c4: 5f:12:7e:23:04:71:e7:1d:79:85:e0:88:a2:bb:74:c5:cf:1e: 7d:d5:bc:4d:ba:61:91:f1:b7:7d:fd:df ====================================== --- Certificate chain 0 s:CN = sample.i-endo.jp i:C = US, O = Let's Encrypt, CN = E5 a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Oct 26 15:36:18 2024 GMT; NotAfter: Jan 24 15:36:17 2025 GMT 1 s:C = US, O = Let's Encrypt, CN = E5 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDgDCCAwagAwIBAgISBEabxFDAXoHXGaFtqi97ipPGMAoGCCqGSM49BAMDMDIx CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF NTAeFw0yNDEwMjYxNTM2MThaFw0yNTAxMjQxNTM2MTdaMBsxGTAXBgNVBAMTEHNh bXBsZS5pLWVuZG8uanAwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT6cgvn3NOY re7XvfCUTPUE6sjlIbQZqu94QF8g8qjPVlnlpz2PIJ8TBbC2WKeVpYkk3slc/ZJf WBO3gKrK0NiFo4ICETCCAg0wDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQGCCsG AQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSh2PcmQ2WB frXuN0MFzbagqbGtSjAfBgNVHSMEGDAWgBSfK1/PPCFPnQS37SssxMZwi9LXDTBV BggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNS5vLmxlbmNyLm9y ZzAiBggrBgEFBQcwAoYWaHR0cDovL2U1LmkubGVuY3Iub3JnLzAbBgNVHREEFDAS ghBzYW1wbGUuaS1lbmRvLmpwMBMGA1UdIAQMMAowCAYGZ4EMAQIBMIIBAwYKKwYB BAHWeQIEAgSB9ASB8QDvAHUA5tIxY0B3jMEQQQbXcbnOwdJA9paEhvu6hzId/R43 jlAAAAGSya4txwAABAMARjBEAiA69sFH2AV0ZkZYTdBpmeMguVGCXu89MFoX+enm YxrswAIgNLZmxMkrACR51v+RmUwjAqSzv1vFXXHuuQCFi3kOgK0AdgDPEVbu1S58 r/OHW9lpLpvpGnFnSrAX7KwB0lt3zsw7CAAAAZLJri4FAAAEAwBHMEUCIGaQznfm UfdTTJaLUZGRibkODkXKGV5KuT6s//NQH2jSAiEA5EGVNMLtgeATB2hWhGf/ElSx lxWiFnOEmXlD5qffw/4wCgYIKoZIzj0EAwMDaAAwZQIwelgxZJKI7cL3zC7USB1n 2jx/IhjDzgJlBXE39dbHtKNQGUh6o9eGm9Mg9J5wuBfBAjEA/BhnfcZM1p02u7MQ pZoFUyFGcqdQYBb9cFO6VnZPJYB9qDWsG0C5BgZGNWpAY+i9 -----END CERTIFICATE----- subject=CN = sample.i-endo.jp issuer=C = US, O = Let's Encrypt, CN = E5 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 2727 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 0234581A7B6B1BEE3C716EC73BCF36DD4E0572B25939F90D8875F1F680BD416E Session-ID-ctx: Resumption PSK: C5868A3B6C983ABCE979D6D429AADD6D3B58C7E18915E465C05DF0315FEF5BEB PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - ff 9a f9 69 39 a9 d3 06-30 f7 1c 9e 3c 3f 77 a0 ...i9...0...