CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = www.belberry.jp i:C = US, O = Let's Encrypt, CN = E7 a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Oct 10 22:01:38 2025 GMT; NotAfter: Jan 8 22:01:37 2026 GMT 1 s:C = US, O = Let's Encrypt, CN = E7 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDizCCAxGgAwIBAgISBr6ccohwLssxTnLF621GeUmzMAoGCCqGSM49BAMDMDIx CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF NzAeFw0yNTEwMTAyMjAxMzhaFw0yNjAxMDgyMjAxMzdaMBoxGDAWBgNVBAMTD3d3 dy5iZWxiZXJyeS5qcDBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABBaQxQOI+5tO KTt3XZxwm6csct0/aTZfDOELePVFtjhyt4n+Ru4ib4YG9gAbC1GVijqXhS8EIng1 aC9HTsdG0BWjggIdMIICGTAOBgNVHQ8BAf8EBAMCB4AwHQYDVR0lBBYwFAYIKwYB BQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFHr5Xzd/BMRp 4vQCM7IAiK7TAW86MB8GA1UdIwQYMBaAFK5IntyHHUSgb9qi5WB0BHjCnACAMDIG CCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAoYWaHR0cDovL2U3LmkubGVuY3Iub3Jn LzAaBgNVHREEEzARgg93d3cuYmVsYmVycnkuanAwEwYDVR0gBAwwCjAIBgZngQwB AgEwLQYDVR0fBCYwJDAioCCgHoYcaHR0cDovL2U3LmMubGVuY3Iub3JnLzUyLmNy bDCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB2AEmcm2neHXzs/DbezYdkprhbrwqH gBnRVVL76esp3fjDAAABmdBaZAUAAAQDAEcwRQIgLiA0GYAYC1KQCcWK1LU1cIpE 49rAOKTFZdyxI9sMdJECIQD9oaSQmzVej7B6Ffzv7sWWEfuT2jaolir+7xu2NdyO RQB2AJaXZL9VWJet90OHaDcIQnfp8DrV9qTzNm5GpD8PyqnGAAABmdBaZC4AAAQD AEcwRQIgDHv3AMAosKilrM+GoOqmbqAFzpANcE6svdzuizeHy4cCIQDrUEAEkHwW JCZn9xWfuJkAPD2S5QjtbsPiMpz8QJQL8jAKBggqhkjOPQQDAwNoADBlAjB8u5w2 IW8fxzpS8Pvk8wC+RF2VWcf7EBU0moVAfFkhOIimKIvX1tyjyZTMqnKr4lMCMQCZ j6BCgomeRDAXsJjn6P1olGHWbNeZr+tIpejYzB8HVkuXrPIIB6X6AKxri4DkFik= -----END CERTIFICATE----- subject=CN = www.belberry.jp issuer=C = US, O = Let's Encrypt, CN = E7 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 2385 bytes and written 390 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 31B75D48BCB7F721AD52FA39BFD033EF09107093682E5FD964D847D8E43E12FB Session-ID-ctx: Resumption PSK: 5CC40B99B2FF829280A76466167BF64D768955E65C078381CC41F0E932468CAA PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - 0b a2 b1 e8 f8 fc 87 3c-8f b1 cb f9 23 0e 2a e0 .......<....#.*. 0010 - 57 c3 c0 b3 bb f5 52 c5-62 19 f2 1b 4b 92 49 c6 W.....R.b...K.I. 0020 - 36 94 3e 8b a0 8b 03 d0-30 8c cf 7f ff fa c3 31 6.>.....0......1 0030 - 46 11 e4 08 ae fa 58 63-78 be 9a 61 47 fc ad 1a F.....Xcx..aG... 0040 - 51 e4 e4 49 13 8a 64 e8-71 4c 22 b5 ea bc 74 e9 Q..I..d.qL"...t. 0050 - 79 f7 95 02 86 ae 1b 67-36 a9 80 a1 50 61 d7 9d y......g6...Pa.. 0060 - 02 13 91 e8 dd 84 5d 9f-17 ......].. Start Time: 1762143064 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK