<div dir="ltr">Hi Andres.<br><div class="gmail_extra"><br><div class="gmail_quote">On 30 November 2015 at 20:31, Andreas Metzler <span dir="ltr"><<a href="mailto:ametzler@bebt.de" target="_blank">ametzler@bebt.de</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">I am stumped, could you plese post the output of<br>
gnutls-cli -V -d 4711 <a href="http://freedns.afraid.org" rel="noreferrer" target="_blank">freedns.afraid.org</a><br>
<br></blockquote><div><br> $ gnutls-cli --version<br>gnutls-cli 3.3.8<br>...<br><br></div><div><br>$ gnutls-cli -V -d 4711 <a href="http://freedns.afraid.org" target="_blank">freedns.afraid.org</a><br>Processed 173 CA certificate(s).<br>Resolving '<a href="http://freedns.afraid.org" target="_blank">freedns.afraid.org</a>'...<br>Connecting to '50.23.197.94:443'...<br>|<5>| REC[0x239b450]: Allocating epoch #0<br>|<3>| ASSERT: gnutls_constate.c:586<br>|<5>| REC[0x239b450]: Allocating epoch #1<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256 (C0.86)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384 (C0.87)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256 (C0.72)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384 (C0.73)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_ECDSA_ARCFOUR_128_SHA1 (C0.07)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA384 (C0.28)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: ECDHE_RSA_ARCFOUR_128_SHA1 (C0.11)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_AES_256_GCM_SHA384 (00.9D)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_CAMELLIA_128_GCM_SHA256 (C0.7A)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_CAMELLIA_256_GCM_SHA384 (C0.7B)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA256 (<a href="http://00.BA" target="_blank">00.BA</a>)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA256 (00.C0)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_ARCFOUR_128_SHA1 (00.05)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: RSA_ARCFOUR_128_MD5 (00.04)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_RSA_AES_128_GCM_SHA256 (00.9E)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_RSA_AES_256_GCM_SHA384 (00.9F)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.7C)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.7D)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1 (00.33)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA256 (00.67)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1 (00.39)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA256 (00.6B)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA256 (<a href="http://00.BE" target="_blank">00.BE</a>)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA256 (00.C4)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1 (00.16)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_AES_128_GCM_SHA256 (00.A2)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_AES_256_GCM_SHA384 (00.A3)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_GCM_SHA256 (C0.80)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_GCM_SHA384 (C0.81)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1 (00.32)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA256 (00.40)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1 (00.38)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA256 (00.6A)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1 (00.44)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA256 (<a href="http://00.BD" target="_blank">00.BD</a>)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1 (00.87)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA256 (00.C3)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1 (00.13)<br>|<4>| HSK[0x239b450]: Keeping ciphersuite: DHE_DSS_ARCFOUR_128_SHA1 (00.66)<br>|<4>| EXT[0x239b450]: Sending extension STATUS REQUEST (5 bytes)<br>|<4>| EXT[0x239b450]: Sending extension SERVER NAME (23 bytes)<br>|<4>| EXT[0x239b450]: Sending extension SAFE RENEGOTIATION (1 bytes)<br>|<4>| EXT[0x239b450]: Sending extension SESSION TICKET (0 bytes)<br>|<4>| EXT[0x239b450]: Sending extension SUPPORTED ECC (12 bytes)<br>|<4>| EXT[0x239b450]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)<br>|<4>| EXT[0x239b450]: sent signature algo (4.1) RSA-SHA256<br>|<4>| EXT[0x239b450]: sent signature algo (4.2) DSA-SHA256<br>|<4>| EXT[0x239b450]: sent signature algo (4.3) ECDSA-SHA256<br>|<4>| EXT[0x239b450]: sent signature algo (5.1) RSA-SHA384<br>|<4>| EXT[0x239b450]: sent signature algo (5.3) ECDSA-SHA384<br>|<4>| EXT[0x239b450]: sent signature algo (6.1) RSA-SHA512<br>|<4>| EXT[0x239b450]: sent signature algo (6.3) ECDSA-SHA512<br>|<4>| EXT[0x239b450]: sent signature algo (3.1) RSA-SHA224<br>|<4>| EXT[0x239b450]: sent signature algo (3.2) DSA-SHA224<br>|<4>| EXT[0x239b450]: sent signature algo (3.3) ECDSA-SHA224<br>|<4>| EXT[0x239b450]: sent signature algo (2.1) RSA-SHA1<br>|<4>| EXT[0x239b450]: sent signature algo (2.2) DSA-SHA1<br>|<4>| EXT[0x239b450]: sent signature algo (2.3) ECDSA-SHA1<br>|<4>| EXT[0x239b450]: Sending extension SIGNATURE ALGORITHMS (28 bytes)<br>|<4>| HSK[0x239b450]: CLIENT HELLO was queued [276 bytes]<br>|<11>| HWRITE: enqueued [CLIENT HELLO] 276. Total 276 bytes.<br>|<11>| HWRITE FLUSH: 276 bytes in buffer.<br>|<5>| REC[0x239b450]: Preparing Packet Handshake(22) with length: 276 and min pad: 0<br>|<9>| ENC[0x239b450]: cipher: NULL, MAC: MAC-NULL, Epoch: 0<br>|<11>| WRITE: enqueued 281 bytes for 0x4. Total 281 bytes.<br>|<5>| REC[0x239b450]: Sent Packet[1] Handshake(22) in epoch 0 and length: 281<br>|<11>| HWRITE: wrote 1 bytes, 0 bytes left.<br>|<11>| WRITE FLUSH: 281 bytes in buffer.<br>|<11>| WRITE: wrote 281 bytes, 0 bytes left.<br>|<3>| ASSERT: gnutls_buffers.c:1104<br>|<10>| READ: Got 5 bytes from 0x4<br>|<10>| READ: read 5 bytes from 0x4<br>|<10>| RB: Have 0 bytes into buffer. Adding 5 bytes.<br>|<10>| RB: Requested 5 bytes<br>|<5>| REC[0x239b450]: SSL 84.84 Unknown Packet packet received. Epoch 0, length: 20527<br>|<3>| ASSERT: gnutls_record.c:598<br>|<1>| Received record packet of unknown type 72<br>|<3>| ASSERT: gnutls_record.c:1102<br>|<3>| ASSERT: gnutls_record.c:1185<br>|<3>| ASSERT: gnutls_buffers.c:1355<br>|<3>| ASSERT: gnutls_handshake.c:1428<br>|<3>| ASSERT: gnutls_handshake.c:2699<br>*** Fatal error: An unexpected TLS packet was received.<br>|<5>| REC: Sending Alert[2|10] - Unexpected message<br>|<5>| REC[0x239b450]: Preparing Packet Alert(21) with length: 2 and min pad: 0<br>|<9>| ENC[0x239b450]: cipher: NULL, MAC: MAC-NULL, Epoch: 0<br>|<11>| WRITE: enqueued 7 bytes for 0x4. Total 7 bytes.<br>|<11>| WRITE FLUSH: 7 bytes in buffer.<br>|<11>| WRITE: wrote 7 bytes, 0 bytes left.<br>|<5>| REC[0x239b450]: Sent Packet[2] Alert(21) in epoch 0 and length: 7<br>*** Handshake has failed<br>GnuTLS error: An unexpected TLS packet was received.<br>|<5>| REC[0x239b450]: Start of epoch cleanup<br>|<5>| REC[0x239b450]: End of epoch cleanup<br>|<5>| REC[0x239b450]: Epoch #0 freed<br>|<5>| REC[0x239b450]: Epoch #1 freed<br><br><br></div><div>And for <a href="http://google.com" target="_blank">google.com</a> if you need:<br><br>$ gnutls-cli -V -d 4711 <a href="http://google.com" target="_blank">google.com</a><br>Processed 173 CA certificate(s).<br>Resolving '<a href="http://google.com" target="_blank">google.com</a>'...<br>Connecting to '216.58.209.142:443'...<br>|<5>| REC[0x1cc8450]: Allocating epoch #0<br>|<3>| ASSERT: gnutls_constate.c:586<br>|<5>| REC[0x1cc8450]: Allocating epoch #1<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256 (C0.86)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384 (C0.87)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256 (C0.72)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384 (C0.73)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_ECDSA_ARCFOUR_128_SHA1 (C0.07)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA384 (C0.28)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: ECDHE_RSA_ARCFOUR_128_SHA1 (C0.11)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_AES_256_GCM_SHA384 (00.9D)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_CAMELLIA_128_GCM_SHA256 (C0.7A)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_CAMELLIA_256_GCM_SHA384 (C0.7B)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA256 (<a href="http://00.BA" target="_blank">00.BA</a>)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA256 (00.C0)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_ARCFOUR_128_SHA1 (00.05)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: RSA_ARCFOUR_128_MD5 (00.04)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_RSA_AES_128_GCM_SHA256 (00.9E)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_RSA_AES_256_GCM_SHA384 (00.9F)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.7C)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.7D)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1 (00.33)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA256 (00.67)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1 (00.39)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA256 (00.6B)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA256 (<a href="http://00.BE" target="_blank">00.BE</a>)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA256 (00.C4)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1 (00.16)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_AES_128_GCM_SHA256 (00.A2)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_AES_256_GCM_SHA384 (00.A3)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_GCM_SHA256 (C0.80)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_GCM_SHA384 (C0.81)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1 (00.32)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA256 (00.40)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1 (00.38)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA256 (00.6A)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1 (00.44)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA256 (<a href="http://00.BD" target="_blank">00.BD</a>)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1 (00.87)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA256 (00.C3)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1 (00.13)<br>|<4>| HSK[0x1cc8450]: Keeping ciphersuite: DHE_DSS_ARCFOUR_128_SHA1 (00.66)<br>|<4>| EXT[0x1cc8450]: Sending extension STATUS REQUEST (5 bytes)<br>|<4>| EXT[0x1cc8450]: Sending extension SERVER NAME (15 bytes)<br>|<4>| EXT[0x1cc8450]: Sending extension SAFE RENEGOTIATION (1 bytes)<br>|<4>| EXT[0x1cc8450]: Sending extension SESSION TICKET (0 bytes)<br>|<4>| EXT[0x1cc8450]: Sending extension SUPPORTED ECC (12 bytes)<br>|<4>| EXT[0x1cc8450]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)<br>|<4>| EXT[0x1cc8450]: sent signature algo (4.1) RSA-SHA256<br>|<4>| EXT[0x1cc8450]: sent signature algo (4.2) DSA-SHA256<br>|<4>| EXT[0x1cc8450]: sent signature algo (4.3) ECDSA-SHA256<br>|<4>| EXT[0x1cc8450]: sent signature algo (5.1) RSA-SHA384<br>|<4>| EXT[0x1cc8450]: sent signature algo (5.3) ECDSA-SHA384<br>|<4>| EXT[0x1cc8450]: sent signature algo (6.1) RSA-SHA512<br>|<4>| EXT[0x1cc8450]: sent signature algo (6.3) ECDSA-SHA512<br>|<4>| EXT[0x1cc8450]: sent signature algo (3.1) RSA-SHA224<br>|<4>| EXT[0x1cc8450]: sent signature algo (3.2) DSA-SHA224<br>|<4>| EXT[0x1cc8450]: sent signature algo (3.3) ECDSA-SHA224<br>|<4>| EXT[0x1cc8450]: sent signature algo (2.1) RSA-SHA1<br>|<4>| EXT[0x1cc8450]: sent signature algo (2.2) DSA-SHA1<br>|<4>| EXT[0x1cc8450]: sent signature algo (2.3) ECDSA-SHA1<br>|<4>| EXT[0x1cc8450]: Sending extension SIGNATURE ALGORITHMS (28 bytes)<br>|<4>| HSK[0x1cc8450]: CLIENT HELLO was queued [268 bytes]<br>|<11>| HWRITE: enqueued [CLIENT HELLO] 268. Total 268 bytes.<br>|<11>| HWRITE FLUSH: 268 bytes in buffer.<br>|<5>| REC[0x1cc8450]: Preparing Packet Handshake(22) with length: 268 and min pad: 0<br>|<9>| ENC[0x1cc8450]: cipher: NULL, MAC: MAC-NULL, Epoch: 0<br>|<11>| WRITE: enqueued 273 bytes for 0x4. Total 273 bytes.<br>|<5>| REC[0x1cc8450]: Sent Packet[1] Handshake(22) in epoch 0 and length: 273<br>|<11>| HWRITE: wrote 1 bytes, 0 bytes left.<br>|<11>| WRITE FLUSH: 273 bytes in buffer.<br>|<11>| WRITE: wrote 273 bytes, 0 bytes left.<br>|<3>| ASSERT: gnutls_buffers.c:1104<br>|<10>| READ: Got 5 bytes from 0x4<br>|<10>| READ: read 5 bytes from 0x4<br>|<10>| RB: Have 0 bytes into buffer. Adding 5 bytes.<br>|<10>| RB: Requested 5 bytes<br>|<5>| REC[0x1cc8450]: SSL 84.84 Unknown Packet packet received. Epoch 0, length: 20527<br>|<3>| ASSERT: gnutls_record.c:598<br>|<1>| Received record packet of unknown type 72<br>|<3>| ASSERT: gnutls_record.c:1102<br>|<3>| ASSERT: gnutls_record.c:1185<br>|<3>| ASSERT: gnutls_buffers.c:1355<br>|<3>| ASSERT: gnutls_handshake.c:1428<br>|<3>| ASSERT: gnutls_handshake.c:2699<br>*** Fatal error: An unexpected TLS packet was received.<br>|<5>| REC: Sending Alert[2|10] - Unexpected message<br>|<5>| REC[0x1cc8450]: Preparing Packet Alert(21) with length: 2 and min pad: 0<br>|<9>| ENC[0x1cc8450]: cipher: NULL, MAC: MAC-NULL, Epoch: 0<br>|<11>| WRITE: enqueued 7 bytes for 0x4. Total 7 bytes.<br>|<11>| WRITE FLUSH: 7 bytes in buffer.<br>|<11>| WRITE: wrote 7 bytes, 0 bytes left.<br>|<5>| REC[0x1cc8450]: Sent Packet[2] Alert(21) in epoch 0 and length: 7<br>*** Handshake has failed<br>GnuTLS error: An unexpected TLS packet was received.<br>|<5>| REC[0x1cc8450]: Start of epoch cleanup<br>|<5>| REC[0x1cc8450]: End of epoch cleanup<br>|<5>| REC[0x1cc8450]: Epoch #0 freed<br>|<5>| REC[0x1cc8450]: Epoch #1 freed<br><br></div><div><br> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
PS: I would appreciate<br>
<a href="https://www.netmeister.org/news/learn2quote.html" rel="noreferrer" target="_blank">https://www.netmeister.org/news/learn2quote.html</a> if possible. TIA<br></blockquote><div><br></div><div>Yes, it's almost <span lang="en"><span>forgotten</span> <span>art</span></span>today ;)<br><br></div><div>WBR, Alex.<br></div></div><br></div></div>