CONNECTED(00000003) OCSP response: ====================================== OCSP Response Data: OCSP Response Status: successful (0x0) Response Type: Basic OCSP Response Version: 1 (0x0) Responder Id: 0F6BE64BCE3947AEF67E901E79F0309192C85FA3 Produced At: Nov 1 10:01:17 2025 GMT Responses: Certificate ID: Hash Algorithm: sha1 Issuer Name Hash: 331FFE3FFD0B8416284F948D56C07E0392D8F64D Issuer Key Hash: 0F6BE64BCE3947AEF67E901E79F0309192C85FA3 Serial Number: 4C369118FE2561B882169EAC67AC47B4 Cert Status: good This Update: Nov 1 10:01:17 2025 GMT Next Update: Nov 8 10:01:16 2025 GMT Signature Algorithm: ecdsa-with-SHA384 Signature Value: 30:64:02:30:39:0a:ed:2d:1a:b2:9c:fd:f5:fa:dd:cc:aa:4f: 0f:a0:e3:75:c8:f2:3e:5a:33:f0:3a:6b:c6:03:fb:39:a0:97: 3e:e9:0c:b6:ae:83:7c:bc:48:c2:59:0f:91:b6:56:3f:02:30: 6c:d2:7b:62:30:0c:4d:47:a7:1e:f9:d0:1b:ef:64:7b:1a:a1: e2:28:97:d5:53:cc:56:3c:92:04:1b:b3:71:8d:91:6f:0c:62: 5a:2d:9e:54:1c:9f:87:97:b2:b4:35:d1 ====================================== --- Certificate chain 0 s:CN = www.dioid.co.jp i:C = AT, O = ZeroSSL, CN = ZeroSSL ECC Domain Secure Site CA a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Sep 13 00:00:00 2025 GMT; NotAfter: Dec 12 23:59:59 2025 GMT 1 s:C = AT, O = ZeroSSL, CN = ZeroSSL ECC Domain Secure Site CA i:C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust ECC Certification Authority a:PKEY: id-ecPublicKey, 384 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Jan 30 00:00:00 2020 GMT; NotAfter: Jan 29 23:59:59 2030 GMT 2 s:C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust ECC Certification Authority i:C = GB, ST = Greater Manchester, L = Salford, O = Comodo CA Limited, CN = AAA Certificate Services a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA384 v:NotBefore: Mar 12 00:00:00 2019 GMT; NotAfter: Dec 31 23:59:59 2028 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIEADCCA4agAwIBAgIQTDaRGP4lYbiCFp6sZ6xHtDAKBggqhkjOPQQDAzBLMQsw CQYDVQQGEwJBVDEQMA4GA1UEChMHWmVyb1NTTDEqMCgGA1UEAxMhWmVyb1NTTCBF Q0MgRG9tYWluIFNlY3VyZSBTaXRlIENBMB4XDTI1MDkxMzAwMDAwMFoXDTI1MTIx MjIzNTk1OVowGjEYMBYGA1UEAxMPd3d3LmRpb2lkLmNvLmpwMFkwEwYHKoZIzj0C AQYIKoZIzj0DAQcDQgAEQeIdT9vqY9ULL/nomwaneeVUftGSnYHYY+UxOtycu/WA 3i9TA+xst3t+KiYOoVNi5Oa4JUFt1/KHIzeVx/uRUqOCAnswggJ3MB8GA1UdIwQY MBaAFA9r5kvOOUeu9n6QHnnwMJGSyF+jMB0GA1UdDgQWBBTRFzPnrSNMPUw9WtJj G4WMdWaYNjAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAdBgNVHSUEFjAU BggrBgEFBQcDAQYIKwYBBQUHAwIwSQYDVR0gBEIwQDA0BgsrBgEEAbIxAQICTjAl MCMGCCsGAQUFBwIBFhdodHRwczovL3NlY3RpZ28uY29tL0NQUzAIBgZngQwBAgEw gYgGCCsGAQUFBwEBBHwwejBLBggrBgEFBQcwAoY/aHR0cDovL3plcm9zc2wuY3J0 LnNlY3RpZ28uY29tL1plcm9TU0xFQ0NEb21haW5TZWN1cmVTaXRlQ0EuY3J0MCsG CCsGAQUFBzABhh9odHRwOi8vemVyb3NzbC5vY3NwLnNlY3RpZ28uY29tMIIBBAYK KwYBBAHWeQIEAgSB9QSB8gDwAHYA3dzKNJXX4RYF55Uy+sef+D0cUN/bADoUEnYK LKy7yCoAAAGZQSuz/AAABAMARzBFAiEAtOa0vu9iFAWNEb7XTkx8lai8ztR6cVI6 TAGZ/oxQ+g0CIDjnLQGaJbqhUBD5XVJRkvC4aYrk5dMnHzwQMV9kudzBAHYADR28 iUTp9QBVQtctPhRMzEMIKrbqHpTf1wZlfS6G8wEAAAGZQSu0dQAABAMARzBFAiEA 2d7aZ+uWkDdpPiFNTak51h16gMv/VES0WWIos+l4OuACIDvPZmOVE6spR/StVN76 +GjlBTyFTOuadyAm8XoSJ/TlMBoGA1UdEQQTMBGCD3d3dy5kaW9pZC5jby5qcDAK BggqhkjOPQQDAwNoADBlAjEA07M1usPd063XVY1/6lpVkpGm7alTvxNwIvLTYXaR KN7ffLkRpppn2oRxFWFLscGzAjBju3oVBu9Kj8JDz1tqSAhOINp66XHdu5ciiIQo GjdvGL4/rRDDBj4byM++ijeGd+E= -----END CERTIFICATE----- subject=CN = www.dioid.co.jp issuer=C = AT, O = ZeroSSL, CN = ZeroSSL ECC Domain Secure Site CA --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 3604 bytes and written 390 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 0736EB2992CD99A0434DD93C42DB603CBA8C73D06E63AADB366786ECD3C17244 Session-ID-ctx: Resumption PSK: 602C68AC3C939870ED753593AF042389C39A13DF75C34957A61BE269B013ED22 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - 59 48 27 f5 fb e2 49 be-b6 56 cc cf b2 e2 20 23 YH'...I..V.... # 0010 - f0 95 84 69 de 9b 23 ca-a0 74 e3 f5 a9 1d 6b 52 ...i..#..t....kR 0020 - 36 a3 68 ff b3 11 2a 12-66 33 81 b0 34 9c cc 35 6.h...*.f3..4..5 0030 - 84 71 41 e0 9f 3a c7 32-45 30 c2 58 a9 f2 9e 17 .qA..:.2E0.X.... 0040 - 32 c3 d0 61 0b 4d 93 ea-7f 77 ff f5 20 c6 1a 6a 2..a.M...w.. ..j 0050 - 8b 9e d2 3c a7 38 77 45-84 8e 1e d8 b5 16 df 7c ...<.8wE.......| 0060 - a2 7c 7b d4 5f 7b b1 80-c3 61 2f 45 50 ce 12 ee .|{._{...a/EP... 0070 - 77 w Start Time: 1762142947 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK