Intereting Posts
Экспортировать или не экспортировать переменную bash PS1 Создать файл с определенным форматированием из содержимого каталога Случайный вставлен в Majaro Как обойти проблему «Истек срок действия файла» на локальном зеркале Проблема сохранения стандартного вывода в переменную Безопасный переход пароля root в сценарий оболочки Добавление имени dir в список файлов Не удалось получить доступ к Интернету после отключения сетевого менеджера на ArchLinux Можно ли запустить socat напрямую с помощью systemd? Отправка настраиваемого контента на основе определенного поиска в файле журнала Можно ли использовать комментарии в файлах virsh / libvirt xml? Проверить программную установку докеров (sh-script) Устранение неполадок обнаружения гнезд в Pulseaudio Найдите причину постоянно заблокированного ввода-вывода (процесс в режиме бесперебойного сна) Проблемы с копированием больших файлов на USB-накопитель

Ubuntu – lftp не будет подключаться к сайту ftps (фатальная ошибка: gnutls_handshake: получен неожиданный пакет TLS.)

У меня есть определенный ftps-сайт, к которому я не могу подключиться с помощью lftp.

Когда я пытаюсь подключиться, я получаю сообщение об ошибке:

Fatal error: gnutls_handshake: An unexpected TLS packet was received 

Когда я использую gnutls-cli для подключения, я нашел правильные настройки для согласования и фактически выполнил команду USER. То, что я прошу, – это любые указатели на правильную конфигурацию lftp для части gnutls, чтобы она могла правильно аутентифицироваться.

ОБНОВЛЕНИЕ: я вижу, что при использовании gnutls-cli он выбирает правильный MAC и шифр для использования:

 || HSK[0x24073f0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1 

В отличие от вызова из lftp, это не так:

 GNUTLS: ENC[0x1918cd0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 

Ниже приведены мои конфигурации и выходные данные отладки из lftp и gnutls-cli:

Конфигурация lftp

 lftp set ssl:priority NORMAL:+VERS-TLS1.0:+VERS-TLS1.1:+VERS-TLS1.2 set ftps:initial-prot P set ftp:ssl-allow yes set ftp:ssl-force yes set ftp:ssl-protect-list yes set ftp:ssl-protect-data yes set ftp:ssl-protect-fxp yes set ssl:verify-certificate no debug 999999999 open ftps://XXX.XXX.XXX.XXX:990 quote USER  

Конфигурация gnutls-cli

 gnutls-cli --starttls-proto=ftp XXX.XXX.XXX.XXX -p 990 --no-ca-verification -d 5 

* Некоторые аспекты были анонимизированы, но ничего о протоколах *

отладочный вывод lftp

 lftp lftp :~> set ssl:priority NORMAL:+VERS-TLS1.0:+VERS-TLS1.1:+VERS-TLS1.2 lftp :~> set ftps:initial-prot P lftp :~> set ftp:ssl-allow yes lftp :~> set ftp:ssl-force yes lftp :~> set ftp:ssl-protect-list yes lftp :~> set ftp:ssl-protect-data yes lftp :~> set ftp:ssl-protect-fxp yes lftp :~> set ssl:verify-certificate no lftp :~> debug 999999999 lftp :~> open ftps://XXX.XXX.XXX.XXX:990 ---- Resolving host address... buffer: EOF on FD 5 ---- 1 address found: XXX.XXX.XXX.XXX lftp XXX.XXX.XXX.XXX:~> quote USER  FileCopy(0x1475a50) enters state INITIAL FileCopy(0x1475a50) enters state DO_COPY ---- dns cache hit ---- attempt number 1 (max_retries=1000) ---- Connecting to XXX.XXX.XXX.XXX (XXX.XXX.XXX.XXX) port 990 GNUTLS: ASSERT: common.c:1110 .............. GNUTLS: REC[0x1918cd0]: Allocating epoch #0 GNUTLS: ASSERT: gnutls_constate.c:596 GNUTLS: REC[0x1918cd0]: Allocating epoch #1 GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256 (C0.86) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384 (C0.87) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256 (C0.72) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384 (C0.73) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CCM (C0.AC) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CCM (C0.AD) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384 (C0.30) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 (C0.13) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA256 (C0.27) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1 (C0.14) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA384 (C0.28) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_GCM_SHA256 (00.9C) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_GCM_SHA384 (00.9D) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_GCM_SHA256 (C0.7A) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_GCM_SHA384 (C0.7B) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA1 (00.2F) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA256 (00.3C) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA1 (00.35) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA256 (00.3D) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA1 (00.41) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA256 (00.BA) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA1 (00.84) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA256 (00.C0) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CCM (C0.9C) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CCM (C0.9D) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_RSA_3DES_EDE_CBC_SHA1 (00.0A) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_GCM_SHA256 (00.9E) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_GCM_SHA384 (00.9F) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.7C) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.7D) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA1 (00.33) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA256 (00.67) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA1 (00.39) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA256 (00.6B) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA256 (00.BE) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA256 (00.C4) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CCM (C0.9E) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CCM (C0.9F) GNUTLS: HSK[0x1918cd0]: Keeping ciphersuite: GNUTLS_DHE_RSA_3DES_EDE_CBC_SHA1 (00.16) GNUTLS: EXT[0x1918cd0]: Sending extension EXT MASTER SECRET (0 bytes) GNUTLS: EXT[0x1918cd0]: Sending extension ENCRYPT THEN MAC (0 bytes) GNUTLS: EXT[0x1918cd0]: Sending extension STATUS REQUEST (5 bytes) GNUTLS: EXT[0x1918cd0]: Sending extension SERVER NAME (17 bytes) GNUTLS: EXT[0x1918cd0]: Sending extension SAFE RENEGOTIATION (1 bytes) GNUTLS: EXT[0x1918cd0]: Sending extension SESSION TICKET (0 bytes) GNUTLS: EXT[0x1918cd0]: Sending extension SUPPORTED ECC (12 bytes) GNUTLS: EXT[0x1918cd0]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes) GNUTLS: EXT[0x1918cd0]: sent signature algo (4.1) RSA-SHA256 GNUTLS: EXT[0x1918cd0]: sent signature algo (4.3) ECDSA-SHA256 GNUTLS: EXT[0x1918cd0]: sent signature algo (5.1) RSA-SHA384 GNUTLS: EXT[0x1918cd0]: sent signature algo (5.3) ECDSA-SHA384 GNUTLS: EXT[0x1918cd0]: sent signature algo (6.1) RSA-SHA512 GNUTLS: EXT[0x1918cd0]: sent signature algo (6.3) ECDSA-SHA512 GNUTLS: EXT[0x1918cd0]: sent signature algo (3.1) RSA-SHA224 GNUTLS: EXT[0x1918cd0]: sent signature algo (3.3) ECDSA-SHA224 GNUTLS: EXT[0x1918cd0]: sent signature algo (2.1) RSA-SHA1 GNUTLS: EXT[0x1918cd0]: sent signature algo (2.3) ECDSA-SHA1 GNUTLS: EXT[0x1918cd0]: Sending extension SIGNATURE ALGORITHMS (22 bytes) GNUTLS: HSK[0x1918cd0]: CLIENT HELLO was queued [248 bytes] GNUTLS: REC[0x1918cd0]: Preparing Packet Handshake(22) with length: 248 and min pad: 0 GNUTLS: ENC[0x1918cd0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 GNUTLS: REC[0x1918cd0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 253 GNUTLS: ASSERT: gnutls_buffers.c:1154 GNUTLS: REC[0x1918cd0]: SSL 50.48 Unknown Packet packet received. Epoch 0, length: 11603 GNUTLS: ASSERT: gnutls_record.c:572 GNUTLS: Received record packet of unknown type 50 GNUTLS: ASSERT: gnutls_record.c:1076 GNUTLS: ASSERT: gnutls_record.c:1158 GNUTLS: ASSERT: gnutls_buffers.c:1409 GNUTLS: ASSERT: gnutls_handshake.c:1446 GNUTLS: ASSERT: gnutls_handshake.c:2762 **** gnutls_handshake: An unexpected TLS packet was received. GNUTLS: REC[0x1918cd0]: Start of epoch cleanup GNUTLS: REC[0x1918cd0]: End of epoch cleanup GNUTLS: REC[0x1918cd0]: Epoch #0 freed GNUTLS: REC[0x1918cd0]: Epoch #1 freed ---- Closing control socket quote: USER : Fatal error: gnutls_handshake: An unexpected TLS packet was received. 

отладочный вывод gnutls-cli

 gnutls-cli --starttls-proto=ftp XXX.XXX.XXX.XXX -p 990 --no-ca-verification -d 5 || ASSERT: common.c:1110... Processed 173 CA certificate(s). Resolving 'XXX.XXX.XXX.XXX'... Connecting to 'XXX.XXX.XXX.XXX:990'... || REC[0x24073f0]: Allocating epoch #0 || ASSERT: gnutls_constate.c:596 || REC[0x24073f0]: Allocating epoch #1 || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256 (C0.86) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384 (C0.87) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256 (C0.72) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384 (C0.73) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CCM (C0.AC) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CCM (C0.AD) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384 (C0.30) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 (C0.13) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA256 (C0.27) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1 (C0.14) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA384 (C0.28) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_GCM_SHA256 (00.9C) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_GCM_SHA384 (00.9D) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_GCM_SHA256 (C0.7A) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_GCM_SHA384 (C0.7B) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA1 (00.2F) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA256 (00.3C) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA1 (00.35) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA256 (00.3D) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA1 (00.41) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA256 (00.BA) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA1 (00.84) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA256 (00.C0) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CCM (C0.9C) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CCM (C0.9D) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_RSA_3DES_EDE_CBC_SHA1 (00.0A) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_GCM_SHA256 (00.9E) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_GCM_SHA384 (00.9F) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.7C) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.7D) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA1 (00.33) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA256 (00.67) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA1 (00.39) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA256 (00.6B) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA256 (00.BE) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA256 (00.C4) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CCM (C0.9E) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CCM (C0.9F) || HSK[0x24073f0]: Keeping ciphersuite: GNUTLS_DHE_RSA_3DES_EDE_CBC_SHA1 (00.16) || EXT[0x24073f0]: Sending extension EXT MASTER SECRET (0 bytes) || EXT[0x24073f0]: Sending extension ENCRYPT THEN MAC (0 bytes) || EXT[0x24073f0]: Sending extension STATUS REQUEST (5 bytes) || EXT[0x24073f0]: Sending extension SAFE RENEGOTIATION (1 bytes) || EXT[0x24073f0]: Sending extension SESSION TICKET (0 bytes) || EXT[0x24073f0]: Sending extension SUPPORTED ECC (12 bytes) || EXT[0x24073f0]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes) || EXT[0x24073f0]: sent signature algo (4.1) RSA-SHA256 || EXT[0x24073f0]: sent signature algo (4.3) ECDSA-SHA256 || EXT[0x24073f0]: sent signature algo (5.1) RSA-SHA384 || EXT[0x24073f0]: sent signature algo (5.3) ECDSA-SHA384 || EXT[0x24073f0]: sent signature algo (6.1) RSA-SHA512 || EXT[0x24073f0]: sent signature algo (6.3) ECDSA-SHA512 || EXT[0x24073f0]: sent signature algo (3.1) RSA-SHA224 || EXT[0x24073f0]: sent signature algo (3.3) ECDSA-SHA224 || EXT[0x24073f0]: sent signature algo (2.1) RSA-SHA1 || EXT[0x24073f0]: sent signature algo (2.3) ECDSA-SHA1 || EXT[0x24073f0]: Sending extension SIGNATURE ALGORITHMS (22 bytes) || HSK[0x24073f0]: CLIENT HELLO was queued [227 bytes] || REC[0x24073f0]: Preparing Packet Handshake(22) with length: 227 and min pad: 0 || REC[0x24073f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 232 || ASSERT: gnutls_buffers.c:1154 || REC[0x24073f0]: SSL 3.1 Handshake packet received. Epoch 0, length: 950 || REC[0x24073f0]: Expected Packet Handshake(22) || REC[0x24073f0]: Received Packet Handshake(22) with length: 950 || REC[0x24073f0]: Decrypted Packet[0] Handshake(22) with length: 950 || HSK[0x24073f0]: SERVER HELLO (2) was received. Length 77[946], frag offset 0, frag length: 77, sequence: 0 || HSK[0x24073f0]: Server's version: 3.1 || HSK[0x24073f0]: SessionID length: 32 || HSK[0x24073f0]: SessionID: 000003031e05c5fea2ec00000000000000000000000000005b69ab4d00000001 || HSK[0x24073f0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1 || HSK[0x24073f0]: Selected compression method: NULL (0) || EXT[0x24073f0]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes) || HSK[0x24073f0]: Safe renegotiation succeeded || ASSERT: gnutls_buffers.c:1154 || HSK[0x24073f0]: CERTIFICATE (11) was received. Length 861[865], frag offset 0, frag length: 861, sequence: 0 || ASSERT: gnutls_buffers.c:1392 || ASSERT: extensions.c:65 - Certificate type: X.509 - Got a certificate list of 1 certificates. - Certificate[0] info: || ASSERT: dn.c:250 || ASSERT: dn.c:250 || ASSERT: extensions.c:65 - subject `', RSA key 1024 bits, signed using RSA-SHA1, activated `2009-09-10 00:00:00 UTC', expires `2021-04-24 23:59:59 UTC', SHA-1 fingerprint `555555555555555555555555555555555555555' Public Key ID: PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP Public key's random art: +--[ RSA 1024]----+ | oo | | .= E.| | .Bo| | .= | | S = .| | . o . .= | | . . . oo.| | . o+| | .o.| +-----------------+ || ASSERT: gnutls_buffers.c:1154 || HSK[0x24073f0]: SERVER HELLO DONE (14) was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0 || ASSERT: gnutls_buffers.c:1145 || ASSERT: gnutls_buffers.c:1392 || ASSERT: gnutls_buffers.c:1374 || ASSERT: extensions.c:65 || HSK[0x24073f0]: CLIENT KEY EXCHANGE was queued [134 bytes] || REC[0x24073f0]: Sent ChangeCipherSpec || REC[0x24073f0]: Initializing epoch #1 || REC[0x24073f0]: Epoch #1 ready || HSK[0x24073f0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1 || HSK[0x24073f0]: Initializing internal [write] cipher sessions || HSK[0x24073f0]: recording tls-unique CB (send) || HSK[0x24073f0]: FINISHED was queued [16 bytes] || REC[0x24073f0]: Preparing Packet Handshake(22) with length: 134 and min pad: 0 || REC[0x24073f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 139 || REC[0x24073f0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 || REC[0x24073f0]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6 || REC[0x24073f0]: Preparing Packet Handshake(22) with length: 16 and min pad: 0 || REC[0x24073f0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 45 || REC[0x24073f0]: SSL 3.1 ChangeCipherSpec packet received. Epoch 0, length: 1 || REC[0x24073f0]: Expected Packet ChangeCipherSpec(20) || REC[0x24073f0]: Received Packet ChangeCipherSpec(20) with length: 1 || REC[0x24073f0]: Decrypted Packet[1] ChangeCipherSpec(20) with length: 1 || HSK[0x24073f0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1 || ASSERT: gnutls_buffers.c:1154 || REC[0x24073f0]: SSL 3.1 Handshake packet received. Epoch 0, length: 40 || REC[0x24073f0]: Expected Packet Handshake(22) || REC[0x24073f0]: Received Packet Handshake(22) with length: 40 || REC[0x24073f0]: Decrypted Packet[0] Handshake(22) with length: 16 || HSK[0x24073f0]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0 || REC[0x24073f0]: Start of epoch cleanup || REC[0x24073f0]: Epoch #0 freed || REC[0x24073f0]: End of epoch cleanup - Description: (TLS1.0)-(RSA)-(3DES-CBC)-(SHA1) - Session ID: 00:00:03:03:1E:05:C5:FE:A2:EC:00:00:00:00:00:00:00:00:00:00:00:00:00:00:5B:69:AB:4D:00:00:00:01 || ASSERT: server_name.c:298 - Version: TLS1.0 - Key Exchange: RSA - Cipher: 3DES-CBC - MAC: SHA1 - Compression: NULL || ASSERT: status_request.c:350 || ASSERT: gnutls_ui.c:797 - Options: safe renegotiation, || ASSERT: srtp.c:317 || ASSERT: alpn.c:227 - Handshake was completed || ASSERT: status_request.c:350 - Simple Client Mode: