CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = www.ryuk.co.jp i:C = US, O = Let's Encrypt, CN = E6 a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Apr 9 03:01:52 2025 GMT; NotAfter: Jul 8 03:01:51 2025 GMT 1 s:C = US, O = Let's Encrypt, CN = E6 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDrDCCAzGgAwIBAgISBu0PD7bMEHhQYcj+3td9Hsq9MAoGCCqGSM49BAMDMDIx CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF NjAeFw0yNTA0MDkwMzAxNTJaFw0yNTA3MDgwMzAxNTFaMBkxFzAVBgNVBAMTDnd3 dy5yeXVrLmNvLmpwMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEcZWu0FMhroOH dKMR/30dIlE3r7zwQ3YCRbWKBcC/S+yEWKqRLz/fJJJpg6rLLCOQVugOjKFyf5PV N2DdMRCTu6OCAj4wggI6MA4GA1UdDwEB/wQEAwIHgDAdBgNVHSUEFjAUBggrBgEF BQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUmp43hHOLNQ1u v4miYGfhm4MufewwHwYDVR0jBBgwFoAUkydGmAOpUWiOmNbEQkjbI79YlNIwVQYI KwYBBQUHAQEESTBHMCEGCCsGAQUFBzABhhVodHRwOi8vZTYuby5sZW5jci5vcmcw IgYIKwYBBQUHMAKGFmh0dHA6Ly9lNi5pLmxlbmNyLm9yZy8wGQYDVR0RBBIwEIIO d3d3LnJ5dWsuY28uanAwEwYDVR0gBAwwCjAIBgZngQwBAgEwLQYDVR0fBCYwJDAi oCCgHoYcaHR0cDovL2U2LmMubGVuY3Iub3JnLzYyLmNybDCCAQMGCisGAQQB1nkC BAIEgfQEgfEA7wB1AH1ZHhLheCp7HGFnfF79+NCHXBSgTpWeuQMv2Q6MLnm4AAAB lhi0yXAAAAQDAEYwRAIgXZtKZWgkUVWoXIgn0mz3fpYP9olUlZVFN/0q+Bsfr/0C IAOnD3tZfmOcWKmWcTmKl871kYtJ5eu2v2+oGEzeWD3FAHYAzPsPaoVxCWX+lZtT zumyfCLphVwNl422qX5UwP5MDbAAAAGWGLTPJAAABAMARzBFAiEA/52a+x7+QEQN nFOA5ZzDMb+ilsOPLIwxBFzkeeLcFC8CIDJcQYL+BQFkameIZE9qp3zFs4W98Q2B hqCPK0IIhU6aMAoGCCqGSM49BAMDA2kAMGYCMQDTqTw+XDzPSFMuLy+XKyqOvygU W6nEGCOTaUjXRXtBdl/35S4v5vVDCPlh9k8CgQECMQDZzKqaTaWBZ4tgBAw/Q9cb yLKnrxBL0GMp0jcP19IxC0bRbsSKrrCzPAps+pLfQ4U= -----END CERTIFICATE----- subject=CN = www.ryuk.co.jp issuer=C = US, O = Let's Encrypt, CN = E6 --- No client certificate CA names sent Peer signing digest: SHA512 Peer signature type: ECDSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 2579 bytes and written 451 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES256-GCM-SHA384 Session-ID: 09E8F67FC417D48D99623DA8D203DC72F55CB3A5D91D1BB0512D68C7E07B87A7 Session-ID-ctx: Master-Key: 5365E15E9602113BA59824BA16E22D1491180691A6CE66E25527987C4885DFCBCC1E81B24BA1F42B1B79763EADD0A8F6 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket: 0000 - a9 22 3d dc 27 53 69 03-6b 83 d0 4f 6d b5 51 90 ."=.'Si.k..Om.Q. 0010 - bf 93 53 25 38 4a 68 f7-65 3a 7d d7 42 34 9b 83 ..S%8Jh.e:}.B4.. 0020 - 7a 64 0a a7 24 2d 1d 31-d1 aa 04 57 85 1f 3e 35 zd..$-.1...W..>5 0030 - 47 25 18 75 7f 13 f0 b7-04 17 32 69 c7 a0 6f 63 G%.u......2i..oc 0040 - f0 21 e0 28 5f 78 c6 c7-c7 46 aa 26 8a df 8d 92 .!.(_x...F.&.... 0050 - 8c db 7c 57 84 d5 36 1f-2e 89 9e 42 26 d3 9c 37 ..|W..6....B&..7 0060 - 2f 70 5b de 50 a5 ca df-b5 0e 64 05 bd 80 d9 b1 /p[.P.....d..... 0070 - 59 d7 a1 eb 94 40 8f f4-78 61 83 e9 80 bd f1 f5 Y....@..xa...... 0080 - 5a b3 d2 29 58 fb 57 66-db 25 a0 9d 2f 9d c6 85 Z..)X.Wf.%../... 0090 - 09 2d 70 dc 41 47 2a 18-1a 39 0a 25 7d 6b 08 7e .-p.AG*..9.%}k.~ 00a0 - e7 60 32 09 6b a5 b6 9a-a7 58 3b f1 eb 12 fe 94 .`2.k....X;..... 00b0 - da b7 46 b5 b9 83 6a 1b-18 53 c3 0b 73 fe 0b 10 ..F...j..S..s... 00c0 - aa f6 a5 f7 4d 8c 28 ac-ff bc f8 0c 28 fd aa 48 ....M.(.....(..H Start Time: 1746830272 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no ---