Tests with RSA-PSS private_key and rsae/rsa-pss signature schemes.
Description of problem:
Several tests failed, sanity
& RSA-PSS only
failed with Unexpected closure from peer. In tests with rsa-pss private_key and rsae signature schemes GnuTLS continue in a conversation, but this conversation should be rejected with decrypt_error
or illegal_parameter
(Similar to #645 (closed)).
And in two tests with rsa_pkcs1_sha256/rsa_pss_rsae_sha256
signature scheme and rsa-pss key in CertificateVerify msg, GnuTLS ended with incorrect Alert description (Expected alert description "decrypt_error" does not match received "internal_error").
Version of gnutls used:
Distributor of gnutls (e.g., Ubuntu, Fedora, RHEL)
local compile on Fedora 27
How reproducible:
Steps to Reproduce:
- clone https://github.com/tomato42/tlsfuzzer repo
- run
scripts/test-rsa-pss-sigs-on-certificate-verify.py -k tests/clientRSAPSSKey.pem -c tests/clientRSAPSSCert.pem -n 2 -s "4+1 8+9 8+4 4+3 8+7 5+1 8+10 8+5 5+3 6+1 8+11 8+6 6+3 2+1 2+3"
Actual results:
tlsfuzzer output
sanity ...
Error encountered while processing node <tlsfuzzer.messages.FinishedGenerator object at 0x7f408d6c4278> (child: <tlsfuzzer.expect.ExpectChangeCipherSpec object at 0x7f408d6c4128>) with last message being: <tlslite.messages.Finished object at 0x7f408cbc1c50>
Error while processing
Traceback (most recent call last):
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/runner.py", line 230, in run
self.state.msg_sock.sendMessageBlocking(msg)
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/messagesocket.py", line 186, in sendMessageBlocking
for _ in self.sendMessage(msg):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/messagesocket.py", line 181, in sendMessage
for res in self.flush():
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/messagesocket.py", line 121, in flush
for res in self.sendRecord(msg):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/recordlayer.py", line 608, in sendRecord
for result in self._recordSocket.send(encryptedMessage, padding):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/recordlayer.py", line 100, in send
for result in self._sockSendAll(data):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/recordlayer.py", line 66, in _sockSendAll
bytesSent = self.sock.send(data)
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/bufferedsocket.py", line 34, in send
return self.socket.send(data)
BrokenPipeError: [Errno 32] Broken pipe
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "scripts/test-rsa-pss-sigs-on-certificate-verify.py", line 615, in main
runner.run()
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/runner.py", line 244, in run
raise AssertionError("Unexpected closure from peer")
AssertionError: Unexpected closure from peer
RSA-PSS only ...
Error encountered while processing node <tlsfuzzer.messages.FinishedGenerator object at 0x7f408d6c49e8> (child: <tlsfuzzer.expect.ExpectChangeCipherSpec object at 0x7f408d6c4a20>) with last message being: <tlslite.messages.Finished object at 0x7f408cbc12e8>
Error while processing
Traceback (most recent call last):
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/runner.py", line 230, in run
self.state.msg_sock.sendMessageBlocking(msg)
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/messagesocket.py", line 186, in sendMessageBlocking
for _ in self.sendMessage(msg):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/messagesocket.py", line 181, in sendMessage
for res in self.flush():
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/messagesocket.py", line 121, in flush
for res in self.sendRecord(msg):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/recordlayer.py", line 608, in sendRecord
for result in self._recordSocket.send(encryptedMessage, padding):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/recordlayer.py", line 100, in send
for result in self._sockSendAll(data):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/recordlayer.py", line 66, in _sockSendAll
bytesSent = self.sock.send(data)
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/bufferedsocket.py", line 34, in send
return self.socket.send(data)
BrokenPipeError: [Errno 32] Broken pipe
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "scripts/test-rsa-pss-sigs-on-certificate-verify.py", line 615, in main
runner.run()
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/runner.py", line 244, in run
raise AssertionError("Unexpected closure from peer")
AssertionError: Unexpected closure from peer
check CertificateRequest sigalgs ...
Error encountered while processing node <tlsfuzzer.messages.FinishedGenerator object at 0x7f408d6cf048> (child: <tlsfuzzer.expect.ExpectChangeCipherSpec object at 0x7f408d6cf080>) with last message being: <tlslite.messages.Finished object at 0x7f408cbc1a20>
Error while processing
Traceback (most recent call last):
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/runner.py", line 230, in run
self.state.msg_sock.sendMessageBlocking(msg)
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/messagesocket.py", line 186, in sendMessageBlocking
for _ in self.sendMessage(msg):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/messagesocket.py", line 181, in sendMessage
for res in self.flush():
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/messagesocket.py", line 121, in flush
for res in self.sendRecord(msg):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/recordlayer.py", line 608, in sendRecord
for result in self._recordSocket.send(encryptedMessage, padding):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/recordlayer.py", line 100, in send
for result in self._sockSendAll(data):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/recordlayer.py", line 66, in _sockSendAll
bytesSent = self.sock.send(data)
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/bufferedsocket.py", line 34, in send
return self.socket.send(data)
BrokenPipeError: [Errno 32] Broken pipe
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "scripts/test-rsa-pss-sigs-on-certificate-verify.py", line 615, in main
runner.run()
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/runner.py", line 244, in run
raise AssertionError("Unexpected closure from peer")
AssertionError: Unexpected closure from peer
rsa_pss_rsae_sha256 in CertificateVerify with rsa-pss key ...
Error encountered while processing node <tlsfuzzer.expect.ExpectAlert object at 0x7f408d6cf6d8> (child: <tlsfuzzer.expect.ExpectClose object at 0x7f408d6cf748>) with last message being: <tlslite.messages.Message object at 0x7f408cbc19e8>
Error while processing
Traceback (most recent call last):
File "scripts/test-rsa-pss-sigs-on-certificate-verify.py", line 615, in main
runner.run()
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/runner.py", line 217, in run
RecordHeader2)))
AssertionError: Unexpected message from peer: ChangeCipherSpec()
rsa_pss_rsae_sha384 in CertificateVerify with rsa-pss key ...
Error encountered while processing node <tlsfuzzer.expect.ExpectAlert object at 0x7f408d6cfba8> (child: <tlsfuzzer.expect.ExpectClose object at 0x7f408d6cfc18>) with last message being: <tlslite.messages.Message object at 0x7f408cbd1f60>
Error while processing
Traceback (most recent call last):
File "scripts/test-rsa-pss-sigs-on-certificate-verify.py", line 615, in main
runner.run()
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/runner.py", line 217, in run
RecordHeader2)))
AssertionError: Unexpected message from peer: ChangeCipherSpec()
rsa_pss_rsae_sha512 in CertificateVerify with rsa-pss key ...
Error encountered while processing node <tlsfuzzer.expect.ExpectAlert object at 0x7f408d6d40b8> (child: <tlsfuzzer.expect.ExpectClose object at 0x7f408d6d4128>) with last message being: <tlslite.messages.Message object at 0x7f408cbc1550>
Error while processing
Traceback (most recent call last):
File "scripts/test-rsa-pss-sigs-on-certificate-verify.py", line 615, in main
runner.run()
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/runner.py", line 217, in run
RecordHeader2)))
AssertionError: Unexpected message from peer: ChangeCipherSpec()
rsa_pss_pss_sha256 in CertificateVerify ...
OK
rsa_pss_pss_sha384 in CertificateVerify ...
OK
rsa_pss_pss_sha512 in CertificateVerify ...
OK
rsa_pss_pss_sha256 in CertificateVerify with incorrect salt len ...
OK
rsa_pss_pss_sha384 in CertificateVerify with incorrect salt len ...
OK
rsa_pss_pss_sha512 in CertificateVerify with incorrect salt len ...
OK
rsa_pkcs1_sha256 signature in CertificateVerify with rsa-pss key ...
Error encountered while processing node <tlsfuzzer.expect.ExpectAlert object at 0x7f408cbbe400> (child: <tlsfuzzer.expect.ExpectClose object at 0x7f408cbbe470>) with last message being: <tlslite.messages.Message object at 0x7f408cbd1b70>
Error while processing
Traceback (most recent call last):
File "scripts/test-rsa-pss-sigs-on-certificate-verify.py", line 615, in main
runner.run()
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/runner.py", line 219, in run
node.process(self.state, msg)
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/expect.py", line 1273, in process
raise AssertionError(problem_desc)
AssertionError: Expected alert description "decrypt_error" does not match received "internal_error"
rsa_pss_rsae_sha256 signature in CertificateVerify with rsa_pkcs1_sha256 id ...
Error encountered while processing node <tlsfuzzer.expect.ExpectAlert object at 0x7f408cbbe978> (child: <tlsfuzzer.expect.ExpectClose object at 0x7f408cbbe9e8>) with last message being: <tlslite.messages.Message object at 0x7f408cbd1d30>
Error while processing
Traceback (most recent call last):
File "scripts/test-rsa-pss-sigs-on-certificate-verify.py", line 615, in main
runner.run()
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/runner.py", line 219, in run
node.process(self.state, msg)
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/expect.py", line 1273, in process
raise AssertionError(problem_desc)
AssertionError: Expected alert description "decrypt_error" does not match received "internal_error"
short sig with rsa_pss_rsae_sha256 id ...
OK
malformed rsa-pss in CertificateVerify - xor 0x1 at 0 ...
OK
malformed rsa-pss in CertificateVerify - xor 0x2 at 0 ...
OK
sanity ...
Error encountered while processing node <tlsfuzzer.messages.FinishedGenerator object at 0x7f408d6c4278> (child: <tlsfuzzer.expect.ExpectChangeCipherSpec object at 0x7f408d6c4128>) with last message being: <tlslite.messages.Finished object at 0x7f408cbc11d0>
Error while processing
Traceback (most recent call last):
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/runner.py", line 230, in run
self.state.msg_sock.sendMessageBlocking(msg)
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/messagesocket.py", line 186, in sendMessageBlocking
for _ in self.sendMessage(msg):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/messagesocket.py", line 181, in sendMessage
for res in self.flush():
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/messagesocket.py", line 121, in flush
for res in self.sendRecord(msg):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/recordlayer.py", line 608, in sendRecord
for result in self._recordSocket.send(encryptedMessage, padding):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/recordlayer.py", line 100, in send
for result in self._sockSendAll(data):
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/recordlayer.py", line 66, in _sockSendAll
bytesSent = self.sock.send(data)
File "/home/rkolcun/tls_repo/myvenv/lib/python3.6/site-packages/tlslite/bufferedsocket.py", line 34, in send
return self.socket.send(data)
BrokenPipeError: [Errno 32] Broken pipe
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "scripts/test-rsa-pss-sigs-on-certificate-verify.py", line 615, in main
runner.run()
File "/home/rkolcun/tls_repo/tlsfuzzer/tlsfuzzer/runner.py", line 244, in run
raise AssertionError("Unexpected closure from peer")
AssertionError: Unexpected closure from peer
version: 2
Test end
successful: 9
failed: 9
'check CertificateRequest sigalgs'
'RSA-PSS only'
'rsa_pkcs1_sha256 signature in CertificateVerify with rsa-pss key'
'rsa_pss_rsae_sha256 in CertificateVerify with rsa-pss key'
'rsa_pss_rsae_sha256 signature in CertificateVerify with rsa_pkcs1_sha256 id'
'rsa_pss_rsae_sha384 in CertificateVerify with rsa-pss key'
'rsa_pss_rsae_sha512 in CertificateVerify with rsa-pss key'
'sanity'
'sanity'
GnuTLS output
Processed 1 CA certificate(s).
|<3>| ASSERT: x509_ext.c[gnutls_subject_alt_names_get]:110
|<3>| ASSERT: x509.c[get_alt_name]:1812
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: x509_ext.c[gnutls_subject_alt_names_get]:110
|<3>| ASSERT: x509.c[get_alt_name]:1812
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: x509_ext.c[gnutls_subject_alt_names_get]:110
|<3>| ASSERT: x509.c[get_alt_name]:1812
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: x509_ext.c[gnutls_subject_alt_names_get]:110
|<3>| ASSERT: x509.c[get_alt_name]:1812
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: attributes.c[_x509_parse_attribute]:103
|<3>| ASSERT: attributes.c[_x509_parse_attribute]:174
|<3>| ASSERT: x509_ext.c[gnutls_subject_alt_names_get]:110
|<3>| ASSERT: x509.c[get_alt_name]:1812
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
HTTP Server listening on IPv4 0.0.0.0 port 4433...done
HTTP Server listening on IPv6 :: port 4433...done
|<5>| REC[0x227e7f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55598 on Mon Dec 10 16:53:09 2018
|<5>| REC[0x227e7f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 109
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 109
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 109
|<4>| HSK[0x227e7f0]: CLIENT HELLO (1) was received. Length 105[105], frag offset 0, frag length: 105, sequence: 0
|<4>| HSK[0x227e7f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x227e7f0]: Parsing extension 'Signature Algorithms/13' (24 bytes)
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x227e7f0]: rcvd signature algo (6.1) RSA-SHA512
|<4>| EXT[0x227e7f0]: rcvd signature algo (5.1) RSA-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (4.1) RSA-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (3.1) (null)
|<4>| EXT[0x227e7f0]: rcvd signature algo (2.1) RSA-SHA1
|<4>| HSK[0x227e7f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x227e7f0]: Requested server name: ''
|<4>| HSK[0x227e7f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x227e7f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected version TLS1.2
|<4>| HSK[0x227e7f0]: Safe renegotiation succeeded
|<4>| HSK[0x227e7f0]: SessionID: e14dd31e988471b8464bda7a4925c3db263266f00f43cf38793e8a1a174d103f
|<4>| EXT[0x227e7f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x227e7f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x227e7f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x227e7f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x227e7f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x227e7f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x227e7f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x227e7f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x227e7f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x227e7f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x227e7f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x227e7f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x227e7f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x227e7f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x227e7f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x227e7f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x227e7f0]: verify cert vrfy: using RSA-SHA256
|<4>| have key: RSA-PSS/6, with sign RSA-SHA256/6
|<3>| ASSERT: pubkey.c[pubkey_supports_sig]:1908
|<3>| ASSERT: pubkey.c[gnutls_pubkey_verify_data2]:1764
|<3>| ASSERT: tls-sig.c[_gnutls_handshake_verify_crt_vrfy12]:373
|<3>| ASSERT: cert.c[_gnutls_proc_cert_client_crt_vrfy]:1052
|<3>| ASSERT: handshake.c[handshake_server]:3425
Error in handshake: The signature is incompatible with the public key.
|<5>| REC: Sending Alert[2|80] - Internal error
|<5>| REC[0x227e7f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[6] Alert(21) in epoch 0 and length: 7
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: End of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #0 freed
|<5>| REC[0x227e7f0]: Epoch #1 freed
|<5>| REC[0x227e7f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55600 on Mon Dec 10 16:53:09 2018
|<5>| REC[0x227e7f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x227e7f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x227e7f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x227e7f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x227e7f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x227e7f0]: Requested server name: ''
|<4>| HSK[0x227e7f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x227e7f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected version TLS1.2
|<4>| HSK[0x227e7f0]: Safe renegotiation succeeded
|<4>| HSK[0x227e7f0]: SessionID: d7ab01a3dd96776b1e3045189029262d9db7a8ab45b52b9b7352a684c4427e97
|<4>| EXT[0x227e7f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x227e7f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x227e7f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x227e7f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x227e7f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x227e7f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x227e7f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x227e7f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x227e7f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x227e7f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x227e7f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x227e7f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x227e7f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x227e7f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x227e7f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x227e7f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x227e7f0]: verify cert vrfy: using RSA-SHA256
|<4>| have key: RSA-PSS/6, with sign RSA-SHA256/6
|<3>| ASSERT: pubkey.c[pubkey_supports_sig]:1908
|<3>| ASSERT: pubkey.c[gnutls_pubkey_verify_data2]:1764
|<3>| ASSERT: tls-sig.c[_gnutls_handshake_verify_crt_vrfy12]:373
|<3>| ASSERT: cert.c[_gnutls_proc_cert_client_crt_vrfy]:1052
|<3>| ASSERT: handshake.c[handshake_server]:3425
Error in handshake: The signature is incompatible with the public key.
|<5>| REC: Sending Alert[2|80] - Internal error
|<5>| REC[0x227e7f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[6] Alert(21) in epoch 0 and length: 7
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: End of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #0 freed
|<5>| REC[0x227e7f0]: Epoch #1 freed
|<5>| REC[0x227e7f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55602 on Mon Dec 10 16:53:09 2018
|<5>| REC[0x227e7f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x227e7f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x227e7f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x227e7f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x227e7f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x227e7f0]: Requested server name: ''
|<4>| HSK[0x227e7f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x227e7f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected version TLS1.2
|<4>| HSK[0x227e7f0]: Safe renegotiation succeeded
|<4>| HSK[0x227e7f0]: SessionID: cda80ffe52abf95b5f05a59d0e9bc14b8aece9b6e9ad99bb03263b5c0012678e
|<4>| EXT[0x227e7f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x227e7f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x227e7f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x227e7f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x227e7f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x227e7f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x227e7f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x227e7f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x227e7f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x227e7f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x227e7f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x227e7f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x227e7f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x227e7f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x227e7f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x227e7f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x227e7f0]: verify cert vrfy: using RSA-SHA256
|<4>| have key: RSA-PSS/6, with sign RSA-SHA256/6
|<3>| ASSERT: pubkey.c[pubkey_supports_sig]:1908
|<3>| ASSERT: pubkey.c[gnutls_pubkey_verify_data2]:1764
|<3>| ASSERT: tls-sig.c[_gnutls_handshake_verify_crt_vrfy12]:373
|<3>| ASSERT: cert.c[_gnutls_proc_cert_client_crt_vrfy]:1052
|<3>| ASSERT: handshake.c[handshake_server]:3425
Error in handshake: The signature is incompatible with the public key.
|<5>| REC: Sending Alert[2|80] - Internal error
|<5>| REC[0x227e7f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[6] Alert(21) in epoch 0 and length: 7
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: End of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #0 freed
|<5>| REC[0x227e7f0]: Epoch #1 freed
|<5>| REC[0x227e7f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55604 on Mon Dec 10 16:53:09 2018
|<5>| REC[0x227e7f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x227e7f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x227e7f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x227e7f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x227e7f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x227e7f0]: Requested server name: ''
|<4>| HSK[0x227e7f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x227e7f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected version TLS1.2
|<4>| HSK[0x227e7f0]: Safe renegotiation succeeded
|<4>| HSK[0x227e7f0]: SessionID: 50243ed8be3bb03f0a00ac0fca4c147d104c8b6e9a0d792f9a7215d3c42f8c77
|<4>| EXT[0x227e7f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x227e7f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x227e7f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x227e7f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x227e7f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x227e7f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x227e7f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x227e7f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x227e7f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x227e7f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x227e7f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x227e7f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x227e7f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x227e7f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x227e7f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x227e7f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x227e7f0]: verify cert vrfy: using RSA-PSS-RSAE-SHA256
|<5>| REC[0x227e7f0]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
|<5>| REC[0x227e7f0]: Expected Packet ChangeCipherSpec(20)
|<5>| REC[0x227e7f0]: Received Packet ChangeCipherSpec(20) with length: 1
|<5>| REC[0x227e7f0]: Decrypted Packet[4] ChangeCipherSpec(20) with length: 1
|<5>| REC[0x227e7f0]: Initializing epoch #1
|<5>| REC[0x227e7f0]: Epoch #1 ready
|<4>| HSK[0x227e7f0]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 1, length: 64
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 64
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 16
|<4>| HSK[0x227e7f0]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
|<4>| HSK[0x227e7f0]: recording tls-unique CB (recv)
|<4>| REC[0x227e7f0]: Sent ChangeCipherSpec
|<4>| HSK[0x227e7f0]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Initializing internal [write] cipher sessions
|<4>| HSK[0x227e7f0]: FINISHED was queued [16 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[6] ChangeCipherSpec(20) in epoch 0 and length: 6
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 69
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #0 freed
|<5>| REC[0x227e7f0]: End of epoch cleanup
- Description: (TLS1.2)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-128-CBC)-(SHA1
- Session ID: 50:24:3E:D8:BE:3B:B0:3F:0A:00:AC:0F:CA:4C:14:7D:10:4C:8B:6E:9A:0D:79:2F:9A:72:15:D3:C4:2F:8C:77
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
- Certificate type: X.509
- Got a certificate list of 1 certificates.
- Certificate[0] info:
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_issuer_unique_id]:3946
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_subject_unique_id]:3896
|<3>| ASSERT: common.c[_gnutls_copy_data]:1608
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_signature]:1104
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
- X.509 Certificate Information:
Version: 3
Serial Number (hex): 16a1727c2dbc7d68a420622109a587eb5e324bf8
Issuer: CN=localhost
Validity:
Not Before: Wed Oct 24 08:52:16 UTC 2018
Not After: Fri Nov 23 08:52:16 UTC 2018
Subject: CN=localhost
Subject Public Key Algorithm: RSA-PSS
Algorithm Security Level: Medium (2048 bits)
Modulus (bits 2048):
00:f7:e4:43:55:5b:a7:58:02:e1:1a:85:1b:24:26:52
1a:f3:05:ba:f8:b5:b4:0a:fd:d1:63:16:65:ea:61:64
b6:82:27:6f:d9:46:94:0b:31:12:b6:50:2d:53:4f:b8
ad:9a:fb:ad:ce:c4:d3:2a:3d:2d:a4:32:1d:2d:ae:9e
d6:4c:2e:b4:e6:da:a5:d8:72:c6:b6:2a:92:6c:ef:45
c6:50:a7:4f:05:2c:ac:00:45:95:26:97:3d:2e:ff:df
66:9f:6e:4b:41:e9:ff:f5:ba:67:b3:a2:5a:23:04:d7
c4:89:92:e0:01:d0:17:ea:3c:14:c0:92:fc:5d:4c:d6
bf:8c:9c:b4:5d:29:3f:2e:05:77:1b:e2:dc:f6:2b:6c
bf:50:60:9a:7d:fc:d7:b7:4c:5b:f3:42:2f:f1:5e:1b
03:66:03:e6:79:06:ea:ae:c3:fe:2b:d2:a6:a9:35:3f
d5:4c:b9:3d:66:10:2f:74:6c:e9:eb:a6:51:58:5f:a0
bb:76:83:8a:91:4a:43:f1:5c:25:bd:a0:26:0d:f9:c8
70:4e:0e:7c:2c:de:d0:da:4c:b9:e8:57:3e:fe:42:b4
94:fa:76:fa:84:61:76:f9:76:8a:c3:81:fe:2d:a3:8d
02:20:0c:6d:f8:bb:9f:e4:f1:d2:be:97:87:45:3e:bf
89
Exponent (bits 24):
01:00:01
Extensions:
Subject Key Identifier (not critical):
63ac305551baad1e70e9b2926c0b674cc07dec41
Authority Key Identifier (not critical):
63ac305551baad1e70e9b2926c0b674cc07dec41
Basic Constraints (critical):
Certificate Authority (CA): TRUE
Signature Algorithm: RSA-PSS-SHA256
Salt Length: 222
Signature:
a2:0b:ef:5d:56:5c:8a:18:7a:bb:0b:35:b4:0f:61:c1
c0:1f:81:38:ba:2d:dc:cf:bf:1b:76:16:b1:bf:00:85
4f:e1:84:83:12:41:57:eb:3c:f0:54:62:50:77:d7:9d
1c:44:14:9a:2a:75:a0:95:57:24:bc:91:04:2c:6e:d2
e1:08:ee:12:74:49:f0:05:db:4f:8b:c6:42:e1:e1:0d
4d:f6:83:48:8d:f6:1a:92:30:17:92:03:2f:f1:3f:3f
37:41:56:b2:a5:b7:89:a8:6f:dd:50:57:bd:a1:23:c2
b9:7a:28:8e:71:27:18:10:1a:ef:31:b5:bc:ff:2b:31
1f:a4:d0:de:24:b5:be:62:5b:ae:1f:ea:4d:4e:d6:ac
8c:b7:b4:bd:af:18:3f:e4:06:82:76:5c:3c:5a:1b:2a
8a:02:72:26:7e:ba:07:f5:7b:76:de:48:5f:eb:69:72
b2:1c:ad:13:5d:de:52:49:f5:0f:67:df:b7:cd:b6:97
06:2d:58:19:de:e2:7c:0b:e2:ba:96:66:17:4e:93:53
4c:f0:dc:6b:9e:7e:5f:5f:27:7e:df:4c:9c:5f:5c:94
13:c2:c4:d6:3a:03:77:33:41:03:21:12:73:f5:72:81
1f:1c:94:32:10:47:d0:12:a8:3e:53:ee:65:6e:a2:2c
Other Information:
Fingerprint:
sha1:6b6e34ba4acd2b3a85702a3c86a8e99d796b667f
sha256:cf88d89066870a7250faf6c7b69545f6ae4c6f70bbb6d45b027038eb690ff82d
Public Key ID:
sha1:fcf39f82b530df6d612fa79b50841007f368cb58
sha256:d88c985675a40686d01ee68374c3746da4a513b6712decf0cdf16ea847e7c009
Public Key PIN:
pin-sha256:2IyYVnWkBobQHuaDdMN0baSlE7ZxLezwzfFuqEfnwAk=
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
- Ephemeral EC Diffie-Hellman parameters
- Using curve: SECP256R1
- Curve size: 256 bits
- Version: TLS1.2
- Key Exchange: ECDHE-RSA
- Server Signature: RSA-PSS-SHA256
- Client Signature: RSA-PSS-RSAE-SHA256
- Cipher: AES-128-CBC
- MAC: SHA1
|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_get2]:93
|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_is_checked]:627
- Options: safe renegotiation,
|<3>| ASSERT: srtp.c[gnutls_srtp_get_selected_profile]:320
|<3>| ASSERT: alpn.c[gnutls_alpn_get_selected_protocol]:255
- Channel binding 'tls-unique': 58b85d2c8ccf548f821adcd7
|<3>| ASSERT: buffers.c[_gnutls_stream_read]:369
|<3>| ASSERT: buffers.c[_gnutls_io_read_buffered]:589
|<3>| ASSERT: record.c[recv_headers]:1169
|<3>| ASSERT: record.c[_gnutls_recv_in_buffers]:1300
|<3>| ASSERT: record.c[_gnutls_recv_int]:1709
Error while receiving data
|<5>| REC: Sending Alert[2|80] - Internal error
|<5>| REC[0x227e7f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<2>| WRITE: -1 returned from 0x5, errno: 32
|<3>| ASSERT: buffers.c[errno_to_gerr]:230
|<3>| ASSERT: buffers.c[_gnutls_io_write_flush]:722
|<3>| ASSERT: record.c[_gnutls_send_tlen_int]:572
Error: Error in the pull function.
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: End of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #1 freed
|<5>| REC[0x227e7f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55606 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x227e7f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x227e7f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x227e7f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x227e7f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x227e7f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x227e7f0]: Requested server name: ''
|<4>| HSK[0x227e7f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x227e7f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected version TLS1.2
|<4>| HSK[0x227e7f0]: Safe renegotiation succeeded
|<4>| HSK[0x227e7f0]: SessionID: ab9070ca8dda4480b8e0390a1abfbb74d065620873b3b1c8ad62330995489a78
|<4>| EXT[0x227e7f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x227e7f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x227e7f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x227e7f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x227e7f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x227e7f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x227e7f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x227e7f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x227e7f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x227e7f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x227e7f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x227e7f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x227e7f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x227e7f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x227e7f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x227e7f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x227e7f0]: verify cert vrfy: using RSA-PSS-RSAE-SHA384
|<5>| REC[0x227e7f0]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
|<5>| REC[0x227e7f0]: Expected Packet ChangeCipherSpec(20)
|<5>| REC[0x227e7f0]: Received Packet ChangeCipherSpec(20) with length: 1
|<5>| REC[0x227e7f0]: Decrypted Packet[4] ChangeCipherSpec(20) with length: 1
|<5>| REC[0x227e7f0]: Initializing epoch #1
|<5>| REC[0x227e7f0]: Epoch #1 ready
|<4>| HSK[0x227e7f0]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 1, length: 64
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 64
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 16
|<4>| HSK[0x227e7f0]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
|<4>| HSK[0x227e7f0]: recording tls-unique CB (recv)
|<4>| REC[0x227e7f0]: Sent ChangeCipherSpec
|<4>| HSK[0x227e7f0]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Initializing internal [write] cipher sessions
|<4>| HSK[0x227e7f0]: FINISHED was queued [16 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[6] ChangeCipherSpec(20) in epoch 0 and length: 6
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 69
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #0 freed
|<5>| REC[0x227e7f0]: End of epoch cleanup
- Description: (TLS1.2)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-128-CBC)-(SHA1
- Session ID: AB:90:70:CA:8D:DA:44:80:B8:E0:39:0A:1A:BF:BB:74:D0:65:62:08:73:B3:B1:C8:AD:62:33:09:95:48:9A:78
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
- Certificate type: X.509
- Got a certificate list of 1 certificates.
- Certificate[0] info:
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_issuer_unique_id]:3946
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_subject_unique_id]:3896
|<3>| ASSERT: common.c[_gnutls_copy_data]:1608
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_signature]:1104
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
- X.509 Certificate Information:
Version: 3
Serial Number (hex): 16a1727c2dbc7d68a420622109a587eb5e324bf8
Issuer: CN=localhost
Validity:
Not Before: Wed Oct 24 08:52:16 UTC 2018
Not After: Fri Nov 23 08:52:16 UTC 2018
Subject: CN=localhost
Subject Public Key Algorithm: RSA-PSS
Algorithm Security Level: Medium (2048 bits)
Modulus (bits 2048):
00:f7:e4:43:55:5b:a7:58:02:e1:1a:85:1b:24:26:52
1a:f3:05:ba:f8:b5:b4:0a:fd:d1:63:16:65:ea:61:64
b6:82:27:6f:d9:46:94:0b:31:12:b6:50:2d:53:4f:b8
ad:9a:fb:ad:ce:c4:d3:2a:3d:2d:a4:32:1d:2d:ae:9e
d6:4c:2e:b4:e6:da:a5:d8:72:c6:b6:2a:92:6c:ef:45
c6:50:a7:4f:05:2c:ac:00:45:95:26:97:3d:2e:ff:df
66:9f:6e:4b:41:e9:ff:f5:ba:67:b3:a2:5a:23:04:d7
c4:89:92:e0:01:d0:17:ea:3c:14:c0:92:fc:5d:4c:d6
bf:8c:9c:b4:5d:29:3f:2e:05:77:1b:e2:dc:f6:2b:6c
bf:50:60:9a:7d:fc:d7:b7:4c:5b:f3:42:2f:f1:5e:1b
03:66:03:e6:79:06:ea:ae:c3:fe:2b:d2:a6:a9:35:3f
d5:4c:b9:3d:66:10:2f:74:6c:e9:eb:a6:51:58:5f:a0
bb:76:83:8a:91:4a:43:f1:5c:25:bd:a0:26:0d:f9:c8
70:4e:0e:7c:2c:de:d0:da:4c:b9:e8:57:3e:fe:42:b4
94:fa:76:fa:84:61:76:f9:76:8a:c3:81:fe:2d:a3:8d
02:20:0c:6d:f8:bb:9f:e4:f1:d2:be:97:87:45:3e:bf
89
Exponent (bits 24):
01:00:01
Extensions:
Subject Key Identifier (not critical):
63ac305551baad1e70e9b2926c0b674cc07dec41
Authority Key Identifier (not critical):
63ac305551baad1e70e9b2926c0b674cc07dec41
Basic Constraints (critical):
Certificate Authority (CA): TRUE
Signature Algorithm: RSA-PSS-SHA256
Salt Length: 222
Signature:
a2:0b:ef:5d:56:5c:8a:18:7a:bb:0b:35:b4:0f:61:c1
c0:1f:81:38:ba:2d:dc:cf:bf:1b:76:16:b1:bf:00:85
4f:e1:84:83:12:41:57:eb:3c:f0:54:62:50:77:d7:9d
1c:44:14:9a:2a:75:a0:95:57:24:bc:91:04:2c:6e:d2
e1:08:ee:12:74:49:f0:05:db:4f:8b:c6:42:e1:e1:0d
4d:f6:83:48:8d:f6:1a:92:30:17:92:03:2f:f1:3f:3f
37:41:56:b2:a5:b7:89:a8:6f:dd:50:57:bd:a1:23:c2
b9:7a:28:8e:71:27:18:10:1a:ef:31:b5:bc:ff:2b:31
1f:a4:d0:de:24:b5:be:62:5b:ae:1f:ea:4d:4e:d6:ac
8c:b7:b4:bd:af:18:3f:e4:06:82:76:5c:3c:5a:1b:2a
8a:02:72:26:7e:ba:07:f5:7b:76:de:48:5f:eb:69:72
b2:1c:ad:13:5d:de:52:49:f5:0f:67:df:b7:cd:b6:97
06:2d:58:19:de:e2:7c:0b:e2:ba:96:66:17:4e:93:53
4c:f0:dc:6b:9e:7e:5f:5f:27:7e:df:4c:9c:5f:5c:94
13:c2:c4:d6:3a:03:77:33:41:03:21:12:73:f5:72:81
1f:1c:94:32:10:47:d0:12:a8:3e:53:ee:65:6e:a2:2c
Other Information:
Fingerprint:
sha1:6b6e34ba4acd2b3a85702a3c86a8e99d796b667f
sha256:cf88d89066870a7250faf6c7b69545f6ae4c6f70bbb6d45b027038eb690ff82d
Public Key ID:
sha1:fcf39f82b530df6d612fa79b50841007f368cb58
sha256:d88c985675a40686d01ee68374c3746da4a513b6712decf0cdf16ea847e7c009
Public Key PIN:
pin-sha256:2IyYVnWkBobQHuaDdMN0baSlE7ZxLezwzfFuqEfnwAk=
-----BEGIN CERTIFICATE-----
MIIDaTCCAiCgAwIBAgIUFqFyfC28fWikIGIhCaWH614yS/gwPgYJKoZIhvcNAQEK
MDGgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogQC
AgDeMBQxEjAQBgNVBAMMCWxvY2FsaG9zdDAeFw0xODEwMjQwODUyMTZaFw0xODEx
MjMwODUyMTZaMBQxEjAQBgNVBAMMCWxvY2FsaG9zdDCCASAwCwYJKoZIhvcNAQEK
A4IBDwAwggEKAoIBAQD35ENVW6dYAuEahRskJlIa8wW6+LW0Cv3RYxZl6mFktoIn
b9lGlAsxErZQLVNPuK2a+63OxNMqPS2kMh0trp7WTC605tql2HLGtiqSbO9FxlCn
TwUsrABFlSaXPS7/32afbktB6f/1umezolojBNfEiZLgAdAX6jwUwJL8XUzWv4yc
tF0pPy4Fdxvi3PYrbL9QYJp9/Ne3TFvzQi/xXhsDZgPmeQbqrsP+K9KmqTU/1Uy5
PWYQL3Rs6eumUVhfoLt2g4qRSkPxXCW9oCYN+chwTg58LN7Q2ky56Fc+/kK0lPp2
+oRhdvl2isOB/i2jjQIgDG34u5/k8dK+l4dFPr+JAgMBAAGjUzBRMB0GA1UdDgQW
BBRjrDBVUbqtHnDpspJsC2dMwH3sQTAfBgNVHSMEGDAWgBRjrDBVUbqtHnDpspJs
C2dMwH3sQTAPBgNVHRMBAf8EBTADAQH/MD4GCSqGSIb3DQEBCjAxoA0wCwYJYIZI
AWUDBAIBoRowGAYJKoZIhvcNAQEIMAsGCWCGSAFlAwQCAaIEAgIA3gOCAQEAogvv
XVZcihh6uws1tA9hwcAfgTi6LdzPvxt2FrG/AIVP4YSDEkFX6zzwVGJQd9edHEQU
mip1oJVXJLyRBCxu0uEI7hJ0SfAF20+LxkLh4Q1N9oNIjfYakjAXkgMv8T8/N0FW
sqW3iahv3VBXvaEjwrl6KI5xJxgQGu8xtbz/KzEfpNDeJLW+YluuH+pNTtasjLe0
va8YP+QGgnZcPFobKooCciZ+ugf1e3beSF/raXKyHK0TXd5SSfUPZ9+3zbaXBi1Y
Gd7ifAviupZmF06TU0zw3Guefl9fJ37fTJxfXJQTwsTWOgN3M0EDIRJz9XKBHxyU
MhBH0BKoPlPuZW6iLA==
-----END CERTIFICATE-----
- Ephemeral EC Diffie-Hellman parameters
- Using curve: SECP256R1
- Curve size: 256 bits
- Version: TLS1.2
- Key Exchange: ECDHE-RSA
- Server Signature: RSA-PSS-SHA256
- Client Signature: RSA-PSS-RSAE-SHA384
- Cipher: AES-128-CBC
- MAC: SHA1
|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_get2]:93
|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_is_checked]:627
- Options: safe renegotiation,
|<3>| ASSERT: srtp.c[gnutls_srtp_get_selected_profile]:320
|<3>| ASSERT: alpn.c[gnutls_alpn_get_selected_protocol]:255
- Channel binding 'tls-unique': 6823123752cc3a17be058b8b
|<3>| ASSERT: buffers.c[_gnutls_stream_read]:369
|<3>| ASSERT: buffers.c[_gnutls_io_read_buffered]:589
|<3>| ASSERT: record.c[recv_headers]:1169
|<3>| ASSERT: record.c[_gnutls_recv_in_buffers]:1300
|<3>| ASSERT: record.c[_gnutls_recv_int]:1709
Error while receiving data
|<5>| REC: Sending Alert[2|80] - Internal error
|<5>| REC[0x227e7f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<2>| WRITE: -1 returned from 0x5, errno: 32
|<3>| ASSERT: buffers.c[errno_to_gerr]:230
|<3>| ASSERT: buffers.c[_gnutls_io_write_flush]:722
|<3>| ASSERT: record.c[_gnutls_send_tlen_int]:572
Error: Error in the pull function.
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: End of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #1 freed
|<5>| REC[0x227e7f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55608 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x227e7f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x227e7f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x227e7f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x227e7f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x227e7f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x227e7f0]: Requested server name: ''
|<4>| HSK[0x227e7f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x227e7f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected version TLS1.2
|<4>| HSK[0x227e7f0]: Safe renegotiation succeeded
|<4>| HSK[0x227e7f0]: SessionID: e22606b2de0407ddc80f02edcfa9339ab641f3b4dbf1a7965272cf217d52e621
|<4>| EXT[0x227e7f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x227e7f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x227e7f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x227e7f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x227e7f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x227e7f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x227e7f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x227e7f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x227e7f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x227e7f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x227e7f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x227e7f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x227e7f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x227e7f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x227e7f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x227e7f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x227e7f0]: verify cert vrfy: using RSA-PSS-RSAE-SHA512
|<5>| REC[0x227e7f0]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
|<5>| REC[0x227e7f0]: Expected Packet ChangeCipherSpec(20)
|<5>| REC[0x227e7f0]: Received Packet ChangeCipherSpec(20) with length: 1
|<5>| REC[0x227e7f0]: Decrypted Packet[4] ChangeCipherSpec(20) with length: 1
|<5>| REC[0x227e7f0]: Initializing epoch #1
|<5>| REC[0x227e7f0]: Epoch #1 ready
|<4>| HSK[0x227e7f0]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 1, length: 64
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 64
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 16
|<4>| HSK[0x227e7f0]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
|<4>| HSK[0x227e7f0]: recording tls-unique CB (recv)
|<4>| REC[0x227e7f0]: Sent ChangeCipherSpec
|<4>| HSK[0x227e7f0]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Initializing internal [write] cipher sessions
|<4>| HSK[0x227e7f0]: FINISHED was queued [16 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[6] ChangeCipherSpec(20) in epoch 0 and length: 6
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 69
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #0 freed
|<5>| REC[0x227e7f0]: End of epoch cleanup
- Description: (TLS1.2)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-128-CBC)-(SHA1
- Session ID: E2:26:06:B2:DE:04:07:DD:C8:0F:02:ED:CF:A9:33:9A:B6:41:F3:B4:DB:F1:A7:96:52:72:CF:21:7D:52:E6:21
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
- Certificate type: X.509
- Got a certificate list of 1 certificates.
- Certificate[0] info:
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_issuer_unique_id]:3946
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_subject_unique_id]:3896
|<3>| ASSERT: common.c[_gnutls_copy_data]:1608
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_signature]:1104
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
- X.509 Certificate Information:
Version: 3
Serial Number (hex): 16a1727c2dbc7d68a420622109a587eb5e324bf8
Issuer: CN=localhost
Validity:
Not Before: Wed Oct 24 08:52:16 UTC 2018
Not After: Fri Nov 23 08:52:16 UTC 2018
Subject: CN=localhost
Subject Public Key Algorithm: RSA-PSS
Algorithm Security Level: Medium (2048 bits)
Modulus (bits 2048):
00:f7:e4:43:55:5b:a7:58:02:e1:1a:85:1b:24:26:52
1a:f3:05:ba:f8:b5:b4:0a:fd:d1:63:16:65:ea:61:64
b6:82:27:6f:d9:46:94:0b:31:12:b6:50:2d:53:4f:b8
ad:9a:fb:ad:ce:c4:d3:2a:3d:2d:a4:32:1d:2d:ae:9e
d6:4c:2e:b4:e6:da:a5:d8:72:c6:b6:2a:92:6c:ef:45
c6:50:a7:4f:05:2c:ac:00:45:95:26:97:3d:2e:ff:df
66:9f:6e:4b:41:e9:ff:f5:ba:67:b3:a2:5a:23:04:d7
c4:89:92:e0:01:d0:17:ea:3c:14:c0:92:fc:5d:4c:d6
bf:8c:9c:b4:5d:29:3f:2e:05:77:1b:e2:dc:f6:2b:6c
bf:50:60:9a:7d:fc:d7:b7:4c:5b:f3:42:2f:f1:5e:1b
03:66:03:e6:79:06:ea:ae:c3:fe:2b:d2:a6:a9:35:3f
d5:4c:b9:3d:66:10:2f:74:6c:e9:eb:a6:51:58:5f:a0
bb:76:83:8a:91:4a:43:f1:5c:25:bd:a0:26:0d:f9:c8
70:4e:0e:7c:2c:de:d0:da:4c:b9:e8:57:3e:fe:42:b4
94:fa:76:fa:84:61:76:f9:76:8a:c3:81:fe:2d:a3:8d
02:20:0c:6d:f8:bb:9f:e4:f1:d2:be:97:87:45:3e:bf
89
Exponent (bits 24):
01:00:01
Extensions:
Subject Key Identifier (not critical):
63ac305551baad1e70e9b2926c0b674cc07dec41
Authority Key Identifier (not critical):
63ac305551baad1e70e9b2926c0b674cc07dec41
Basic Constraints (critical):
Certificate Authority (CA): TRUE
Signature Algorithm: RSA-PSS-SHA256
Salt Length: 222
Signature:
a2:0b:ef:5d:56:5c:8a:18:7a:bb:0b:35:b4:0f:61:c1
c0:1f:81:38:ba:2d:dc:cf:bf:1b:76:16:b1:bf:00:85
4f:e1:84:83:12:41:57:eb:3c:f0:54:62:50:77:d7:9d
1c:44:14:9a:2a:75:a0:95:57:24:bc:91:04:2c:6e:d2
e1:08:ee:12:74:49:f0:05:db:4f:8b:c6:42:e1:e1:0d
4d:f6:83:48:8d:f6:1a:92:30:17:92:03:2f:f1:3f:3f
37:41:56:b2:a5:b7:89:a8:6f:dd:50:57:bd:a1:23:c2
b9:7a:28:8e:71:27:18:10:1a:ef:31:b5:bc:ff:2b:31
1f:a4:d0:de:24:b5:be:62:5b:ae:1f:ea:4d:4e:d6:ac
8c:b7:b4:bd:af:18:3f:e4:06:82:76:5c:3c:5a:1b:2a
8a:02:72:26:7e:ba:07:f5:7b:76:de:48:5f:eb:69:72
b2:1c:ad:13:5d:de:52:49:f5:0f:67:df:b7:cd:b6:97
06:2d:58:19:de:e2:7c:0b:e2:ba:96:66:17:4e:93:53
4c:f0:dc:6b:9e:7e:5f:5f:27:7e:df:4c:9c:5f:5c:94
13:c2:c4:d6:3a:03:77:33:41:03:21:12:73:f5:72:81
1f:1c:94:32:10:47:d0:12:a8:3e:53:ee:65:6e:a2:2c
Other Information:
Fingerprint:
sha1:6b6e34ba4acd2b3a85702a3c86a8e99d796b667f
sha256:cf88d89066870a7250faf6c7b69545f6ae4c6f70bbb6d45b027038eb690ff82d
Public Key ID:
sha1:fcf39f82b530df6d612fa79b50841007f368cb58
sha256:d88c985675a40686d01ee68374c3746da4a513b6712decf0cdf16ea847e7c009
Public Key PIN:
pin-sha256:2IyYVnWkBobQHuaDdMN0baSlE7ZxLezwzfFuqEfnwAk=
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
- Ephemeral EC Diffie-Hellman parameters
- Using curve: SECP256R1
- Curve size: 256 bits
- Version: TLS1.2
- Key Exchange: ECDHE-RSA
- Server Signature: RSA-PSS-SHA256
- Client Signature: RSA-PSS-RSAE-SHA512
- Cipher: AES-128-CBC
- MAC: SHA1
|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_get2]:93
|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_is_checked]:627
- Options: safe renegotiation,
|<3>| ASSERT: srtp.c[gnutls_srtp_get_selected_profile]:320
|<3>| ASSERT: alpn.c[gnutls_alpn_get_selected_protocol]:255
- Channel binding 'tls-unique': ee708b778e88242c36a51249
|<3>| ASSERT: buffers.c[_gnutls_stream_read]:369
|<3>| ASSERT: buffers.c[_gnutls_io_read_buffered]:589
|<3>| ASSERT: record.c[recv_headers]:1169
|<3>| ASSERT: record.c[_gnutls_recv_in_buffers]:1300
|<3>| ASSERT: record.c[_gnutls_recv_int]:1709
Error while receiving data
|<5>| REC: Sending Alert[2|80] - Internal error
|<5>| REC[0x227e7f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<2>| WRITE: -1 returned from 0x5, errno: 32
|<3>| ASSERT: buffers.c[errno_to_gerr]:230
|<3>| ASSERT: buffers.c[_gnutls_io_write_flush]:722
|<3>| ASSERT: record.c[_gnutls_send_tlen_int]:572
Error: Error in the pull function.
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: End of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #1 freed
|<5>| REC[0x227e7f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55610 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x227e7f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x227e7f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x227e7f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x227e7f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x227e7f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x227e7f0]: Requested server name: ''
|<4>| HSK[0x227e7f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x227e7f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected version TLS1.2
|<4>| HSK[0x227e7f0]: Safe renegotiation succeeded
|<4>| HSK[0x227e7f0]: SessionID: 3dcfce4f4fb50e661f2349484bf072abb1f27dee7f89493a050c8f26141ec307
|<4>| EXT[0x227e7f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x227e7f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x227e7f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x227e7f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x227e7f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x227e7f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x227e7f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x227e7f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x227e7f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x227e7f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x227e7f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x227e7f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x227e7f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x227e7f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x227e7f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x227e7f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x227e7f0]: verify cert vrfy: using RSA-PSS-SHA256
|<5>| REC[0x227e7f0]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
|<5>| REC[0x227e7f0]: Expected Packet ChangeCipherSpec(20)
|<5>| REC[0x227e7f0]: Received Packet ChangeCipherSpec(20) with length: 1
|<5>| REC[0x227e7f0]: Decrypted Packet[4] ChangeCipherSpec(20) with length: 1
|<5>| REC[0x227e7f0]: Initializing epoch #1
|<5>| REC[0x227e7f0]: Epoch #1 ready
|<4>| HSK[0x227e7f0]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 1, length: 64
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 64
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 16
|<4>| HSK[0x227e7f0]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
|<4>| HSK[0x227e7f0]: recording tls-unique CB (recv)
|<4>| REC[0x227e7f0]: Sent ChangeCipherSpec
|<4>| HSK[0x227e7f0]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Initializing internal [write] cipher sessions
|<4>| HSK[0x227e7f0]: FINISHED was queued [16 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[6] ChangeCipherSpec(20) in epoch 0 and length: 6
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 69
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #0 freed
|<5>| REC[0x227e7f0]: End of epoch cleanup
- Description: (TLS1.2)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-128-CBC)-(SHA1
- Session ID: 3D:CF:CE:4F:4F:B5:0E:66:1F:23:49:48:4B:F0:72:AB:B1:F2:7D:EE:7F:89:49:3A:05:0C:8F:26:14:1E:C3:07
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
- Certificate type: X.509
- Got a certificate list of 1 certificates.
- Certificate[0] info:
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_issuer_unique_id]:3946
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_subject_unique_id]:3896
|<3>| ASSERT: common.c[_gnutls_copy_data]:1608
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_signature]:1104
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
- X.509 Certificate Information:
Version: 3
Serial Number (hex): 16a1727c2dbc7d68a420622109a587eb5e324bf8
Issuer: CN=localhost
Validity:
Not Before: Wed Oct 24 08:52:16 UTC 2018
Not After: Fri Nov 23 08:52:16 UTC 2018
Subject: CN=localhost
Subject Public Key Algorithm: RSA-PSS
Algorithm Security Level: Medium (2048 bits)
Modulus (bits 2048):
00:f7:e4:43:55:5b:a7:58:02:e1:1a:85:1b:24:26:52
1a:f3:05:ba:f8:b5:b4:0a:fd:d1:63:16:65:ea:61:64
b6:82:27:6f:d9:46:94:0b:31:12:b6:50:2d:53:4f:b8
ad:9a:fb:ad:ce:c4:d3:2a:3d:2d:a4:32:1d:2d:ae:9e
d6:4c:2e:b4:e6:da:a5:d8:72:c6:b6:2a:92:6c:ef:45
c6:50:a7:4f:05:2c:ac:00:45:95:26:97:3d:2e:ff:df
66:9f:6e:4b:41:e9:ff:f5:ba:67:b3:a2:5a:23:04:d7
c4:89:92:e0:01:d0:17:ea:3c:14:c0:92:fc:5d:4c:d6
bf:8c:9c:b4:5d:29:3f:2e:05:77:1b:e2:dc:f6:2b:6c
bf:50:60:9a:7d:fc:d7:b7:4c:5b:f3:42:2f:f1:5e:1b
03:66:03:e6:79:06:ea:ae:c3:fe:2b:d2:a6:a9:35:3f
d5:4c:b9:3d:66:10:2f:74:6c:e9:eb:a6:51:58:5f:a0
bb:76:83:8a:91:4a:43:f1:5c:25:bd:a0:26:0d:f9:c8
70:4e:0e:7c:2c:de:d0:da:4c:b9:e8:57:3e:fe:42:b4
94:fa:76:fa:84:61:76:f9:76:8a:c3:81:fe:2d:a3:8d
02:20:0c:6d:f8:bb:9f:e4:f1:d2:be:97:87:45:3e:bf
89
Exponent (bits 24):
01:00:01
Extensions:
Subject Key Identifier (not critical):
63ac305551baad1e70e9b2926c0b674cc07dec41
Authority Key Identifier (not critical):
63ac305551baad1e70e9b2926c0b674cc07dec41
Basic Constraints (critical):
Certificate Authority (CA): TRUE
Signature Algorithm: RSA-PSS-SHA256
Salt Length: 222
Signature:
a2:0b:ef:5d:56:5c:8a:18:7a:bb:0b:35:b4:0f:61:c1
c0:1f:81:38:ba:2d:dc:cf:bf:1b:76:16:b1:bf:00:85
4f:e1:84:83:12:41:57:eb:3c:f0:54:62:50:77:d7:9d
1c:44:14:9a:2a:75:a0:95:57:24:bc:91:04:2c:6e:d2
e1:08:ee:12:74:49:f0:05:db:4f:8b:c6:42:e1:e1:0d
4d:f6:83:48:8d:f6:1a:92:30:17:92:03:2f:f1:3f:3f
37:41:56:b2:a5:b7:89:a8:6f:dd:50:57:bd:a1:23:c2
b9:7a:28:8e:71:27:18:10:1a:ef:31:b5:bc:ff:2b:31
1f:a4:d0:de:24:b5:be:62:5b:ae:1f:ea:4d:4e:d6:ac
8c:b7:b4:bd:af:18:3f:e4:06:82:76:5c:3c:5a:1b:2a
8a:02:72:26:7e:ba:07:f5:7b:76:de:48:5f:eb:69:72
b2:1c:ad:13:5d:de:52:49:f5:0f:67:df:b7:cd:b6:97
06:2d:58:19:de:e2:7c:0b:e2:ba:96:66:17:4e:93:53
4c:f0:dc:6b:9e:7e:5f:5f:27:7e:df:4c:9c:5f:5c:94
13:c2:c4:d6:3a:03:77:33:41:03:21:12:73:f5:72:81
1f:1c:94:32:10:47:d0:12:a8:3e:53:ee:65:6e:a2:2c
Other Information:
Fingerprint:
sha1:6b6e34ba4acd2b3a85702a3c86a8e99d796b667f
sha256:cf88d89066870a7250faf6c7b69545f6ae4c6f70bbb6d45b027038eb690ff82d
Public Key ID:
sha1:fcf39f82b530df6d612fa79b50841007f368cb58
sha256:d88c985675a40686d01ee68374c3746da4a513b6712decf0cdf16ea847e7c009
Public Key PIN:
pin-sha256:2IyYVnWkBobQHuaDdMN0baSlE7ZxLezwzfFuqEfnwAk=
-----BEGIN CERTIFICATE-----
MIIDaTCCAiCgAwIBAgIUFqFyfC28fWikIGIhCaWH614yS/gwPgYJKoZIhvcNAQEK
MDGgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogQC
AgDeMBQxEjAQBgNVBAMMCWxvY2FsaG9zdDAeFw0xODEwMjQwODUyMTZaFw0xODEx
MjMwODUyMTZaMBQxEjAQBgNVBAMMCWxvY2FsaG9zdDCCASAwCwYJKoZIhvcNAQEK
A4IBDwAwggEKAoIBAQD35ENVW6dYAuEahRskJlIa8wW6+LW0Cv3RYxZl6mFktoIn
b9lGlAsxErZQLVNPuK2a+63OxNMqPS2kMh0trp7WTC605tql2HLGtiqSbO9FxlCn
TwUsrABFlSaXPS7/32afbktB6f/1umezolojBNfEiZLgAdAX6jwUwJL8XUzWv4yc
tF0pPy4Fdxvi3PYrbL9QYJp9/Ne3TFvzQi/xXhsDZgPmeQbqrsP+K9KmqTU/1Uy5
PWYQL3Rs6eumUVhfoLt2g4qRSkPxXCW9oCYN+chwTg58LN7Q2ky56Fc+/kK0lPp2
+oRhdvl2isOB/i2jjQIgDG34u5/k8dK+l4dFPr+JAgMBAAGjUzBRMB0GA1UdDgQW
BBRjrDBVUbqtHnDpspJsC2dMwH3sQTAfBgNVHSMEGDAWgBRjrDBVUbqtHnDpspJs
C2dMwH3sQTAPBgNVHRMBAf8EBTADAQH/MD4GCSqGSIb3DQEBCjAxoA0wCwYJYIZI
AWUDBAIBoRowGAYJKoZIhvcNAQEIMAsGCWCGSAFlAwQCAaIEAgIA3gOCAQEAogvv
XVZcihh6uws1tA9hwcAfgTi6LdzPvxt2FrG/AIVP4YSDEkFX6zzwVGJQd9edHEQU
mip1oJVXJLyRBCxu0uEI7hJ0SfAF20+LxkLh4Q1N9oNIjfYakjAXkgMv8T8/N0FW
sqW3iahv3VBXvaEjwrl6KI5xJxgQGu8xtbz/KzEfpNDeJLW+YluuH+pNTtasjLe0
va8YP+QGgnZcPFobKooCciZ+ugf1e3beSF/raXKyHK0TXd5SSfUPZ9+3zbaXBi1Y
Gd7ifAviupZmF06TU0zw3Guefl9fJ37fTJxfXJQTwsTWOgN3M0EDIRJz9XKBHxyU
MhBH0BKoPlPuZW6iLA==
-----END CERTIFICATE-----
- Ephemeral EC Diffie-Hellman parameters
- Using curve: SECP256R1
- Curve size: 256 bits
- Version: TLS1.2
- Key Exchange: ECDHE-RSA
- Server Signature: RSA-PSS-SHA256
- Client Signature: RSA-PSS-SHA256
- Cipher: AES-128-CBC
- MAC: SHA1
|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_get2]:93
|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_is_checked]:627
- Options: safe renegotiation,
|<3>| ASSERT: srtp.c[gnutls_srtp_get_selected_profile]:320
|<3>| ASSERT: alpn.c[gnutls_alpn_get_selected_protocol]:255
- Channel binding 'tls-unique': 721e3767646ec4b0cf19ff8f
|<3>| ASSERT: buffers.c[_gnutls_io_read_buffered]:589
|<3>| ASSERT: record.c[_gnutls_recv_int]:1709
|<5>| REC[0x227e7f0]: SSL 3.3 Application Data packet received. Epoch 1, length: 64
|<5>| REC[0x227e7f0]: Expected Packet Application Data(23)
|<5>| REC[0x227e7f0]: Received Packet Application Data(23) with length: 64
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Application Data(23) with length: 16
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_issuer_unique_id]:3946
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_subject_unique_id]:3896
|<3>| ASSERT: common.c[_gnutls_copy_data]:1608
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_signature]:1104
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<5>| REC[0x227e7f0]: Preparing Packet Application Data(23) with length: 3592 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 3637
|<3>| ASSERT: buffers.c[_gnutls_io_write_flush]:696
|<5>| REC: Sending Alert[1|0] - Close notify
|<5>| REC[0x227e7f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Alert(21) in epoch 1 and length: 53
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: End of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #1 freed
|<5>| REC[0x227e7f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55612 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x227e7f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x227e7f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x227e7f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x227e7f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x227e7f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x227e7f0]: Requested server name: ''
|<4>| HSK[0x227e7f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x227e7f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected version TLS1.2
|<4>| HSK[0x227e7f0]: Safe renegotiation succeeded
|<4>| HSK[0x227e7f0]: SessionID: bc3c77c810abe54d723111baa0f8e57c3cf0dd1c85ef558444d3aa2caef84112
|<4>| EXT[0x227e7f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x227e7f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x227e7f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x227e7f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x227e7f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x227e7f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x227e7f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x227e7f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x227e7f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x227e7f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x227e7f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x227e7f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x227e7f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x227e7f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x227e7f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x227e7f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x227e7f0]: verify cert vrfy: using RSA-PSS-SHA384
|<5>| REC[0x227e7f0]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
|<5>| REC[0x227e7f0]: Expected Packet ChangeCipherSpec(20)
|<5>| REC[0x227e7f0]: Received Packet ChangeCipherSpec(20) with length: 1
|<5>| REC[0x227e7f0]: Decrypted Packet[4] ChangeCipherSpec(20) with length: 1
|<5>| REC[0x227e7f0]: Initializing epoch #1
|<5>| REC[0x227e7f0]: Epoch #1 ready
|<4>| HSK[0x227e7f0]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 1, length: 64
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 64
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 16
|<4>| HSK[0x227e7f0]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
|<4>| HSK[0x227e7f0]: recording tls-unique CB (recv)
|<4>| REC[0x227e7f0]: Sent ChangeCipherSpec
|<4>| HSK[0x227e7f0]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Initializing internal [write] cipher sessions
|<4>| HSK[0x227e7f0]: FINISHED was queued [16 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[6] ChangeCipherSpec(20) in epoch 0 and length: 6
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 69
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #0 freed
|<5>| REC[0x227e7f0]: End of epoch cleanup
- Description: (TLS1.2)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-128-CBC)-(SHA1
- Session ID: BC:3C:77:C8:10:AB:E5:4D:72:31:11:BA:A0:F8:E5:7C:3C:F0:DD:1C:85:EF:55:84:44:D3:AA:2C:AE:F8:41:12
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
- Certificate type: X.509
- Got a certificate list of 1 certificates.
- Certificate[0] info:
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_issuer_unique_id]:3946
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_subject_unique_id]:3896
|<3>| ASSERT: common.c[_gnutls_copy_data]:1608
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_signature]:1104
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
- X.509 Certificate Information:
Version: 3
Serial Number (hex): 16a1727c2dbc7d68a420622109a587eb5e324bf8
Issuer: CN=localhost
Validity:
Not Before: Wed Oct 24 08:52:16 UTC 2018
Not After: Fri Nov 23 08:52:16 UTC 2018
Subject: CN=localhost
Subject Public Key Algorithm: RSA-PSS
Algorithm Security Level: Medium (2048 bits)
Modulus (bits 2048):
00:f7:e4:43:55:5b:a7:58:02:e1:1a:85:1b:24:26:52
1a:f3:05:ba:f8:b5:b4:0a:fd:d1:63:16:65:ea:61:64
b6:82:27:6f:d9:46:94:0b:31:12:b6:50:2d:53:4f:b8
ad:9a:fb:ad:ce:c4:d3:2a:3d:2d:a4:32:1d:2d:ae:9e
d6:4c:2e:b4:e6:da:a5:d8:72:c6:b6:2a:92:6c:ef:45
c6:50:a7:4f:05:2c:ac:00:45:95:26:97:3d:2e:ff:df
66:9f:6e:4b:41:e9:ff:f5:ba:67:b3:a2:5a:23:04:d7
c4:89:92:e0:01:d0:17:ea:3c:14:c0:92:fc:5d:4c:d6
bf:8c:9c:b4:5d:29:3f:2e:05:77:1b:e2:dc:f6:2b:6c
bf:50:60:9a:7d:fc:d7:b7:4c:5b:f3:42:2f:f1:5e:1b
03:66:03:e6:79:06:ea:ae:c3:fe:2b:d2:a6:a9:35:3f
d5:4c:b9:3d:66:10:2f:74:6c:e9:eb:a6:51:58:5f:a0
bb:76:83:8a:91:4a:43:f1:5c:25:bd:a0:26:0d:f9:c8
70:4e:0e:7c:2c:de:d0:da:4c:b9:e8:57:3e:fe:42:b4
94:fa:76:fa:84:61:76:f9:76:8a:c3:81:fe:2d:a3:8d
02:20:0c:6d:f8:bb:9f:e4:f1:d2:be:97:87:45:3e:bf
89
Exponent (bits 24):
01:00:01
Extensions:
Subject Key Identifier (not critical):
63ac305551baad1e70e9b2926c0b674cc07dec41
Authority Key Identifier (not critical):
63ac305551baad1e70e9b2926c0b674cc07dec41
Basic Constraints (critical):
Certificate Authority (CA): TRUE
Signature Algorithm: RSA-PSS-SHA256
Salt Length: 222
Signature:
a2:0b:ef:5d:56:5c:8a:18:7a:bb:0b:35:b4:0f:61:c1
c0:1f:81:38:ba:2d:dc:cf:bf:1b:76:16:b1:bf:00:85
4f:e1:84:83:12:41:57:eb:3c:f0:54:62:50:77:d7:9d
1c:44:14:9a:2a:75:a0:95:57:24:bc:91:04:2c:6e:d2
e1:08:ee:12:74:49:f0:05:db:4f:8b:c6:42:e1:e1:0d
4d:f6:83:48:8d:f6:1a:92:30:17:92:03:2f:f1:3f:3f
37:41:56:b2:a5:b7:89:a8:6f:dd:50:57:bd:a1:23:c2
b9:7a:28:8e:71:27:18:10:1a:ef:31:b5:bc:ff:2b:31
1f:a4:d0:de:24:b5:be:62:5b:ae:1f:ea:4d:4e:d6:ac
8c:b7:b4:bd:af:18:3f:e4:06:82:76:5c:3c:5a:1b:2a
8a:02:72:26:7e:ba:07:f5:7b:76:de:48:5f:eb:69:72
b2:1c:ad:13:5d:de:52:49:f5:0f:67:df:b7:cd:b6:97
06:2d:58:19:de:e2:7c:0b:e2:ba:96:66:17:4e:93:53
4c:f0:dc:6b:9e:7e:5f:5f:27:7e:df:4c:9c:5f:5c:94
13:c2:c4:d6:3a:03:77:33:41:03:21:12:73:f5:72:81
1f:1c:94:32:10:47:d0:12:a8:3e:53:ee:65:6e:a2:2c
Other Information:
Fingerprint:
sha1:6b6e34ba4acd2b3a85702a3c86a8e99d796b667f
sha256:cf88d89066870a7250faf6c7b69545f6ae4c6f70bbb6d45b027038eb690ff82d
Public Key ID:
sha1:fcf39f82b530df6d612fa79b50841007f368cb58
sha256:d88c985675a40686d01ee68374c3746da4a513b6712decf0cdf16ea847e7c009
Public Key PIN:
pin-sha256:2IyYVnWkBobQHuaDdMN0baSlE7ZxLezwzfFuqEfnwAk=
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
- Ephemeral EC Diffie-Hellman parameters
- Using curve: SECP256R1
- Curve size: 256 bits
- Version: TLS1.2
- Key Exchange: ECDHE-RSA
- Server Signature: RSA-PSS-SHA256
- Client Signature: RSA-PSS-SHA384
- Cipher: AES-128-CBC
- MAC: SHA1
|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_get2]:93
|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_is_checked]:627
- Options: safe renegotiation,
|<3>| ASSERT: srtp.c[gnutls_srtp_get_selected_profile]:320
|<3>| ASSERT: alpn.c[gnutls_alpn_get_selected_protocol]:255
- Channel binding 'tls-unique': d0adffe9d085861c275c004f
|<3>| ASSERT: buffers.c[_gnutls_io_read_buffered]:589
|<3>| ASSERT: record.c[_gnutls_recv_int]:1709
|<5>| REC[0x227e7f0]: SSL 3.3 Application Data packet received. Epoch 1, length: 64
|<5>| REC[0x227e7f0]: Expected Packet Application Data(23)
|<5>| REC[0x227e7f0]: Received Packet Application Data(23) with length: 64
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Application Data(23) with length: 16
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_issuer_unique_id]:3946
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_subject_unique_id]:3896
|<3>| ASSERT: common.c[_gnutls_copy_data]:1608
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_signature]:1104
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<5>| REC[0x227e7f0]: Preparing Packet Application Data(23) with length: 3592 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 3637
|<3>| ASSERT: buffers.c[_gnutls_io_write_flush]:696
|<5>| REC: Sending Alert[1|0] - Close notify
|<5>| REC[0x227e7f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Alert(21) in epoch 1 and length: 53
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: End of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #1 freed
|<5>| REC[0x227e7f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55614 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x227e7f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x227e7f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x227e7f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x227e7f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x227e7f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x227e7f0]: Requested server name: ''
|<4>| HSK[0x227e7f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x227e7f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected version TLS1.2
|<4>| HSK[0x227e7f0]: Safe renegotiation succeeded
|<4>| HSK[0x227e7f0]: SessionID: 854c936ce556d91fc938d74603c382171e5307b777e93d4bbc268d1e60f5be9c
|<4>| EXT[0x227e7f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x227e7f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x227e7f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x227e7f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x227e7f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x227e7f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x227e7f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x227e7f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x227e7f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x227e7f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x227e7f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x227e7f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x227e7f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x227e7f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x227e7f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x227e7f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x227e7f0]: verify cert vrfy: using RSA-PSS-SHA512
|<5>| REC[0x227e7f0]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
|<5>| REC[0x227e7f0]: Expected Packet ChangeCipherSpec(20)
|<5>| REC[0x227e7f0]: Received Packet ChangeCipherSpec(20) with length: 1
|<5>| REC[0x227e7f0]: Decrypted Packet[4] ChangeCipherSpec(20) with length: 1
|<5>| REC[0x227e7f0]: Initializing epoch #1
|<5>| REC[0x227e7f0]: Epoch #1 ready
|<4>| HSK[0x227e7f0]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 1, length: 64
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 64
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 16
|<4>| HSK[0x227e7f0]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
|<4>| HSK[0x227e7f0]: recording tls-unique CB (recv)
|<4>| REC[0x227e7f0]: Sent ChangeCipherSpec
|<4>| HSK[0x227e7f0]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Initializing internal [write] cipher sessions
|<4>| HSK[0x227e7f0]: FINISHED was queued [16 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[6] ChangeCipherSpec(20) in epoch 0 and length: 6
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 69
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #0 freed
|<5>| REC[0x227e7f0]: End of epoch cleanup
- Description: (TLS1.2)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-128-CBC)-(SHA1
- Session ID: 85:4C:93:6C:E5:56:D9:1F:C9:38:D7:46:03:C3:82:17:1E:53:07:B7:77:E9:3D:4B:BC:26:8D:1E:60:F5:BE:9C
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
- Certificate type: X.509
- Got a certificate list of 1 certificates.
- Certificate[0] info:
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_issuer_unique_id]:3946
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_subject_unique_id]:3896
|<3>| ASSERT: common.c[_gnutls_copy_data]:1608
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_signature]:1104
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
- X.509 Certificate Information:
Version: 3
Serial Number (hex): 16a1727c2dbc7d68a420622109a587eb5e324bf8
Issuer: CN=localhost
Validity:
Not Before: Wed Oct 24 08:52:16 UTC 2018
Not After: Fri Nov 23 08:52:16 UTC 2018
Subject: CN=localhost
Subject Public Key Algorithm: RSA-PSS
Algorithm Security Level: Medium (2048 bits)
Modulus (bits 2048):
00:f7:e4:43:55:5b:a7:58:02:e1:1a:85:1b:24:26:52
1a:f3:05:ba:f8:b5:b4:0a:fd:d1:63:16:65:ea:61:64
b6:82:27:6f:d9:46:94:0b:31:12:b6:50:2d:53:4f:b8
ad:9a:fb:ad:ce:c4:d3:2a:3d:2d:a4:32:1d:2d:ae:9e
d6:4c:2e:b4:e6:da:a5:d8:72:c6:b6:2a:92:6c:ef:45
c6:50:a7:4f:05:2c:ac:00:45:95:26:97:3d:2e:ff:df
66:9f:6e:4b:41:e9:ff:f5:ba:67:b3:a2:5a:23:04:d7
c4:89:92:e0:01:d0:17:ea:3c:14:c0:92:fc:5d:4c:d6
bf:8c:9c:b4:5d:29:3f:2e:05:77:1b:e2:dc:f6:2b:6c
bf:50:60:9a:7d:fc:d7:b7:4c:5b:f3:42:2f:f1:5e:1b
03:66:03:e6:79:06:ea:ae:c3:fe:2b:d2:a6:a9:35:3f
d5:4c:b9:3d:66:10:2f:74:6c:e9:eb:a6:51:58:5f:a0
bb:76:83:8a:91:4a:43:f1:5c:25:bd:a0:26:0d:f9:c8
70:4e:0e:7c:2c:de:d0:da:4c:b9:e8:57:3e:fe:42:b4
94:fa:76:fa:84:61:76:f9:76:8a:c3:81:fe:2d:a3:8d
02:20:0c:6d:f8:bb:9f:e4:f1:d2:be:97:87:45:3e:bf
89
Exponent (bits 24):
01:00:01
Extensions:
Subject Key Identifier (not critical):
63ac305551baad1e70e9b2926c0b674cc07dec41
Authority Key Identifier (not critical):
63ac305551baad1e70e9b2926c0b674cc07dec41
Basic Constraints (critical):
Certificate Authority (CA): TRUE
Signature Algorithm: RSA-PSS-SHA256
Salt Length: 222
Signature:
a2:0b:ef:5d:56:5c:8a:18:7a:bb:0b:35:b4:0f:61:c1
c0:1f:81:38:ba:2d:dc:cf:bf:1b:76:16:b1:bf:00:85
4f:e1:84:83:12:41:57:eb:3c:f0:54:62:50:77:d7:9d
1c:44:14:9a:2a:75:a0:95:57:24:bc:91:04:2c:6e:d2
e1:08:ee:12:74:49:f0:05:db:4f:8b:c6:42:e1:e1:0d
4d:f6:83:48:8d:f6:1a:92:30:17:92:03:2f:f1:3f:3f
37:41:56:b2:a5:b7:89:a8:6f:dd:50:57:bd:a1:23:c2
b9:7a:28:8e:71:27:18:10:1a:ef:31:b5:bc:ff:2b:31
1f:a4:d0:de:24:b5:be:62:5b:ae:1f:ea:4d:4e:d6:ac
8c:b7:b4:bd:af:18:3f:e4:06:82:76:5c:3c:5a:1b:2a
8a:02:72:26:7e:ba:07:f5:7b:76:de:48:5f:eb:69:72
b2:1c:ad:13:5d:de:52:49:f5:0f:67:df:b7:cd:b6:97
06:2d:58:19:de:e2:7c:0b:e2:ba:96:66:17:4e:93:53
4c:f0:dc:6b:9e:7e:5f:5f:27:7e:df:4c:9c:5f:5c:94
13:c2:c4:d6:3a:03:77:33:41:03:21:12:73:f5:72:81
1f:1c:94:32:10:47:d0:12:a8:3e:53:ee:65:6e:a2:2c
Other Information:
Fingerprint:
sha1:6b6e34ba4acd2b3a85702a3c86a8e99d796b667f
sha256:cf88d89066870a7250faf6c7b69545f6ae4c6f70bbb6d45b027038eb690ff82d
Public Key ID:
sha1:fcf39f82b530df6d612fa79b50841007f368cb58
sha256:d88c985675a40686d01ee68374c3746da4a513b6712decf0cdf16ea847e7c009
Public Key PIN:
pin-sha256:2IyYVnWkBobQHuaDdMN0baSlE7ZxLezwzfFuqEfnwAk=
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
- Ephemeral EC Diffie-Hellman parameters
- Using curve: SECP256R1
- Curve size: 256 bits
- Version: TLS1.2
- Key Exchange: ECDHE-RSA
- Server Signature: RSA-PSS-SHA256
- Client Signature: RSA-PSS-SHA512
- Cipher: AES-128-CBC
- MAC: SHA1
|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_get2]:93
|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_is_checked]:627
- Options: safe renegotiation,
|<3>| ASSERT: srtp.c[gnutls_srtp_get_selected_profile]:320
|<3>| ASSERT: alpn.c[gnutls_alpn_get_selected_protocol]:255
- Channel binding 'tls-unique': c00c6c3a1845a9f13ccf9fac
|<3>| ASSERT: buffers.c[_gnutls_io_read_buffered]:589
|<3>| ASSERT: record.c[_gnutls_recv_int]:1709
|<5>| REC[0x227e7f0]: SSL 3.3 Application Data packet received. Epoch 1, length: 64
|<5>| REC[0x227e7f0]: Expected Packet Application Data(23)
|<5>| REC[0x227e7f0]: Received Packet Application Data(23) with length: 64
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Application Data(23) with length: 16
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_issuer_unique_id]:3946
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_subject_unique_id]:3896
|<3>| ASSERT: common.c[_gnutls_copy_data]:1608
|<3>| ASSERT: x509.c[gnutls_x509_crt_get_signature]:1104
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<5>| REC[0x227e7f0]: Preparing Packet Application Data(23) with length: 3592 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 3637
|<3>| ASSERT: buffers.c[_gnutls_io_write_flush]:696
|<5>| REC: Sending Alert[1|0] - Close notify
|<5>| REC[0x227e7f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Alert(21) in epoch 1 and length: 53
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: End of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #1 freed
|<5>| REC[0x227e7f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55616 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x227e7f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x227e7f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x227e7f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x227e7f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x227e7f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x227e7f0]: Requested server name: ''
|<4>| HSK[0x227e7f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x227e7f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected version TLS1.2
|<4>| HSK[0x227e7f0]: Safe renegotiation succeeded
|<4>| HSK[0x227e7f0]: SessionID: 60b985a33da1b64b46c1800a49a8793a50d3bcfbd6ed096c99948079e98f717e
|<4>| EXT[0x227e7f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x227e7f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x227e7f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x227e7f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x227e7f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x227e7f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x227e7f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x227e7f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x227e7f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x227e7f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x227e7f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x227e7f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x227e7f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x227e7f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x227e7f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x227e7f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x227e7f0]: verify cert vrfy: using RSA-PSS-SHA256
|<3>| ASSERT: pk.c[_wrap_nettle_pk_verify]:1178
|<3>| ASSERT: pubkey.c[pubkey_verify_data]:2209
|<3>| ASSERT: pubkey.c[gnutls_pubkey_verify_data2]:1775
|<3>| ASSERT: tls-sig.c[_gnutls_handshake_verify_crt_vrfy12]:373
|<3>| ASSERT: cert.c[_gnutls_proc_cert_client_crt_vrfy]:1052
|<3>| ASSERT: handshake.c[handshake_server]:3425
Error in handshake: Public key signature verification has failed.
|<5>| REC: Sending Alert[2|51] - Decrypt error
|<5>| REC[0x227e7f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[6] Alert(21) in epoch 0 and length: 7
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: End of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #0 freed
|<5>| REC[0x227e7f0]: Epoch #1 freed
|<5>| REC[0x22870f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55618 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x22870f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x22870f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x22870f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x22870f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x22870f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x22870f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x22870f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x22870f0]: Requested server name: ''
|<4>| HSK[0x22870f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x22870f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected version TLS1.2
|<4>| HSK[0x22870f0]: Safe renegotiation succeeded
|<4>| HSK[0x22870f0]: SessionID: ca98cf11bc98f14f7ed0e061ee5181cc7fcc3808366463eb0a598c2e3061739d
|<4>| EXT[0x22870f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x22870f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x22870f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x22870f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x22870f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x22870f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x22870f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x22870f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x22870f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x22870f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x22870f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x22870f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x22870f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x22870f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x22870f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x22870f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x22870f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x22870f0]: verify cert vrfy: using RSA-PSS-SHA384
|<3>| ASSERT: pk.c[_wrap_nettle_pk_verify]:1178
|<3>| ASSERT: pubkey.c[pubkey_verify_data]:2209
|<3>| ASSERT: pubkey.c[gnutls_pubkey_verify_data2]:1775
|<3>| ASSERT: tls-sig.c[_gnutls_handshake_verify_crt_vrfy12]:373
|<3>| ASSERT: cert.c[_gnutls_proc_cert_client_crt_vrfy]:1052
|<3>| ASSERT: handshake.c[handshake_server]:3425
Error in handshake: Public key signature verification has failed.
|<5>| REC: Sending Alert[2|51] - Decrypt error
|<5>| REC[0x22870f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[6] Alert(21) in epoch 0 and length: 7
|<5>| REC[0x22870f0]: Start of epoch cleanup
|<5>| REC[0x22870f0]: End of epoch cleanup
|<5>| REC[0x22870f0]: Epoch #0 freed
|<5>| REC[0x22870f0]: Epoch #1 freed
|<5>| REC[0x22870f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55620 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x22870f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x22870f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x22870f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x22870f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x22870f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x22870f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x22870f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x22870f0]: Requested server name: ''
|<4>| HSK[0x22870f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x22870f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected version TLS1.2
|<4>| HSK[0x22870f0]: Safe renegotiation succeeded
|<4>| HSK[0x22870f0]: SessionID: afec6b1452cf054fbc3e1f1fa15594ba7a70debeb6a5c83711924f83509783c2
|<4>| EXT[0x22870f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x22870f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x22870f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x22870f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x22870f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x22870f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x22870f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x22870f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x22870f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x22870f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x22870f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x22870f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x22870f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x22870f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x22870f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x22870f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x22870f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x22870f0]: verify cert vrfy: using RSA-PSS-SHA512
|<3>| ASSERT: pk.c[_wrap_nettle_pk_verify]:1178
|<3>| ASSERT: pubkey.c[pubkey_verify_data]:2209
|<3>| ASSERT: pubkey.c[gnutls_pubkey_verify_data2]:1775
|<3>| ASSERT: tls-sig.c[_gnutls_handshake_verify_crt_vrfy12]:373
|<3>| ASSERT: cert.c[_gnutls_proc_cert_client_crt_vrfy]:1052
|<3>| ASSERT: handshake.c[handshake_server]:3425
Error in handshake: Public key signature verification has failed.
|<5>| REC: Sending Alert[2|51] - Decrypt error
|<5>| REC[0x22870f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[6] Alert(21) in epoch 0 and length: 7
|<5>| REC[0x22870f0]: Start of epoch cleanup
|<5>| REC[0x22870f0]: End of epoch cleanup
|<5>| REC[0x22870f0]: Epoch #0 freed
|<5>| REC[0x22870f0]: Epoch #1 freed
|<5>| REC[0x22870f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55622 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x22870f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x22870f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x22870f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x22870f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x22870f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x22870f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x22870f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x22870f0]: Requested server name: ''
|<4>| HSK[0x22870f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x22870f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected version TLS1.2
|<4>| HSK[0x22870f0]: Safe renegotiation succeeded
|<4>| HSK[0x22870f0]: SessionID: bd9c98f2341bb746d33921f2119a96320de685e767711f58c79b45ea13ad2383
|<4>| EXT[0x22870f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x22870f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x22870f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x22870f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x22870f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x22870f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x22870f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x22870f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x22870f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x22870f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x22870f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x22870f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x22870f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x22870f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x22870f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x22870f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x22870f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x22870f0]: verify cert vrfy: using RSA-SHA256
|<4>| have key: RSA-PSS/6, with sign RSA-SHA256/6
|<3>| ASSERT: pubkey.c[pubkey_supports_sig]:1908
|<3>| ASSERT: pubkey.c[gnutls_pubkey_verify_data2]:1764
|<3>| ASSERT: tls-sig.c[_gnutls_handshake_verify_crt_vrfy12]:373
|<3>| ASSERT: cert.c[_gnutls_proc_cert_client_crt_vrfy]:1052
|<3>| ASSERT: handshake.c[handshake_server]:3425
Error in handshake: The signature is incompatible with the public key.
|<5>| REC: Sending Alert[2|80] - Internal error
|<5>| REC[0x22870f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[6] Alert(21) in epoch 0 and length: 7
|<5>| REC[0x22870f0]: Start of epoch cleanup
|<5>| REC[0x22870f0]: End of epoch cleanup
|<5>| REC[0x22870f0]: Epoch #0 freed
|<5>| REC[0x22870f0]: Epoch #1 freed
|<5>| REC[0x22870f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55624 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x22870f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x22870f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x22870f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x22870f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x22870f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x22870f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x22870f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x22870f0]: Requested server name: ''
|<4>| HSK[0x22870f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x22870f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected version TLS1.2
|<4>| HSK[0x22870f0]: Safe renegotiation succeeded
|<4>| HSK[0x22870f0]: SessionID: 918c15cf3b84caeea5e0f28c6febcfeabc6e33ad9bf35fd8c1d66a1964ba77ff
|<4>| EXT[0x22870f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x22870f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x22870f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x22870f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x22870f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x22870f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x22870f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x22870f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x22870f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x22870f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x22870f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x22870f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x22870f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x22870f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x22870f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x22870f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x22870f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x22870f0]: verify cert vrfy: using RSA-SHA256
|<4>| have key: RSA-PSS/6, with sign RSA-SHA256/6
|<3>| ASSERT: pubkey.c[pubkey_supports_sig]:1908
|<3>| ASSERT: pubkey.c[gnutls_pubkey_verify_data2]:1764
|<3>| ASSERT: tls-sig.c[_gnutls_handshake_verify_crt_vrfy12]:373
|<3>| ASSERT: cert.c[_gnutls_proc_cert_client_crt_vrfy]:1052
|<3>| ASSERT: handshake.c[handshake_server]:3425
Error in handshake: The signature is incompatible with the public key.
|<5>| REC: Sending Alert[2|80] - Internal error
|<5>| REC[0x22870f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[6] Alert(21) in epoch 0 and length: 7
|<5>| REC[0x22870f0]: Start of epoch cleanup
|<5>| REC[0x22870f0]: End of epoch cleanup
|<5>| REC[0x22870f0]: Epoch #0 freed
|<5>| REC[0x22870f0]: Epoch #1 freed
|<5>| REC[0x22870f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55626 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x22870f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x22870f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x22870f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x22870f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x22870f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x22870f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x22870f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x22870f0]: Requested server name: ''
|<4>| HSK[0x22870f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x22870f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected version TLS1.2
|<4>| HSK[0x22870f0]: Safe renegotiation succeeded
|<4>| HSK[0x22870f0]: SessionID: 07b078b3deeec5e4f52f70cf0b0ac4731409abf4c69aa135526057e28ca45ca3
|<4>| EXT[0x22870f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x22870f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x22870f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x22870f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x22870f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x22870f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x22870f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x22870f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x22870f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x22870f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x22870f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x22870f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x22870f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x22870f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x22870f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 12
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 12
|<5>| REC[0x22870f0]: Decrypted Packet[3] Handshake(22) with length: 12
|<4>| HSK[0x22870f0]: CERTIFICATE VERIFY (15) was received. Length 8[8], frag offset 0, frag length: 8, sequence: 0
|<4>| HSK[0x22870f0]: verify cert vrfy: using RSA-PSS-SHA256
|<3>| ASSERT: pk.c[_wrap_nettle_pk_verify]:1160
|<3>| ASSERT: pubkey.c[pubkey_verify_data]:2209
|<3>| ASSERT: pubkey.c[gnutls_pubkey_verify_data2]:1775
|<3>| ASSERT: tls-sig.c[_gnutls_handshake_verify_crt_vrfy12]:373
|<3>| ASSERT: cert.c[_gnutls_proc_cert_client_crt_vrfy]:1052
|<3>| ASSERT: handshake.c[handshake_server]:3425
Error in handshake: Public key signature verification has failed.
|<5>| REC: Sending Alert[2|51] - Decrypt error
|<5>| REC[0x22870f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[6] Alert(21) in epoch 0 and length: 7
|<5>| REC[0x22870f0]: Start of epoch cleanup
|<5>| REC[0x22870f0]: End of epoch cleanup
|<5>| REC[0x22870f0]: Epoch #0 freed
|<5>| REC[0x22870f0]: Epoch #1 freed
|<5>| REC[0x227e7f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55628 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x227e7f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x227e7f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x227e7f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x227e7f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x227e7f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x227e7f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x227e7f0]: Requested server name: ''
|<4>| HSK[0x227e7f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x227e7f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x227e7f0]: Selected version TLS1.2
|<4>| HSK[0x227e7f0]: Safe renegotiation succeeded
|<4>| HSK[0x227e7f0]: SessionID: 3b1e2220c16e18c7b6c4db28d5c2c70465a5c2e418f6d8315c8578381dcd8311
|<4>| EXT[0x227e7f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x227e7f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x227e7f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x227e7f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x227e7f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x227e7f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x227e7f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x227e7f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x227e7f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x227e7f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x227e7f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x227e7f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x227e7f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x227e7f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x227e7f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x227e7f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x227e7f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x227e7f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x227e7f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x227e7f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x227e7f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x227e7f0]: Expected Packet Handshake(22)
|<5>| REC[0x227e7f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x227e7f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x227e7f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x227e7f0]: verify cert vrfy: using RSA-PSS-SHA256
|<3>| ASSERT: pk.c[_wrap_nettle_pk_verify]:1178
|<3>| ASSERT: pubkey.c[pubkey_verify_data]:2209
|<3>| ASSERT: pubkey.c[gnutls_pubkey_verify_data2]:1775
|<3>| ASSERT: tls-sig.c[_gnutls_handshake_verify_crt_vrfy12]:373
|<3>| ASSERT: cert.c[_gnutls_proc_cert_client_crt_vrfy]:1052
|<3>| ASSERT: handshake.c[handshake_server]:3425
Error in handshake: Public key signature verification has failed.
|<5>| REC: Sending Alert[2|51] - Decrypt error
|<5>| REC[0x227e7f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x227e7f0]: Sent Packet[6] Alert(21) in epoch 0 and length: 7
|<5>| REC[0x227e7f0]: Start of epoch cleanup
|<5>| REC[0x227e7f0]: End of epoch cleanup
|<5>| REC[0x227e7f0]: Epoch #0 freed
|<5>| REC[0x227e7f0]: Epoch #1 freed
|<5>| REC[0x22870f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55630 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x22870f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 99
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 99
|<5>| REC[0x22870f0]: Decrypted Packet[0] Handshake(22) with length: 99
|<4>| HSK[0x22870f0]: CLIENT HELLO (1) was received. Length 95[95], frag offset 0, frag length: 95, sequence: 0
|<4>| HSK[0x22870f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x22870f0]: Parsing extension 'Signature Algorithms/13' (14 bytes)
|<4>| EXT[0x22870f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| HSK[0x22870f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x22870f0]: Requested server name: ''
|<4>| HSK[0x22870f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x22870f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected version TLS1.2
|<4>| HSK[0x22870f0]: Safe renegotiation succeeded
|<4>| HSK[0x22870f0]: SessionID: 34195317ebd299371de15839f46e85b434d4e8d4937774c71b933ff1cea1a5cd
|<4>| EXT[0x22870f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x22870f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x22870f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x22870f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x22870f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x22870f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x22870f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x22870f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x22870f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x22870f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x22870f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x22870f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x22870f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x22870f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x22870f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x22870f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x22870f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x22870f0]: verify cert vrfy: using RSA-PSS-SHA256
|<3>| ASSERT: pk.c[_wrap_nettle_pk_verify]:1178
|<3>| ASSERT: pubkey.c[pubkey_verify_data]:2209
|<3>| ASSERT: pubkey.c[gnutls_pubkey_verify_data2]:1775
|<3>| ASSERT: tls-sig.c[_gnutls_handshake_verify_crt_vrfy12]:373
|<3>| ASSERT: cert.c[_gnutls_proc_cert_client_crt_vrfy]:1052
|<3>| ASSERT: handshake.c[handshake_server]:3425
Error in handshake: Public key signature verification has failed.
|<5>| REC: Sending Alert[2|51] - Decrypt error
|<5>| REC[0x22870f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[6] Alert(21) in epoch 0 and length: 7
|<5>| REC[0x22870f0]: Start of epoch cleanup
|<5>| REC[0x22870f0]: End of epoch cleanup
|<5>| REC[0x22870f0]: Epoch #0 freed
|<5>| REC[0x22870f0]: Epoch #1 freed
|<5>| REC[0x22870f0]: Allocating epoch #0
|<2>| added 2 protocols, 43 ciphersuites, 18 sig algos and 9 groups into priority list
* Accepted connection from IPv4 127.0.0.1 port 55632 on Mon Dec 10 16:53:10 2018
|<5>| REC[0x22870f0]: Allocating epoch #1
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.0 Handshake packet received. Epoch 0, length: 109
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 109
|<5>| REC[0x22870f0]: Decrypted Packet[0] Handshake(22) with length: 109
|<4>| HSK[0x22870f0]: CLIENT HELLO (1) was received. Length 105[105], frag offset 0, frag length: 105, sequence: 0
|<4>| HSK[0x22870f0]: Client's version: 3.3
|<3>| ASSERT: db.c[_gnutls_server_restore_session]:298
|<4>| EXT[0x22870f0]: Parsing extension 'Signature Algorithms/13' (24 bytes)
|<4>| EXT[0x22870f0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: rcvd signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x22870f0]: rcvd signature algo (6.1) RSA-SHA512
|<4>| EXT[0x22870f0]: rcvd signature algo (5.1) RSA-SHA384
|<4>| EXT[0x22870f0]: rcvd signature algo (4.1) RSA-SHA256
|<4>| EXT[0x22870f0]: rcvd signature algo (3.1) (null)
|<4>| EXT[0x22870f0]: rcvd signature algo (2.1) RSA-SHA1
|<4>| HSK[0x22870f0]: Received safe renegotiation CS
|<2>| checking c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) for compatibility
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:235
|<4>| HSK[0x22870f0]: Requested server name: ''
|<4>| HSK[0x22870f0]: checking compat of GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 with certificate[3] (RSA-PSS/X.509)
|<4>| checking cert compat with RSA-PSS-RSAE-SHA256
|<4>| checking cert compat with RSA-PSS-RSAE-SHA384
|<4>| checking cert compat with RSA-PSS-RSAE-SHA512
|<4>| checking cert compat with RSA-PSS-SHA256
|<4>| Selected signature algorithm: RSA-PSS-SHA256
|<2>| Selected (RSA-PSS) cert based on ciphersuite c0.13: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected group SECP256R1 (2)
|<4>| HSK[0x22870f0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1
|<4>| HSK[0x22870f0]: Selected version TLS1.2
|<4>| HSK[0x22870f0]: Safe renegotiation succeeded
|<4>| HSK[0x22870f0]: SessionID: 9db41e421fc6ed3054e5181778fcb9e38f75d9813eda2dd39d0199865503851b
|<4>| EXT[0x22870f0]: Preparing extension (Maximum Record Size/1) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (OCSP Status Request/5) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Client Certificate Type/19) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Server Certificate Type/20) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Groups/10) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported EC Point Formats/11) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (SRP/12) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Signature Algorithms/13) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (SRTP/14) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Heartbeat/15) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (ALPN/16) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Encrypt-then-MAC/22) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Extended Master Secret/23) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Session Ticket/35) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Key Share/51) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Supported Versions/43) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Safe Renegotiation/65281) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Sending extension Safe Renegotiation/65281 (1 bytes)
|<4>| EXT[0x22870f0]: Preparing extension (Server Name Indication/0) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Cookie/44) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Early Data/42) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (PSK Key Exchange Modes/45) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Preparing extension (Record Size Limit/28) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (ClientHello Padding/21) for 'TLS 1.2 server hello'
|<4>| EXT[0x22870f0]: Not sending extension (Pre Shared Key/41) for 'TLS 1.2 server hello'
|<4>| HSK[0x22870f0]: SERVER HELLO was queued [81 bytes]
|<4>| HSK[0x22870f0]: CERTIFICATE was queued [871 bytes]
|<4>| HSK[0x22870f0]: signing TLS 1.2 handshake data: using RSA-PSS-SHA256
|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60
|<4>| HSK[0x22870f0]: SERVER KEY EXCHANGE was queued [333 bytes]
|<4>| EXT[0x22870f0]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.9) RSA-PSS-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x22870f0]: sent signature algo (8.7) EdDSA-Ed25519
|<4>| EXT[0x22870f0]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.10) RSA-PSS-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x22870f0]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.11) RSA-PSS-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x22870f0]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x22870f0]: sent signature algo (2.3) ECDSA-SHA1
|<4>| HSK[0x22870f0]: CERTIFICATE REQUEST was queued [71 bytes]
|<4>| HSK[0x22870f0]: SERVER HELLO DONE was queued [4 bytes]
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 871 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 876
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 71 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 76
|<5>| REC[0x22870f0]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 887
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 887
|<5>| REC[0x22870f0]: Decrypted Packet[1] Handshake(22) with length: 887
|<4>| HSK[0x22870f0]: CERTIFICATE (11) was received. Length 883[883], frag offset 0, frag length: 883, sequence: 0
- Peer's certificate was NOT verified.
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 70
|<5>| REC[0x22870f0]: Decrypted Packet[2] Handshake(22) with length: 70
|<4>| HSK[0x22870f0]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1171
|<5>| REC[0x22870f0]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
|<5>| REC[0x22870f0]: Expected Packet Handshake(22)
|<5>| REC[0x22870f0]: Received Packet Handshake(22) with length: 264
|<5>| REC[0x22870f0]: Decrypted Packet[3] Handshake(22) with length: 264
|<4>| HSK[0x22870f0]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
|<4>| HSK[0x22870f0]: verify cert vrfy: using RSA-SHA256
|<4>| have key: RSA-PSS/6, with sign RSA-SHA256/6
|<3>| ASSERT: pubkey.c[pubkey_supports_sig]:1908
|<3>| ASSERT: pubkey.c[gnutls_pubkey_verify_data2]:1764
|<3>| ASSERT: tls-sig.c[_gnutls_handshake_verify_crt_vrfy12]:373
|<3>| ASSERT: cert.c[_gnutls_proc_cert_client_crt_vrfy]:1052
|<3>| ASSERT: handshake.c[handshake_server]:3425
Error in handshake: The signature is incompatible with the public key.
|<5>| REC: Sending Alert[2|80] - Internal error
|<5>| REC[0x22870f0]: Preparing Packet Alert(21) with length: 2 and min pad: 0
|<5>| REC[0x22870f0]: Sent Packet[6] Alert(21) in epoch 0 and length: 7
|<5>| REC[0x22870f0]: Start of epoch cleanup
|<5>| REC[0x22870f0]: End of epoch cleanup
|<5>| REC[0x22870f0]: Epoch #0 freed
|<5>| REC[0x22870f0]: Epoch #1 freed
Expected results:
Test cases pass.
Edited by Róbert Kolcún