CONNECTED(00000003) OCSP response: ====================================== OCSP Response Data: OCSP Response Status: successful (0x0) Response Type: Basic OCSP Response Version: 1 (0x0) Responder Id: C = US, O = Let's Encrypt, CN = E5 Produced At: Nov 18 21:57:00 2024 GMT Responses: Certificate ID: Hash Algorithm: sha1 Issuer Name Hash: 1E11C0C9ACFDA453EF4B2F6A732115604D54ADB9 Issuer Key Hash: 99CD29C3A15826AF7A7A4C845A8F738860B0DFDE Serial Number: 0351758E2ED6A8248436B4A9D27D93C3D198 Cert Status: good This Update: Nov 18 21:57:00 2024 GMT Next Update: Nov 25 21:56:58 2024 GMT Signature Algorithm: ecdsa-with-SHA384 Signature Value: 30:66:02:31:00:a3:ed:f8:29:bf:e9:d7:bb:07:42:6e:94:bd: f9:c2:82:94:bd:fc:85:c9:4b:e0:ce:0d:cd:1a:7a:52:b9:b0: 8e:12:e2:8d:7f:aa:be:5a:3a:10:fc:fa:f7:d3:82:00:37:02: 31:00:ee:22:71:6a:6d:b4:bb:c4:b8:b2:9b:df:36:9d:5b:15: fc:01:cd:7d:51:37:25:55:bf:aa:ec:e5:0f:72:e9:84:8d:90: b7:4c:d5:61:82:5d:60:37:17:67:9c:dd:1c:bb ====================================== --- Certificate chain 0 s:CN = www.sea-mew.jp i:C = US, O = Let's Encrypt, CN = E5 a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384 v:NotBefore: Nov 1 08:38:45 2024 GMT; NotAfter: Jan 30 08:38:44 2025 GMT 1 s:C = US, O = Let's Encrypt, CN = E5 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDfTCCAwOgAwIBAgISA1F1ji7WqCSENrSp0n2Tw9GYMAoGCCqGSM49BAMDMDIx CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF NTAeFw0yNDExMDEwODM4NDVaFw0yNTAxMzAwODM4NDRaMBkxFzAVBgNVBAMTDnd3 dy5zZWEtbWV3LmpwMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEWzQfoOFjy8ok InFqFkR45lgelzG1M/1sIjJDuFbxKMqupIvUbQJs32NaRk3fv7Mfyks5BxDatAq6 QhyX1n8dr6OCAhAwggIMMA4GA1UdDwEB/wQEAwIHgDAdBgNVHSUEFjAUBggrBgEF BQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU25AW1TFEL2HF 63evgovnx1aUZKMwHwYDVR0jBBgwFoAUnytfzzwhT50Et+0rLMTGcIvS1w0wVQYI KwYBBQUHAQEESTBHMCEGCCsGAQUFBzABhhVodHRwOi8vZTUuby5sZW5jci5vcmcw IgYIKwYBBQUHMAKGFmh0dHA6Ly9lNS5pLmxlbmNyLm9yZy8wGQYDVR0RBBIwEIIO d3d3LnNlYS1tZXcuanAwEwYDVR0gBAwwCjAIBgZngQwBAgEwggEEBgorBgEEAdZ5 AgQCBIH1BIHyAPAAdgATSt8atZhCCXgMb+9MepGkFrcjSc5YV2rfrtqnwqvgIgAA AZLnFg5fAAAEAwBHMEUCIQD2S+JSB+N4GVWy3F+jRA4e/sGaQ2hzYE2BeuDyIldO RwIgRbVKdBOEUBD90AgxGyQTi6b9Dd6HbyLRVphA0BA0NKkAdgCi4wrkRe+9rZt+ OO1HZ3dT14JbhJTXK14bLMS5UKRH5wAAAZLnFhVcAAAEAwBHMEUCIEg7T5sX/e9s 0RrruXAmoL3gOz2LM7UKXjfMUXv2/PLbAiEApY4Bls/Dt8GNrbdKRBoGtRtI0eDR xBqEG6tAc9emEWkwCgYIKoZIzj0EAwMDaAAwZQIxALcFyCVSwHRLqlDPmyuuMGUY tlwqdGfDbQtQ2wu3xYBCyz5VKdtIXokrC9VsKTNoZgIwDGdu6Gnbd/vAuSy2TA1a fya/U7VEpPmd23MAaC2/M/hx5A5G1HEx7u7qL6lX0QGY -----END CERTIFICATE----- subject=CN = www.sea-mew.jp issuer=C = US, O = Let's Encrypt, CN = E5 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 2726 bytes and written 389 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: D928D09BB7E42DBD8B07FBEFF6AEDCEBDBE51CA132F9F8689CF9A2D5E48790BD Session-ID-ctx: Resumption PSK: 3BADC41F5345CF024E8A93F6235CD58CEA1E3136A476E0D979A437CC46439D44 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - 7f 69 64 e5 13 69 85 07-7c 80 54 22 34 b2 8a 07 .id..i..|.T"4... 0010 - a2 ce 73 17 d2 f4 bb 51-2b e5 b0 71 db 33 e4 f0 ..s....Q+..q.3.. 0020 - 61 cd b3 3e 1b 06 15 3a-0a bc 41 d1 96 2a 3c 49 a..>...:..A..*