Advertisement
Guest User

Untitled

a guest
Feb 16th, 2010
147
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.32 KB | None | 0 0
  1. mime@kira:~ % gnutls-cli -p 5556 GFDGFDGSFD --priority "NORMAL:%COMPAT:-VERS-TLS1.1:+ARCFOUR-40:+RSA-EXPORT" -d 4711 -V
  2. Resolving 'GFDGFDGSFD'...
  3. Connecting to '192.168.2.6:5556'...
  4. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
  5. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
  6. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
  7. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
  8. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
  9. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
  10. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
  11. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
  12. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
  13. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
  14. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
  15. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
  16. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
  17. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
  18. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
  19. |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
  20. |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
  21. |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
  22. |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
  23. |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
  24. |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
  25. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
  26. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
  27. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
  28. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
  29. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
  30. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
  31. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
  32. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: PSK_SHA_AES_128_CBC_SHA1
  33. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: PSK_SHA_AES_256_CBC_SHA1
  34. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
  35. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: PSK_SHA_ARCFOUR_SHA1
  36. |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
  37. |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
  38. |<3>| HSK[0x8063ca0]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
  39. |<3>| HSK[0x8063ca0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
  40. |<2>| EXT[0x8063ca0]: Sending extension CERT_TYPE
  41. |<2>| EXT[0x8063ca0]: Sending extension SERVER_NAME
  42. |<3>| HSK[0x8063ca0]: CLIENT HELLO was send [125 bytes]
  43. |<6>| BUF[HSK]: Peeked 0 bytes of Data
  44. |<6>| BUF[HSK]: Emptied buffer
  45. |<4>| REC[0x8063ca0]: Sending Packet[0] Handshake(22) with length: 125
  46. |<2>| ASSERT: gnutls_cipher.c:204
  47. |<7>| WRITE: Will write 130 bytes to 0x4.
  48. |<7>| WRITE: wrote 130 bytes to 0x4. Left 0 bytes. Total 130 bytes.
  49. |<7>| 0000 - 16 03 01 00 7d 01 00 00 79 03 01 4b 7a 5d 82 5a
  50. |<7>| 0001 - f2 8e 04 ff b7 95 f5 c9 08 78 7b c9 fe ae 40 02
  51. |<7>| 0002 - 38 73 1f dd 33 6a 23 5a db 7c 0f 00 00 36 00 33
  52. |<7>| 0003 - 00 45 00 39 00 88 00 16 00 32 00 44 00 38 00 87
  53. |<7>| 0004 - 00 13 00 66 00 90 00 91 00 8f 00 8e 00 2f 00 41
  54. |<7>| 0005 - 00 35 00 84 00 0a 00 05 00 04 00 8c 00 8d 00 8b
  55. |<7>| 0006 - 00 8a 00 03 01 00 00 1a 00 09 00 03 02 00 01 00
  56. |<7>| 0007 - 00 00 0f 00 0d 00 00 0a 47 46 44 47 46 44 47 53
  57. |<7>| 0008 - 46 44
  58. |<4>| REC[0x8063ca0]: Sent Packet[1] Handshake(22) with length: 130
  59. |<7>| READ: Got 5 bytes from 0x4
  60. |<7>| READ: read 5 bytes from 0x4
  61. |<7>| 0000 - 16 03 01 00 3a
  62. |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
  63. |<7>| RB: Requested 5 bytes
  64. |<4>| REC[0x8063ca0]: Expected Packet[0] Handshake(22) with length: 1
  65. |<4>| REC[0x8063ca0]: Received Packet[0] Handshake(22) with length: 58
  66. |<7>| READ: Got 58 bytes from 0x4
  67. |<7>| READ: read 58 bytes from 0x4
  68. |<7>| 0000 - 02 00 00 36 03 01 4b 7a 5e 44 63 88 81 ed a4 89
  69. |<7>| 0001 - d0 c6 49 64 86 81 bd 1d 6c 1f 8c 23 5b 84 a7 95
  70. |<7>| 0002 - f3 3e dc 11 f9 60 10 da c0 9a c7 4c 3a dc 1f 42
  71. |<7>| 0003 - 00 8c 46 7c 74 f2 a9 00 03 00
  72. |<7>| RB: Have 5 bytes into buffer. Adding 58 bytes.
  73. |<7>| RB: Requested 63 bytes
  74. |<2>| ASSERT: gnutls_cipher.c:204
  75. |<4>| REC[0x8063ca0]: Decrypted Packet[0] Handshake(22) with length: 58
  76. |<6>| BUF[HSK]: Inserted 58 bytes of Data(22)
  77. |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
  78. |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
  79. |<3>| HSK[0x8063ca0]: SERVER HELLO was received [58 bytes]
  80. |<6>| BUF[REC][HD]: Read 54 bytes of Data(22)
  81. |<6>| BUF[HSK]: Peeked 0 bytes of Data
  82. |<6>| BUF[HSK]: Emptied buffer
  83. |<6>| BUF[HSK]: Inserted 4 bytes of Data
  84. |<6>| BUF[HSK]: Inserted 54 bytes of Data
  85. |<3>| HSK[0x8063ca0]: Server's version: 3.1
  86. |<3>| HSK[0x8063ca0]: SessionID length: 16
  87. |<3>| HSK[0x8063ca0]: SessionID: dac09ac74c3adc1f42008c467c74f2a9
  88. |<3>| HSK[0x8063ca0]: Selected cipher suite: RSA_EXPORT_ARCFOUR_40_MD5
  89. |<2>| ASSERT: gnutls_extensions.c:124
  90. |<7>| READ: Got 5 bytes from 0x4
  91. |<7>| READ: read 5 bytes from 0x4
  92. |<7>| 0000 - 16 03 01 01 f9
  93. |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
  94. |<7>| RB: Requested 5 bytes
  95. |<4>| REC[0x8063ca0]: Expected Packet[1] Handshake(22) with length: 1
  96. |<4>| REC[0x8063ca0]: Received Packet[1] Handshake(22) with length: 505
  97. |<7>| READ: Got 505 bytes from 0x4
  98. |<7>| READ: read 505 bytes from 0x4
  99. |<7>| 0000 - 0b 00 01 f5 00 01 f2 00 01 ef 30 82 01 eb 30 82
  100. |<7>| 0001 - 01 95 02 10 2b d5 0a 02 43 29 0c 58 aa 52 5d 6c
  101. |<7>| 0002 - a7 28 4c 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01
  102. |<7>| 0003 - 04 05 00 30 79 31 0b 30 09 06 03 55 04 06 13 02
  103. |<7>| 0004 - 55 53 31 10 30 0e 06 03 55 04 08 13 07 4d 79 53
  104. |<7>| 0005 - 74 61 74 65 31 0f 30 0d 06 03 55 04 07 13 06 4d
  105. |<7>| 0006 - 79 54 6f 77 6e 31 17 30 15 06 03 55 04 0a 13 0e
  106. |<7>| 0007 - 4d 79 4f 72 67 61 6e 69 7a 61 74 69 6f 6e 31 19
  107. |<7>| 0008 - 30 17 06 03 55 04 0b 13 10 46 4f 52 20 54 45 53
  108. |<7>| 0009 - 54 49 4e 47 20 4f 4e 4c 59 31 13 30 11 06 03 55
  109. |<7>| 000a - 04 03 13 0a 43 65 72 74 47 65 6e 43 41 42 30 1e
  110. |<7>| 000b - 17 0d 31 30 30 32 31 34 31 30 32 31 33 38 5a 17
  111. |<7>| 000c - 0d 32 35 30 32 31 35 31 30 32 31 33 38 5a 30 79
  112. |<7>| 000d - 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 10 30
  113. |<7>| 000e - 0e 06 03 55 04 08 16 07 4d 79 53 74 61 74 65 31
  114. |<7>| 000f - 0f 30 0d 06 03 55 04 07 16 06 4d 79 54 6f 77 6e
  115. |<7>| 0010 - 31 17 30 15 06 03 55 04 0a 16 0e 4d 79 4f 72 67
  116. |<7>| 0011 - 61 6e 69 7a 61 74 69 6f 6e 31 19 30 17 06 03 55
  117. |<7>| 0012 - 04 0b 16 10 46 4f 52 20 54 45 53 54 49 4e 47 20
  118. |<7>| 0013 - 4f 4e 4c 59 31 13 30 11 06 03 55 04 03 16 0a 47
  119. |<7>| 0014 - 46 44 47 46 44 47 53 46 44 30 5c 30 0d 06 09 2a
  120. |<7>| 0015 - 86 48 86 f7 0d 01 01 01 05 00 03 4b 00 30 48 02
  121. |<7>| 0016 - 41 00 a9 d1 b4 94 a1 ad 64 94 f9 7a 62 a9 b6 3b
  122. |<7>| 0017 - 82 9d 38 0f 18 d6 9e fc e5 cc cd dc ec dc 60 a8
  123. |<7>| 0018 - bf 0b 8f 0c 3d c1 ff 40 ef df 93 d3 ff 66 c1 a2
  124. |<7>| 0019 - fb 25 aa 81 0c b9 db 08 35 88 0e fa 51 90 b6 b6
  125. |<7>| 001a - 73 29 02 03 01 00 01 30 0d 06 09 2a 86 48 86 f7
  126. |<7>| 001b - 0d 01 01 04 05 00 03 41 00 6e 3d 07 1f 7b cd 0d
  127. |<7>| 001c - 5f 18 ac cd 2d d5 88 15 01 d8 d3 fb 92 a5 79 85
  128. |<7>| 001d - e3 be 77 f8 ed 2c d0 48 98 1d 43 a4 35 47 08 c8
  129. |<7>| 001e - 8a b5 19 ea 9d af 7d b8 05 4a 6b 4e d7 25 a8 8d
  130. |<7>| 001f - 7d 6d b1 99 20 a9 c2 40 2d
  131. |<7>| RB: Have 5 bytes into buffer. Adding 505 bytes.
  132. |<7>| RB: Requested 510 bytes
  133. |<2>| ASSERT: gnutls_cipher.c:204
  134. |<4>| REC[0x8063ca0]: Decrypted Packet[1] Handshake(22) with length: 505
  135. |<6>| BUF[HSK]: Inserted 505 bytes of Data(22)
  136. |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
  137. |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
  138. |<3>| HSK[0x8063ca0]: CERTIFICATE was received [505 bytes]
  139. |<6>| BUF[REC][HD]: Read 501 bytes of Data(22)
  140. |<6>| BUF[HSK]: Peeked 58 bytes of Data
  141. |<6>| BUF[HSK]: Emptied buffer
  142. |<6>| BUF[HSK]: Inserted 4 bytes of Data
  143. |<6>| BUF[HSK]: Inserted 501 bytes of Data
  144. |<2>| ASSERT: gnutls_kx.c:388
  145. |<7>| READ: Got 5 bytes from 0x4
  146. |<7>| READ: read 5 bytes from 0x4
  147. |<7>| 0000 - 16 03 01 00 04
  148. |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
  149. |<7>| RB: Requested 5 bytes
  150. |<4>| REC[0x8063ca0]: Expected Packet[2] Handshake(22) with length: 1
  151. |<4>| REC[0x8063ca0]: Received Packet[2] Handshake(22) with length: 4
  152. |<7>| READ: Got 4 bytes from 0x4
  153. |<7>| READ: read 4 bytes from 0x4
  154. |<7>| 0000 - 0e 00 00 00
  155. |<7>| RB: Have 5 bytes into buffer. Adding 4 bytes.
  156. |<7>| RB: Requested 9 bytes
  157. |<2>| ASSERT: gnutls_cipher.c:204
  158. |<4>| REC[0x8063ca0]: Decrypted Packet[2] Handshake(22) with length: 4
  159. |<6>| BUF[HSK]: Inserted 4 bytes of Data(22)
  160. |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
  161. |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
  162. |<3>| HSK[0x8063ca0]: SERVER HELLO DONE was received [4 bytes]
  163. |<2>| ASSERT: gnutls_handshake.c:1123
  164. |<6>| BUF[HSK]: Peeked 505 bytes of Data
  165. |<6>| BUF[HSK]: Emptied buffer
  166. |<6>| BUF[HSK]: Inserted 4 bytes of Data
  167. |<3>| HSK[0x8063ca0]: CLIENT KEY EXCHANGE was send [70 bytes]
  168. |<6>| BUF[HSK]: Peeked 4 bytes of Data
  169. |<6>| BUF[HSK]: Emptied buffer
  170. |<4>| REC[0x8063ca0]: Sending Packet[1] Handshake(22) with length: 70
  171. |<2>| ASSERT: gnutls_cipher.c:204
  172. |<7>| WRITE: Will write 75 bytes to 0x4.
  173. |<7>| WRITE: wrote 75 bytes to 0x4. Left 0 bytes. Total 75 bytes.
  174. |<7>| 0000 - 16 03 01 00 46 10 00 00 42 00 40 93 6b 18 8a d8
  175. |<7>| 0001 - bb 01 35 c6 79 1a e6 f6 61 ba 17 1d 20 f9 1f 12
  176. |<7>| 0002 - f4 9a 85 08 f9 42 a3 8e 9d 72 0c 06 12 ee 67 4e
  177. |<7>| 0003 - 53 fd a0 3f 71 7b be ca f2 6c 04 65 cc b2 64 46
  178. |<7>| 0004 - 9c e5 49 25 cd a0 d1 72 c0 f3 fb
  179. |<4>| REC[0x8063ca0]: Sent Packet[2] Handshake(22) with length: 75
  180. |<3>| REC[0x8063ca0]: Sent ChangeCipherSpec
  181. |<4>| REC[0x8063ca0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
  182. |<2>| ASSERT: gnutls_cipher.c:204
  183. |<7>| WRITE: Will write 6 bytes to 0x4.
  184. |<7>| WRITE: wrote 6 bytes to 0x4. Left 0 bytes. Total 6 bytes.
  185. |<7>| 0000 - 14 03 01 00 01 01
  186. |<4>| REC[0x8063ca0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
  187. |<9>| INT: PREMASTER SECRET[48]: 030134fead9e2189d272927d3d91e952994f0259b98ab55e027c9dfa35781fcb67bc2071cd38444783d3c25d3bf20ea3
  188. |<9>| INT: CLIENT RANDOM[32]: 4b7a5d825af28e04ffb795f5c908787bc9feae400238731fdd336a235adb7c0f
  189. |<9>| INT: SERVER RANDOM[32]: 4b7a5e44638881eda489d0c649648681bd1d6c1f8c235b84a795f33edc11f960
  190. |<9>| INT: MASTER SECRET: 1c026281862fd4fcf09243a19c291f6223adffcd0db7ac8386da009bf4e33499e3eee41968a8980a973cb67ca0b2d3f9
  191. |<9>| INT: KEY BLOCK[42]: 85ad38d3166b2547d0c54ad1f9b331f86154679fc5f6e556354f24ff135e9840
  192. |<9>| INT: CLIENT WRITE KEY [16]: 0a9906f39fba820b9b0bacbcf61c011c
  193. |<9>| INT: SERVER WRITE KEY [16]: 59cc0b19e00243f77b99b9f2961596a2
  194. |<3>| HSK[0x8063ca0]: Cipher Suite: RSA_EXPORT_ARCFOUR_40_MD5
  195. |<3>| HSK[0x8063ca0]: Initializing internal [write] cipher sessions
  196. |<6>| BUF[HSK]: Peeked 0 bytes of Data
  197. |<6>| BUF[HSK]: Emptied buffer
  198. |<3>| HSK[0x8063ca0]: FINISHED was send [16 bytes]
  199. |<6>| BUF[HSK]: Peeked 0 bytes of Data
  200. |<6>| BUF[HSK]: Emptied buffer
  201. |<4>| REC[0x8063ca0]: Sending Packet[0] Handshake(22) with length: 16
  202. |<7>| WRITE: Will write 37 bytes to 0x4.
  203. |<7>| WRITE: wrote 37 bytes to 0x4. Left 0 bytes. Total 37 bytes.
  204. |<7>| 0000 - 16 03 01 00 20 d4 3b 41 09 88 1c a1 c0 ac 8f ce
  205. |<7>| 0001 - 9a 1e ae ab df fc 19 cd ff cb 83 9b b5 38 5e 72
  206. |<7>| 0002 - 65 47 cb 62 10
  207. |<4>| REC[0x8063ca0]: Sent Packet[1] Handshake(22) with length: 37
  208. |<7>| READ: Got 5 bytes from 0x4
  209. |<7>| READ: read 5 bytes from 0x4
  210. |<7>| 0000 - 14 03 01 00 01
  211. |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
  212. |<7>| RB: Requested 5 bytes
  213. |<4>| REC[0x8063ca0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
  214. |<4>| REC[0x8063ca0]: Received Packet[3] Change Cipher Spec(20) with length: 1
  215. |<7>| READ: Got 1 bytes from 0x4
  216. |<7>| READ: read 1 bytes from 0x4
  217. |<7>| 0000 - 01
  218. |<7>| RB: Have 5 bytes into buffer. Adding 1 bytes.
  219. |<7>| RB: Requested 6 bytes
  220. |<2>| ASSERT: gnutls_cipher.c:204
  221. |<4>| REC[0x8063ca0]: ChangeCipherSpec Packet was received
  222. |<3>| HSK[0x8063ca0]: Cipher Suite: RSA_EXPORT_ARCFOUR_40_MD5
  223. |<3>| HSK[0x8063ca0]: Initializing internal [read] cipher sessions
  224. |<7>| READ: Got 5 bytes from 0x4
  225. |<7>| READ: read 5 bytes from 0x4
  226. |<7>| 0000 - 16 03 01 00 20
  227. |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
  228. |<7>| RB: Requested 5 bytes
  229. |<4>| REC[0x8063ca0]: Expected Packet[0] Handshake(22) with length: 1
  230. |<4>| REC[0x8063ca0]: Received Packet[0] Handshake(22) with length: 32
  231. |<7>| READ: Got 32 bytes from 0x4
  232. |<7>| READ: read 32 bytes from 0x4
  233. |<7>| 0000 - ec ba d5 31 bf 3d 3b e7 66 c6 d5 43 ef 19 c2 05
  234. |<7>| 0001 - d3 f6 a8 20 8d 82 fb db e8 e9 ac 0f 93 5b 0d 36
  235. |<7>| 0002 -
  236. |<7>| RB: Have 5 bytes into buffer. Adding 32 bytes.
  237. |<7>| RB: Requested 37 bytes
  238. |<4>| REC[0x8063ca0]: Decrypted Packet[0] Handshake(22) with length: 16
  239. |<6>| BUF[HSK]: Inserted 16 bytes of Data(22)
  240. |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
  241. |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
  242. |<3>| HSK[0x8063ca0]: FINISHED was received [16 bytes]
  243. |<6>| BUF[REC][HD]: Read 12 bytes of Data(22)
  244. |<6>| BUF[HSK]: Peeked 0 bytes of Data
  245. |<6>| BUF[HSK]: Emptied buffer
  246. |<6>| BUF[HSK]: Inserted 4 bytes of Data
  247. |<6>| BUF[HSK]: Inserted 12 bytes of Data
  248. |<6>| BUF[HSK]: Cleared Data from buffer
  249. |<2>| ASSERT: ext_server_name.c:262
  250. - Certificate type: X.509
  251. - Got a certificate list of 1 certificates.
  252. - Certificate[0] info:
  253. - X.509 Certificate Information:
  254. Version: 1
  255. Serial Number (hex): 2bd50a0243290c58aa525d6ca7284c01
  256. Issuer: C=US,ST=MyState,L=MyTown,O=MyOrganization,OU=FOR TESTING ONLY,CN=CertGenCAB
  257. Validity:
  258. Not Before: Sun Feb 14 10:21:38 UTC 2010
  259. Not After: Sat Feb 15 10:21:38 UTC 2025
  260. Subject: C=US,ST=MyState,L=MyTown,O=MyOrganization,OU=FOR TESTING ONLY,CN=GFDGFDGSFD
  261. Subject Public Key Algorithm: RSA
  262. Modulus (bits 512):
  263. a9:d1:b4:94:a1:ad:64:94:f9:7a:62:a9:b6:3b:82:9d
  264. 38:0f:18:d6:9e:fc:e5:cc:cd:dc:ec:dc:60:a8:bf:0b
  265. 8f:0c:3d:c1:ff:40:ef:df:93:d3:ff:66:c1:a2:fb:25
  266. aa:81:0c:b9:db:08:35:88:0e:fa:51:90:b6:b6:73:29
  267. Exponent (bits 24):
  268. 01:00:01
  269. Signature Algorithm: RSA-MD5
  270. warning: signed using a broken signature algorithm that can be forged.
  271. Signature:
  272. 6e:3d:07:1f:7b:cd:0d:5f:18:ac:cd:2d:d5:88:15:01
  273. d8:d3:fb:92:a5:79:85:e3:be:77:f8:ed:2c:d0:48:98
  274. 1d:43:a4:35:47:08:c8:8a:b5:19:ea:9d:af:7d:b8:05
  275. 4a:6b:4e:d7:25:a8:8d:7d:6d:b1:99:20:a9:c2:40:2d
  276. Other Information:
  277. MD5 fingerprint:
  278. 5095a265575f61e6910b33efe2afb3a5
  279. SHA-1 fingerprint:
  280. aab4b6f0dcd6486e43661455865dd365dc5cb164
  281. Public Key Id:
  282. 8f9e09b4aa02a36fbef840f2858f32e9bc196298
  283.  
  284. - The hostname in the certificate matches 'GFDGFDGSFD'.
  285. |<2>| ASSERT: verify.c:281
  286. |<2>| ASSERT: verify.c:474
  287. - Peer's certificate issuer is unknown
  288. - Peer's certificate is NOT trusted
  289. - Version: TLS1.0
  290. - Key Exchange: RSA-EXPORT
  291. - Cipher: ARCFOUR-40
  292. - MAC: MD5
  293. - Compression: NULL
  294. - Session ID: DA:C0:9A:C7:4C:3A:DC:1F:42:00:8C:46:7C:74:F2:A9
  295. - Handshake was completed
  296.  
  297. - Simple Client Mode:
  298.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement