CONNECTED(00000003) OCSP response: ====================================== OCSP Response Data: OCSP Response Status: successful (0x0) Response Type: Basic OCSP Response Version: 1 (0x0) Responder Id: C = US, O = Let's Encrypt, CN = E5 Produced At: Nov 18 03:07:00 2024 GMT Responses: Certificate ID: Hash Algorithm: sha1 Issuer Name Hash: 1E11C0C9ACFDA453EF4B2F6A732115604D54ADB9 Issuer Key Hash: 99CD29C3A15826AF7A7A4C845A8F738860B0DFDE Serial Number: 036C359A2A3F8C4AE1AE40AB062F512A1BE0 Cert Status: good This Update: Nov 18 03:07:00 2024 GMT Next Update: Nov 25 03:06:58 2024 GMT Signature Algorithm: ecdsa-with-SHA384 Signature Value: 30:66:02:31:00:93:d9:b7:ef:58:b3:0d:2a:3f:e9:31:4f:1b: 04:cb:2d:f5:2f:fc:7b:c3:fc:aa:53:24:83:5f:94:38:61:83: cf:46:63:26:18:64:9c:40:b0:1a:88:32:6c:f2:a0:29:eb:02: 31:00:cb:03:78:64:2d:c6:0e:70:5a:87:c4:99:ea:91:de:52: 7b:74:eb:79:83:8c:d0:ec:e8:8d:94:28:cc:33:21:75:b2:8c: 06:bf:a8:f1:7e:c5:dd:83:cf:8b:86:8b:4c:8f ====================================== --- Certificate chain 0 s:CN = www.belberry.jp i:C = US, O = Let's Encrypt, CN = E5 a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Oct 15 09:52:03 2024 GMT; NotAfter: Jan 13 09:52:02 2025 GMT 1 s:C = US, O = Let's Encrypt, CN = E5 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDgDCCAwWgAwIBAgISA2w1mio/jErhrkCrBi9RKhvgMAoGCCqGSM49BAMDMDIx CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF NTAeFw0yNDEwMTUwOTUyMDNaFw0yNTAxMTMwOTUyMDJaMBoxGDAWBgNVBAMTD3d3 dy5iZWxiZXJyeS5qcDBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFyAgOMuYDNC 6AfDkF/S8DInByD5gIqtoJLIGctNfAicG5XcEdu6aWgLOh4wnc5qRcQPkIC/YusD WSHOfLYPIm2jggIRMIICDTAOBgNVHQ8BAf8EBAMCB4AwHQYDVR0lBBYwFAYIKwYB BQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFMe3RLUZLzJp lFpWLXmMXITrv8vAMB8GA1UdIwQYMBaAFJ8rX888IU+dBLftKyzExnCL0tcNMFUG CCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL2U1Lm8ubGVuY3Iub3Jn MCIGCCsGAQUFBzAChhZodHRwOi8vZTUuaS5sZW5jci5vcmcvMBoGA1UdEQQTMBGC D3d3dy5iZWxiZXJyeS5qcDATBgNVHSAEDDAKMAgGBmeBDAECATCCAQQGCisGAQQB 1nkCBAIEgfUEgfIA8AB2AM8RVu7VLnyv84db2Wkum+kacWdKsBfsrAHSW3fOzDsI AAABko/ND9UAAAQDAEcwRQIgInhEwzdKK2iGcZx+e3Pj7YtW9PC3IaC4aHpaaIhN pXoCIQDpNHgCTfhZYaeK4yuLE0eSsarS6/DLT7KhCqhDanlfjwB2AOCSs/wMHcjn aDYf3mG5lk0KUngZinLWcsSwTaVtb1QEAAABko/ND7EAAAQDAEcwRQIhAPsI5kct 0dPMY1fRab18N2W0ql2ms7/AzlUS7AYTZ3VcAiB4SXM8OpveAnraWQMMaKK0sqoU 33+i1dChiXgz37GokDAKBggqhkjOPQQDAwNpADBmAjEA9OUI1cqvc1K9wIaGd8T7 89ltqOM99F4T3jmib8Y7m7JMX4pV0lR8oZ2hUQrvkkDkAjEAmhOueHI0wUKp4yfx 7lDBb7xV1QTE9KDulMehgGa8SknKK4SczEyyG6TRJh2Judzv -----END CERTIFICATE----- subject=CN = www.belberry.jp issuer=C = US, O = Let's Encrypt, CN = E5 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 2728 bytes and written 390 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 3B47F7F2BF3ED0AEF17B95A9F8E0DA57DAA9EB8DD03403B9FCCFF44C9104CA64 Session-ID-ctx: Resumption PSK: C6ACA9F1186BA19354B7DEB8ED218D84D1E03D0CF104142FE16AC9E336D16CBE PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - 06 24 8c ad 56 3b a4 27-fe e4 dd 03 a7 b8 43 9b .$..V;.'......C. 0010 - d6 e9 3c 2f ad 8b 44 bd-ca 19 7a 40 a7 c2 bc f2 ....o'^3.x...*.4 0060 - d0 74 f7 3f 74 e9 93 62-c1 bd 41 bf 85 e4 a1 52 .t.?t..b..A....R 0070 - 77 w Start Time: 1732182040 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK