Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- mime@kira:~ % gnutls-cli -p 5556 GFDGFDGSFD --priority "NORMAL:%COMPAT:-VERS-TLS1.1:+ARCFOUR-40:+RSA-EXPORT" -d 4711 -V
- Resolving 'GFDGFDGSFD'...
- Connecting to '192.168.2.6:5556'...
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
- |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: PSK_SHA_AES_128_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: PSK_SHA_AES_256_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: PSK_SHA_ARCFOUR_SHA1
- |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
- |<2>| EXT[0x8063ca0]: Sending extension CERT_TYPE
- |<2>| EXT[0x8063ca0]: Sending extension SERVER_NAME
- |<3>| HSK[0x8063ca0]: CLIENT HELLO was send [125 bytes]
- |<6>| BUF[HSK]: Peeked 0 bytes of Data
- |<6>| BUF[HSK]: Emptied buffer
- |<4>| REC[0x8063ca0]: Sending Packet[0] Handshake(22) with length: 125
- |<2>| ASSERT: gnutls_cipher.c:204
- |<7>| WRITE: Will write 130 bytes to 0x4.
- |<7>| WRITE: wrote 130 bytes to 0x4. Left 0 bytes. Total 130 bytes.
- |<7>| 0000 - 16 03 01 00 7d 01 00 00 79 03 01 4b 7a 5d 82 5a
- |<7>| 0001 - f2 8e 04 ff b7 95 f5 c9 08 78 7b c9 fe ae 40 02
- |<7>| 0002 - 38 73 1f dd 33 6a 23 5a db 7c 0f 00 00 36 00 33
- |<7>| 0003 - 00 45 00 39 00 88 00 16 00 32 00 44 00 38 00 87
- |<7>| 0004 - 00 13 00 66 00 90 00 91 00 8f 00 8e 00 2f 00 41
- |<7>| 0005 - 00 35 00 84 00 0a 00 05 00 04 00 8c 00 8d 00 8b
- |<7>| 0006 - 00 8a 00 03 01 00 00 1a 00 09 00 03 02 00 01 00
- |<7>| 0007 - 00 00 0f 00 0d 00 00 0a 47 46 44 47 46 44 47 53
- |<7>| 0008 - 46 44
- |<4>| REC[0x8063ca0]: Sent Packet[1] Handshake(22) with length: 130
- |<7>| READ: Got 5 bytes from 0x4
- |<7>| READ: read 5 bytes from 0x4
- |<7>| 0000 - 16 03 01 00 3a
- |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
- |<7>| RB: Requested 5 bytes
- |<4>| REC[0x8063ca0]: Expected Packet[0] Handshake(22) with length: 1
- |<4>| REC[0x8063ca0]: Received Packet[0] Handshake(22) with length: 58
- |<7>| READ: Got 58 bytes from 0x4
- |<7>| READ: read 58 bytes from 0x4
- |<7>| 0000 - 02 00 00 36 03 01 4b 7a 5e 44 63 88 81 ed a4 89
- |<7>| 0001 - d0 c6 49 64 86 81 bd 1d 6c 1f 8c 23 5b 84 a7 95
- |<7>| 0002 - f3 3e dc 11 f9 60 10 da c0 9a c7 4c 3a dc 1f 42
- |<7>| 0003 - 00 8c 46 7c 74 f2 a9 00 03 00
- |<7>| RB: Have 5 bytes into buffer. Adding 58 bytes.
- |<7>| RB: Requested 63 bytes
- |<2>| ASSERT: gnutls_cipher.c:204
- |<4>| REC[0x8063ca0]: Decrypted Packet[0] Handshake(22) with length: 58
- |<6>| BUF[HSK]: Inserted 58 bytes of Data(22)
- |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
- |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
- |<3>| HSK[0x8063ca0]: SERVER HELLO was received [58 bytes]
- |<6>| BUF[REC][HD]: Read 54 bytes of Data(22)
- |<6>| BUF[HSK]: Peeked 0 bytes of Data
- |<6>| BUF[HSK]: Emptied buffer
- |<6>| BUF[HSK]: Inserted 4 bytes of Data
- |<6>| BUF[HSK]: Inserted 54 bytes of Data
- |<3>| HSK[0x8063ca0]: Server's version: 3.1
- |<3>| HSK[0x8063ca0]: SessionID length: 16
- |<3>| HSK[0x8063ca0]: SessionID: dac09ac74c3adc1f42008c467c74f2a9
- |<3>| HSK[0x8063ca0]: Selected cipher suite: RSA_EXPORT_ARCFOUR_40_MD5
- |<2>| ASSERT: gnutls_extensions.c:124
- |<7>| READ: Got 5 bytes from 0x4
- |<7>| READ: read 5 bytes from 0x4
- |<7>| 0000 - 16 03 01 01 f9
- |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
- |<7>| RB: Requested 5 bytes
- |<4>| REC[0x8063ca0]: Expected Packet[1] Handshake(22) with length: 1
- |<4>| REC[0x8063ca0]: Received Packet[1] Handshake(22) with length: 505
- |<7>| READ: Got 505 bytes from 0x4
- |<7>| READ: read 505 bytes from 0x4
- |<7>| 0000 - 0b 00 01 f5 00 01 f2 00 01 ef 30 82 01 eb 30 82
- |<7>| 0001 - 01 95 02 10 2b d5 0a 02 43 29 0c 58 aa 52 5d 6c
- |<7>| 0002 - a7 28 4c 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01
- |<7>| 0003 - 04 05 00 30 79 31 0b 30 09 06 03 55 04 06 13 02
- |<7>| 0004 - 55 53 31 10 30 0e 06 03 55 04 08 13 07 4d 79 53
- |<7>| 0005 - 74 61 74 65 31 0f 30 0d 06 03 55 04 07 13 06 4d
- |<7>| 0006 - 79 54 6f 77 6e 31 17 30 15 06 03 55 04 0a 13 0e
- |<7>| 0007 - 4d 79 4f 72 67 61 6e 69 7a 61 74 69 6f 6e 31 19
- |<7>| 0008 - 30 17 06 03 55 04 0b 13 10 46 4f 52 20 54 45 53
- |<7>| 0009 - 54 49 4e 47 20 4f 4e 4c 59 31 13 30 11 06 03 55
- |<7>| 000a - 04 03 13 0a 43 65 72 74 47 65 6e 43 41 42 30 1e
- |<7>| 000b - 17 0d 31 30 30 32 31 34 31 30 32 31 33 38 5a 17
- |<7>| 000c - 0d 32 35 30 32 31 35 31 30 32 31 33 38 5a 30 79
- |<7>| 000d - 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 10 30
- |<7>| 000e - 0e 06 03 55 04 08 16 07 4d 79 53 74 61 74 65 31
- |<7>| 000f - 0f 30 0d 06 03 55 04 07 16 06 4d 79 54 6f 77 6e
- |<7>| 0010 - 31 17 30 15 06 03 55 04 0a 16 0e 4d 79 4f 72 67
- |<7>| 0011 - 61 6e 69 7a 61 74 69 6f 6e 31 19 30 17 06 03 55
- |<7>| 0012 - 04 0b 16 10 46 4f 52 20 54 45 53 54 49 4e 47 20
- |<7>| 0013 - 4f 4e 4c 59 31 13 30 11 06 03 55 04 03 16 0a 47
- |<7>| 0014 - 46 44 47 46 44 47 53 46 44 30 5c 30 0d 06 09 2a
- |<7>| 0015 - 86 48 86 f7 0d 01 01 01 05 00 03 4b 00 30 48 02
- |<7>| 0016 - 41 00 a9 d1 b4 94 a1 ad 64 94 f9 7a 62 a9 b6 3b
- |<7>| 0017 - 82 9d 38 0f 18 d6 9e fc e5 cc cd dc ec dc 60 a8
- |<7>| 0018 - bf 0b 8f 0c 3d c1 ff 40 ef df 93 d3 ff 66 c1 a2
- |<7>| 0019 - fb 25 aa 81 0c b9 db 08 35 88 0e fa 51 90 b6 b6
- |<7>| 001a - 73 29 02 03 01 00 01 30 0d 06 09 2a 86 48 86 f7
- |<7>| 001b - 0d 01 01 04 05 00 03 41 00 6e 3d 07 1f 7b cd 0d
- |<7>| 001c - 5f 18 ac cd 2d d5 88 15 01 d8 d3 fb 92 a5 79 85
- |<7>| 001d - e3 be 77 f8 ed 2c d0 48 98 1d 43 a4 35 47 08 c8
- |<7>| 001e - 8a b5 19 ea 9d af 7d b8 05 4a 6b 4e d7 25 a8 8d
- |<7>| 001f - 7d 6d b1 99 20 a9 c2 40 2d
- |<7>| RB: Have 5 bytes into buffer. Adding 505 bytes.
- |<7>| RB: Requested 510 bytes
- |<2>| ASSERT: gnutls_cipher.c:204
- |<4>| REC[0x8063ca0]: Decrypted Packet[1] Handshake(22) with length: 505
- |<6>| BUF[HSK]: Inserted 505 bytes of Data(22)
- |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
- |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
- |<3>| HSK[0x8063ca0]: CERTIFICATE was received [505 bytes]
- |<6>| BUF[REC][HD]: Read 501 bytes of Data(22)
- |<6>| BUF[HSK]: Peeked 58 bytes of Data
- |<6>| BUF[HSK]: Emptied buffer
- |<6>| BUF[HSK]: Inserted 4 bytes of Data
- |<6>| BUF[HSK]: Inserted 501 bytes of Data
- |<2>| ASSERT: gnutls_kx.c:388
- |<7>| READ: Got 5 bytes from 0x4
- |<7>| READ: read 5 bytes from 0x4
- |<7>| 0000 - 16 03 01 00 04
- |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
- |<7>| RB: Requested 5 bytes
- |<4>| REC[0x8063ca0]: Expected Packet[2] Handshake(22) with length: 1
- |<4>| REC[0x8063ca0]: Received Packet[2] Handshake(22) with length: 4
- |<7>| READ: Got 4 bytes from 0x4
- |<7>| READ: read 4 bytes from 0x4
- |<7>| 0000 - 0e 00 00 00
- |<7>| RB: Have 5 bytes into buffer. Adding 4 bytes.
- |<7>| RB: Requested 9 bytes
- |<2>| ASSERT: gnutls_cipher.c:204
- |<4>| REC[0x8063ca0]: Decrypted Packet[2] Handshake(22) with length: 4
- |<6>| BUF[HSK]: Inserted 4 bytes of Data(22)
- |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
- |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
- |<3>| HSK[0x8063ca0]: SERVER HELLO DONE was received [4 bytes]
- |<2>| ASSERT: gnutls_handshake.c:1123
- |<6>| BUF[HSK]: Peeked 505 bytes of Data
- |<6>| BUF[HSK]: Emptied buffer
- |<6>| BUF[HSK]: Inserted 4 bytes of Data
- |<3>| HSK[0x8063ca0]: CLIENT KEY EXCHANGE was send [70 bytes]
- |<6>| BUF[HSK]: Peeked 4 bytes of Data
- |<6>| BUF[HSK]: Emptied buffer
- |<4>| REC[0x8063ca0]: Sending Packet[1] Handshake(22) with length: 70
- |<2>| ASSERT: gnutls_cipher.c:204
- |<7>| WRITE: Will write 75 bytes to 0x4.
- |<7>| WRITE: wrote 75 bytes to 0x4. Left 0 bytes. Total 75 bytes.
- |<7>| 0000 - 16 03 01 00 46 10 00 00 42 00 40 93 6b 18 8a d8
- |<7>| 0001 - bb 01 35 c6 79 1a e6 f6 61 ba 17 1d 20 f9 1f 12
- |<7>| 0002 - f4 9a 85 08 f9 42 a3 8e 9d 72 0c 06 12 ee 67 4e
- |<7>| 0003 - 53 fd a0 3f 71 7b be ca f2 6c 04 65 cc b2 64 46
- |<7>| 0004 - 9c e5 49 25 cd a0 d1 72 c0 f3 fb
- |<4>| REC[0x8063ca0]: Sent Packet[2] Handshake(22) with length: 75
- |<3>| REC[0x8063ca0]: Sent ChangeCipherSpec
- |<4>| REC[0x8063ca0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
- |<2>| ASSERT: gnutls_cipher.c:204
- |<7>| WRITE: Will write 6 bytes to 0x4.
- |<7>| WRITE: wrote 6 bytes to 0x4. Left 0 bytes. Total 6 bytes.
- |<7>| 0000 - 14 03 01 00 01 01
- |<4>| REC[0x8063ca0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
- |<9>| INT: PREMASTER SECRET[48]: 030134fead9e2189d272927d3d91e952994f0259b98ab55e027c9dfa35781fcb67bc2071cd38444783d3c25d3bf20ea3
- |<9>| INT: CLIENT RANDOM[32]: 4b7a5d825af28e04ffb795f5c908787bc9feae400238731fdd336a235adb7c0f
- |<9>| INT: SERVER RANDOM[32]: 4b7a5e44638881eda489d0c649648681bd1d6c1f8c235b84a795f33edc11f960
- |<9>| INT: MASTER SECRET: 1c026281862fd4fcf09243a19c291f6223adffcd0db7ac8386da009bf4e33499e3eee41968a8980a973cb67ca0b2d3f9
- |<9>| INT: KEY BLOCK[42]: 85ad38d3166b2547d0c54ad1f9b331f86154679fc5f6e556354f24ff135e9840
- |<9>| INT: CLIENT WRITE KEY [16]: 0a9906f39fba820b9b0bacbcf61c011c
- |<9>| INT: SERVER WRITE KEY [16]: 59cc0b19e00243f77b99b9f2961596a2
- |<3>| HSK[0x8063ca0]: Cipher Suite: RSA_EXPORT_ARCFOUR_40_MD5
- |<3>| HSK[0x8063ca0]: Initializing internal [write] cipher sessions
- |<6>| BUF[HSK]: Peeked 0 bytes of Data
- |<6>| BUF[HSK]: Emptied buffer
- |<3>| HSK[0x8063ca0]: FINISHED was send [16 bytes]
- |<6>| BUF[HSK]: Peeked 0 bytes of Data
- |<6>| BUF[HSK]: Emptied buffer
- |<4>| REC[0x8063ca0]: Sending Packet[0] Handshake(22) with length: 16
- |<7>| WRITE: Will write 37 bytes to 0x4.
- |<7>| WRITE: wrote 37 bytes to 0x4. Left 0 bytes. Total 37 bytes.
- |<7>| 0000 - 16 03 01 00 20 d4 3b 41 09 88 1c a1 c0 ac 8f ce
- |<7>| 0001 - 9a 1e ae ab df fc 19 cd ff cb 83 9b b5 38 5e 72
- |<7>| 0002 - 65 47 cb 62 10
- |<4>| REC[0x8063ca0]: Sent Packet[1] Handshake(22) with length: 37
- |<7>| READ: Got 5 bytes from 0x4
- |<7>| READ: read 5 bytes from 0x4
- |<7>| 0000 - 14 03 01 00 01
- |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
- |<7>| RB: Requested 5 bytes
- |<4>| REC[0x8063ca0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
- |<4>| REC[0x8063ca0]: Received Packet[3] Change Cipher Spec(20) with length: 1
- |<7>| READ: Got 1 bytes from 0x4
- |<7>| READ: read 1 bytes from 0x4
- |<7>| 0000 - 01
- |<7>| RB: Have 5 bytes into buffer. Adding 1 bytes.
- |<7>| RB: Requested 6 bytes
- |<2>| ASSERT: gnutls_cipher.c:204
- |<4>| REC[0x8063ca0]: ChangeCipherSpec Packet was received
- |<3>| HSK[0x8063ca0]: Cipher Suite: RSA_EXPORT_ARCFOUR_40_MD5
- |<3>| HSK[0x8063ca0]: Initializing internal [read] cipher sessions
- |<7>| READ: Got 5 bytes from 0x4
- |<7>| READ: read 5 bytes from 0x4
- |<7>| 0000 - 16 03 01 00 20
- |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
- |<7>| RB: Requested 5 bytes
- |<4>| REC[0x8063ca0]: Expected Packet[0] Handshake(22) with length: 1
- |<4>| REC[0x8063ca0]: Received Packet[0] Handshake(22) with length: 32
- |<7>| READ: Got 32 bytes from 0x4
- |<7>| READ: read 32 bytes from 0x4
- |<7>| 0000 - ec ba d5 31 bf 3d 3b e7 66 c6 d5 43 ef 19 c2 05
- |<7>| 0001 - d3 f6 a8 20 8d 82 fb db e8 e9 ac 0f 93 5b 0d 36
- |<7>| 0002 -
- |<7>| RB: Have 5 bytes into buffer. Adding 32 bytes.
- |<7>| RB: Requested 37 bytes
- |<4>| REC[0x8063ca0]: Decrypted Packet[0] Handshake(22) with length: 16
- |<6>| BUF[HSK]: Inserted 16 bytes of Data(22)
- |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
- |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
- |<3>| HSK[0x8063ca0]: FINISHED was received [16 bytes]
- |<6>| BUF[REC][HD]: Read 12 bytes of Data(22)
- |<6>| BUF[HSK]: Peeked 0 bytes of Data
- |<6>| BUF[HSK]: Emptied buffer
- |<6>| BUF[HSK]: Inserted 4 bytes of Data
- |<6>| BUF[HSK]: Inserted 12 bytes of Data
- |<6>| BUF[HSK]: Cleared Data from buffer
- |<2>| ASSERT: ext_server_name.c:262
- - Certificate type: X.509
- - Got a certificate list of 1 certificates.
- - Certificate[0] info:
- - X.509 Certificate Information:
- Version: 1
- Serial Number (hex): 2bd50a0243290c58aa525d6ca7284c01
- Issuer: C=US,ST=MyState,L=MyTown,O=MyOrganization,OU=FOR TESTING ONLY,CN=CertGenCAB
- Validity:
- Not Before: Sun Feb 14 10:21:38 UTC 2010
- Not After: Sat Feb 15 10:21:38 UTC 2025
- Subject: C=US,ST=MyState,L=MyTown,O=MyOrganization,OU=FOR TESTING ONLY,CN=GFDGFDGSFD
- Subject Public Key Algorithm: RSA
- Modulus (bits 512):
- a9:d1:b4:94:a1:ad:64:94:f9:7a:62:a9:b6:3b:82:9d
- 38:0f:18:d6:9e:fc:e5:cc:cd:dc:ec:dc:60:a8:bf:0b
- 8f:0c:3d:c1:ff:40:ef:df:93:d3:ff:66:c1:a2:fb:25
- aa:81:0c:b9:db:08:35:88:0e:fa:51:90:b6:b6:73:29
- Exponent (bits 24):
- 01:00:01
- Signature Algorithm: RSA-MD5
- warning: signed using a broken signature algorithm that can be forged.
- Signature:
- 6e:3d:07:1f:7b:cd:0d:5f:18:ac:cd:2d:d5:88:15:01
- d8:d3:fb:92:a5:79:85:e3:be:77:f8:ed:2c:d0:48:98
- 1d:43:a4:35:47:08:c8:8a:b5:19:ea:9d:af:7d:b8:05
- 4a:6b:4e:d7:25:a8:8d:7d:6d:b1:99:20:a9:c2:40:2d
- Other Information:
- MD5 fingerprint:
- 5095a265575f61e6910b33efe2afb3a5
- SHA-1 fingerprint:
- aab4b6f0dcd6486e43661455865dd365dc5cb164
- Public Key Id:
- 8f9e09b4aa02a36fbef840f2858f32e9bc196298
- - The hostname in the certificate matches 'GFDGFDGSFD'.
- |<2>| ASSERT: verify.c:281
- |<2>| ASSERT: verify.c:474
- - Peer's certificate issuer is unknown
- - Peer's certificate is NOT trusted
- - Version: TLS1.0
- - Key Exchange: RSA-EXPORT
- - Cipher: ARCFOUR-40
- - MAC: MD5
- - Compression: NULL
- - Session ID: DA:C0:9A:C7:4C:3A:DC:1F:42:00:8C:46:7C:74:F2:A9
- - Handshake was completed
- - Simple Client Mode:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement