Guest User

Untitled

a guest
Nov 4th, 2021
19
292 days
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Nov 3 21:25:14 to kresd[27449]: [00000.00][plan] plan 'www.cssz.cz.' type 'A' uid [43135.00]
  2. Nov 3 21:25:14 to kresd[27449]: [43135.00][iter] 'www.cssz.cz.' type 'A' new uid was assigned .01, parent uid .00
  3. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => trying zone: cz., NSEC3, hash 9400e164
  4. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => NSEC3 depth 2: hash 6lhigtbocc9smvg4sb11jr57963tctun
  5. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => NSEC3 encloser error for www.cssz.cz.: range search found stale or insecure entry
  6. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => NSEC3 depth 1: hash e0f3djf24i87veqrelq6ekiuf1r23ri9
  7. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => NSEC3 encloser error for cssz.cz.: range search found stale or insecure entry
  8. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => NSEC3 depth 0: hash 4n7gueq4ict1kegd499fonsabt3orua7
  9. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => NSEC3 encloser error for cz.: range search found stale or insecure entry
  10. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => trying zone: cz., NSEC3, hash ea165876
  11. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => NSEC3 depth 2: hash gec0b9v0rgem9tl12ftneaj983abngc7
  12. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => NSEC3 encloser error for www.cssz.cz.: range search found stale or insecure entry
  13. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => NSEC3 depth 1: hash qdtcaq7cn5horbhontb2eme3r69dl60i
  14. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => NSEC3 encloser error for cssz.cz.: range search found stale or insecure entry
  15. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => NSEC3 depth 0: hash e53875eh33q8g7bh39gbn7p6mp76hsmu
  16. Nov 3 21:25:14 to kresd[27449]: [43135.01][cach] => NSEC3 encloser error for cz.: range search found stale or insecure entry
  17. Nov 3 21:25:14 to kresd[27449]: [43135.01][plan] plan '.' type 'DNSKEY' uid [43135.02]
  18. Nov 3 21:25:14 to kresd[27449]: [43135.02][iter] '.' type 'DNSKEY' new uid was assigned .03, parent uid .01
  19. Nov 3 21:25:14 to kresd[27449]: [43135.03][cach] => satisfied by exact RRset: rank 060, new TTL 172110
  20. Nov 3 21:25:14 to kresd[27449]: [43135.03][iter] <= rcode: NOERROR
  21. Nov 3 21:25:14 to kresd[27449]: [43135.03][vldr] <= parent: updating DNSKEY
  22. Nov 3 21:25:14 to kresd[27449]: [43135.03][vldr] <= answer valid, OK
  23. Nov 3 21:25:14 to kresd[27449]: [43135.01][iter] 'www.cssz.cz.' type 'A' new uid was assigned .04, parent uid .00
  24. Nov 3 21:25:14 to kresd[27449]: [43135.04][plan] plan 'cz.' type 'DS' uid [43135.05]
  25. Nov 3 21:25:14 to kresd[27449]: [43135.05][iter] 'cz.' type 'DS' new uid was assigned .06, parent uid .04
  26. Nov 3 21:25:14 to kresd[27449]: [43135.06][cach] => satisfied by exact RRset: rank 060, new TTL 76487
  27. Nov 3 21:25:14 to kresd[27449]: [43135.06][iter] <= rcode: NOERROR
  28. Nov 3 21:25:14 to kresd[27449]: [43135.06][vldr] <= DS: OK
  29. Nov 3 21:25:14 to kresd[27449]: [43135.06][vldr] <= parent: updating DS
  30. Nov 3 21:25:14 to kresd[27449]: [43135.06][vldr] <= answer valid, OK
  31. Nov 3 21:25:14 to kresd[27449]: [43135.04][iter] 'www.cssz.cz.' type 'A' new uid was assigned .07, parent uid .00
  32. Nov 3 21:25:14 to kresd[27449]: [43135.07][plan] plan 'cz.' type 'DNSKEY' uid [43135.08]
  33. Nov 3 21:25:14 to kresd[27449]: [43135.08][iter] 'cz.' type 'DNSKEY' new uid was assigned .09, parent uid .07
  34. Nov 3 21:25:14 to kresd[27449]: [43135.09][cach] => satisfied by exact RRset: rank 060, new TTL 2519
  35. Nov 3 21:25:14 to kresd[27449]: [43135.09][iter] <= rcode: NOERROR
  36. Nov 3 21:25:14 to kresd[27449]: [43135.09][vldr] <= parent: updating DNSKEY
  37. Nov 3 21:25:14 to kresd[27449]: [43135.09][vldr] <= answer valid, OK
  38. Nov 3 21:25:14 to kresd[27449]: [43135.07][iter] 'www.cssz.cz.' type 'A' new uid was assigned .10, parent uid .00
  39. Nov 3 21:25:14 to kresd[27449]: [43135.10][plan] plan 'cssz.cz.' type 'DS' uid [43135.11]
  40. Nov 3 21:25:14 to kresd[27449]: [43135.11][iter] 'cssz.cz.' type 'DS' new uid was assigned .12, parent uid .10
  41. Nov 3 21:25:14 to kresd[27449]: [43135.12][cach] => satisfied by exact RRset: rank 060, new TTL 908
  42. Nov 3 21:25:14 to kresd[27449]: [43135.12][iter] <= rcode: NOERROR
  43. Nov 3 21:25:14 to kresd[27449]: [43135.12][vldr] <= DS: OK
  44. Nov 3 21:25:14 to kresd[27449]: [43135.12][vldr] <= parent: updating DS
  45. Nov 3 21:25:14 to kresd[27449]: [43135.12][vldr] <= answer valid, OK
  46. Nov 3 21:25:14 to kresd[27449]: [43135.10][iter] 'www.cssz.cz.' type 'A' new uid was assigned .13, parent uid .00
  47. Nov 3 21:25:14 to kresd[27449]: [43135.13][plan] plan 'cssz.cz.' type 'DNSKEY' uid [43135.14]
  48. Nov 3 21:25:14 to kresd[27449]: [43135.14][iter] 'cssz.cz.' type 'DNSKEY' new uid was assigned .15, parent uid .13
  49. Nov 3 21:25:14 to kresd[27449]: [43135.15][cach] => satisfied by exact RRset: rank 060, new TTL 1018
  50. Nov 3 21:25:14 to kresd[27449]: [43135.15][iter] <= rcode: NOERROR
  51. Nov 3 21:25:14 to kresd[27449]: [43135.15][vldr] <= parent: updating DNSKEY
  52. Nov 3 21:25:14 to kresd[27449]: [43135.15][vldr] <= answer valid, OK
  53. Nov 3 21:25:14 to kresd[27449]: [43135.13][iter] 'www.cssz.cz.' type 'A' new uid was assigned .16, parent uid .00
  54. Nov 3 21:25:14 to kresd[27449]: [43135.16][resl] => id: '46726' querying: '.'@'1.0.0.1#00853' zone cut: 'cssz.cz.' qname: 'wWW.CsSZ.Cz.' qtype: 'A' proto: 'tcp'
  55. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Allocating epoch #0
  56. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) added 4 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list
  57. Nov 3 21:25:14 to kresd[27449]: [tls_client] set hostname, ret = 0
  58. Nov 3 21:25:14 to kresd[27449]: [43135.16][wrkr] => connecting to: '1.0.0.1#00853'
  59. Nov 3 21:25:14 to kresd[27449]: [wrkr]=> connected to '1.0.0.1#00853'
  60. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Allocating epoch #1
  61. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: Adv. version: 3.3
  62. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 13.02 (GNUTLS_AES_256_GCM_SHA384)
  63. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 13.03 (GNUTLS_CHACHA20_POLY1305_SHA256)
  64. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 13.01 (GNUTLS_AES_128_GCM_SHA256)
  65. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 13.04 (GNUTLS_AES_128_CCM_SHA256)
  66. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.2c (GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384)
  67. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite cc.a9 (GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305)
  68. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.ad (GNUTLS_ECDHE_ECDSA_AES_256_CCM)
  69. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.0a (GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1)
  70. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.2b (GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256)
  71. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.ac (GNUTLS_ECDHE_ECDSA_AES_128_CCM)
  72. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.09 (GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1)
  73. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.30 (GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384)
  74. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite cc.a8 (GNUTLS_ECDHE_RSA_CHACHA20_POLY1305)
  75. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.14 (GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1)
  76. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.2f (GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256)
  77. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1)
  78. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.9d (GNUTLS_RSA_AES_256_GCM_SHA384)
  79. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.9d (GNUTLS_RSA_AES_256_CCM)
  80. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.35 (GNUTLS_RSA_AES_256_CBC_SHA1)
  81. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.9c (GNUTLS_RSA_AES_128_GCM_SHA256)
  82. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.9c (GNUTLS_RSA_AES_128_CCM)
  83. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.2f (GNUTLS_RSA_AES_128_CBC_SHA1)
  84. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.9f (GNUTLS_DHE_RSA_AES_256_GCM_SHA384)
  85. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite cc.aa (GNUTLS_DHE_RSA_CHACHA20_POLY1305)
  86. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.9f (GNUTLS_DHE_RSA_AES_256_CCM)
  87. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.39 (GNUTLS_DHE_RSA_AES_256_CBC_SHA1)
  88. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.9e (GNUTLS_DHE_RSA_AES_128_GCM_SHA256)
  89. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.9e (GNUTLS_DHE_RSA_AES_128_CCM)
  90. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.33 (GNUTLS_DHE_RSA_AES_128_CBC_SHA1)
  91. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (OCSP Status Request/5) for 'client hello'
  92. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sending extension OCSP Status Request/5 (5 bytes)
  93. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Client Certificate Type/19) for 'client hello'
  94. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Server Certificate Type/20) for 'client hello'
  95. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Supported Groups/10) for 'client hello'
  96. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sent group SECP256R1 (0x17)
  97. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sent group SECP384R1 (0x18)
  98. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sent group SECP521R1 (0x19)
  99. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sent group X25519 (0x1d)
  100. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sent group X448 (0x1e)
  101. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sent group FFDHE2048 (0x100)
  102. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sent group FFDHE3072 (0x101)
  103. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sent group FFDHE4096 (0x102)
  104. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sent group FFDHE6144 (0x103)
  105. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sent group FFDHE8192 (0x104)
  106. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sending extension Supported Groups/10 (22 bytes)
  107. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Supported EC Point Formats/11) for 'client hello'
  108. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sending extension Supported EC Point Formats/11 (2 bytes)
  109. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Signature Algorithms/13) for 'client hello'
  110. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (4.1) RSA-SHA256
  111. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (8.9) RSA-PSS-SHA256
  112. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
  113. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (4.3) ECDSA-SHA256
  114. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (8.7) EdDSA-Ed25519
  115. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (5.1) RSA-SHA384
  116. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (8.10) RSA-PSS-SHA384
  117. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
  118. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (5.3) ECDSA-SHA384
  119. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (8.8) EdDSA-Ed448
  120. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (6.1) RSA-SHA512
  121. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (8.11) RSA-PSS-SHA512
  122. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
  123. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (6.3) ECDSA-SHA512
  124. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (2.1) RSA-SHA1
  125. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sent signature algo (2.3) ECDSA-SHA1
  126. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sending extension Signature Algorithms/13 (34 bytes)
  127. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (SRTP/14) for 'client hello'
  128. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Heartbeat/15) for 'client hello'
  129. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (ALPN/16) for 'client hello'
  130. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Encrypt-then-MAC/22) for 'client hello'
  131. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sending extension Encrypt-then-MAC/22 (0 bytes)
  132. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Extended Master Secret/23) for 'client hello'
  133. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sending extension Extended Master Secret/23 (0 bytes)
  134. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Session Ticket/35) for 'client hello'
  135. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sending extension Session Ticket/35 (0 bytes)
  136. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Key Share/51) for 'client hello'
  137. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sending key share for SECP256R1
  138. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: sending key share for X25519
  139. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sending extension Key Share/51 (107 bytes)
  140. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Supported Versions/43) for 'client hello'
  141. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Advertizing version 3.4
  142. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Advertizing version 3.3
  143. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sending extension Supported Versions/43 (5 bytes)
  144. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Post Handshake Auth/49) for 'client hello'
  145. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Safe Renegotiation/65281) for 'client hello'
  146. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sending extension Safe Renegotiation/65281 (1 bytes)
  147. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Server Name Indication/0) for 'client hello'
  148. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) HSK[0x26188e0]: sent server name: 'cloudflare-dns.com'
  149. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sending extension Server Name Indication/0 (23 bytes)
  150. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Cookie/44) for 'client hello'
  151. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Early Data/42) for 'client hello'
  152. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (PSK Key Exchange Modes/45) for 'client hello'
  153. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sending extension PSK Key Exchange Modes/45 (3 bytes)
  154. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Record Size Limit/28) for 'client hello'
  155. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Sending extension Record Size Limit/28 (2 bytes)
  156. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Maximum Record Size/1) for 'client hello'
  157. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (ClientHello Padding/21) for 'client hello'
  158. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Preparing extension (Pre Shared Key/41) for 'client hello'
  159. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: CLIENT HELLO was queued [359 bytes]
  160. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Preparing Packet Handshake(22) with length: 359 and min pad: 0
  161. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 364
  162. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  163. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:589
  164. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  165. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: SSL 3.3 Handshake packet received. Epoch 0, length: 90
  166. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Expected Packet Handshake(22)
  167. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Received Packet Handshake(22) with length: 90
  168. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Decrypted Packet[0] Handshake(22) with length: 90
  169. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: SERVER HELLO (2) was received. Length 86[86], frag offset 0, frag length: 86, sequence: 0
  170. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1160
  171. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1411
  172. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: Server's version: 3.3
  173. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Parsing extension 'Supported Versions/43' (2 bytes)
  174. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Negotiated version: 3.4
  175. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384
  176. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Parsing extension 'Key Share/51' (36 bytes)
  177. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: Selected group X25519 (6)
  178. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) EXT[0x26188e0]: client generated X25519 shared key
  179. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
  180. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6
  181. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) REC[0x26188e0]: Sent ChangeCipherSpec
  182. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Initializing epoch #1
  183. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Epoch #1 ready
  184. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384
  185. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  186. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: SSL 3.3 ChangeCipherSpec packet received. Epoch 1, length: 1
  187. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Expected Packet Handshake(22)
  188. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Received Packet ChangeCipherSpec(20) with length: 1
  189. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: SSL 3.3 Application Data packet received. Epoch 1, length: 2760
  190. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Expected Packet Handshake(22)
  191. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Received Packet Application Data(23) with length: 2760
  192. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:617
  193. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: record.c[_gnutls_recv_in_buffers]:1324
  194. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: tls13/encrypted_extensions.c[_gnutls13_recv_encrypted_extensions]:37
  195. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  196. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: SSL 3.3 Application Data packet received. Epoch 1, length: 2760
  197. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Expected Packet Handshake(22)
  198. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Received Packet Application Data(23) with length: 2760
  199. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Decrypted Packet[0] Handshake(22) with length: 2743
  200. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: ENCRYPTED EXTENSIONS (8) was received. Length 6[2739], frag offset 0, frag length: 6, sequence: 0
  201. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: parsing encrypted extensions
  202. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x26188e0]: Parsing extension 'Server Name Indication/0' (0 bytes)
  203. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  204. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: CERTIFICATE (11) was received. Length 2598[2729], frag offset 0, frag length: 2598, sequence: 0
  205. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1160
  206. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1429
  207. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1411
  208. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: parsing certificate message
  209. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  210. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: CERTIFICATE VERIFY (15) was received. Length 75[127], frag offset 0, frag length: 75, sequence: 0
  211. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1429
  212. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: Parsing certificate verify
  213. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: verifying TLS 1.3 handshake data using ECDSA-SECP256R1-SHA256
  214. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: ocsp-api.c[gnutls_ocsp_status_request_get2]:99
  215. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: ocsp-api.c[gnutls_ocsp_status_request_get2]:99
  216. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:469
  217. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:469
  218. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  219. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: FINISHED (20) was received. Length 48[48], frag offset 0, frag length: 48, sequence: 0
  220. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1429
  221. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: parsing finished
  222. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: sending finished
  223. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: FINISHED was queued [52 bytes]
  224. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Preparing Packet Handshake(22) with length: 52 and min pad: 0
  225. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 74
  226. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: constate.c[_gnutls_epoch_get]:931
  227. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Allocating epoch #2
  228. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Initializing epoch #2
  229. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Epoch #2 ready
  230. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384
  231. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Start of epoch cleanup
  232. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Epoch #0 freed
  233. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Epoch #1 freed
  234. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: End of epoch cleanup
  235. Nov 3 21:25:14 to kresd[27449]: [tls_client] TLS handshake with 1.0.0.1#00853 has completed
  236. Nov 3 21:25:14 to kresd[27449]: [tls_client] TLS session has not resumed
  237. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Preparing Packet Application Data(23) with length: 42 and min pad: 0
  238. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Sent Packet[1] Application Data(23) in epoch 2 and length: 64
  239. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:589
  240. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: record.c[_gnutls_recv_int]:1775
  241. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: SSL 3.3 Application Data packet received. Epoch 2, length: 445
  242. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Expected Packet Application Data(23)
  243. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Received Packet Application Data(23) with length: 445
  244. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Decrypted Packet[0] Handshake(22) with length: 428
  245. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  246. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: NEW SESSION TICKET (4) was received. Length 210[424], frag offset 0, frag length: 210, sequence: 0
  247. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1429
  248. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: parsing session ticket message
  249. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  250. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: NEW SESSION TICKET (4) was received. Length 210[210], frag offset 0, frag length: 210, sequence: 0
  251. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1429
  252. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x26188e0]: parsing session ticket message
  253. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: record.c[_gnutls_recv_in_buffers]:1577
  254. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: record.c[_gnutls_recv_int]:1775
  255. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: SSL 3.3 Application Data packet received. Epoch 2, length: 487
  256. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Expected Packet Application Data(23)
  257. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Received Packet Application Data(23) with length: 487
  258. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Decrypted Packet[1] Application Data(23) with length: 470
  259. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:589
  260. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: record.c[_gnutls_recv_int]:1775
  261. Nov 3 21:25:14 to kresd[27449]: [43135.16][slct] => id: '46726' updating: '.'@'1.0.0.1#00853' zone cut: 'cssz.cz.' with rtt 46 to srtt: 35 and variance: 10
  262. Nov 3 21:25:14 to kresd[27449]: [43135.16][iter] <= rcode: NOERROR
  263. Nov 3 21:25:14 to kresd[27449]: [43135.16][plan] plan 'www.cssz.cz.' type 'DS' uid [43135.17]
  264. Nov 3 21:25:14 to kresd[27449]: [43135.17][iter] 'www.cssz.cz.' type 'DS' new uid was assigned .18, parent uid .16
  265. Nov 3 21:25:14 to kresd[27449]: [43135.18][cach] => satisfied by exact packet: rank 060, new TTL 1692
  266. Nov 3 21:25:14 to kresd[27449]: [43135.18][iter] <= rcode: NOERROR
  267. Nov 3 21:25:14 to kresd[27449]: [43135.18][vldr] <= parent: updating DS
  268. Nov 3 21:25:14 to kresd[27449]: [43135.18][vldr] <= answer valid, OK
  269. Nov 3 21:25:14 to kresd[27449]: [43135.16][plan] plan 'www.cssz.cz.' type 'NS' uid [43135.19]
  270. Nov 3 21:25:14 to kresd[27449]: [43135.19][iter] 'www.cssz.cz.' type 'NS' new uid was assigned .20, parent uid .16
  271. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => trying zone: cz., NSEC3, hash 9400e164
  272. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => NSEC3 depth 2: hash 6lhigtbocc9smvg4sb11jr57963tctun
  273. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => NSEC3 encloser error for www.cssz.cz.: range search found stale or insecure entry
  274. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => NSEC3 depth 1: hash e0f3djf24i87veqrelq6ekiuf1r23ri9
  275. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => NSEC3 encloser error for cssz.cz.: range search found stale or insecure entry
  276. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => NSEC3 depth 0: hash 4n7gueq4ict1kegd499fonsabt3orua7
  277. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => NSEC3 encloser error for cz.: range search found stale or insecure entry
  278. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => trying zone: cz., NSEC3, hash ea165876
  279. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => NSEC3 depth 2: hash gec0b9v0rgem9tl12ftneaj983abngc7
  280. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => NSEC3 encloser error for www.cssz.cz.: range search found stale or insecure entry
  281. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => NSEC3 depth 1: hash qdtcaq7cn5horbhontb2eme3r69dl60i
  282. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => NSEC3 encloser error for cssz.cz.: range search found stale or insecure entry
  283. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => NSEC3 depth 0: hash e53875eh33q8g7bh39gbn7p6mp76hsmu
  284. Nov 3 21:25:14 to kresd[27449]: [43135.20][cach] => NSEC3 encloser error for cz.: range search found stale or insecure entry
  285. Nov 3 21:25:14 to kresd[27449]: [43135.20][resl] => id: '50897' querying: '.'@'1.0.0.1#00853' zone cut: 'cssz.cz.' qname: 'Www.csSz.cZ.' qtype: 'NS' proto: 'tcp'
  286. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Preparing Packet Application Data(23) with length: 42 and min pad: 0
  287. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Sent Packet[2] Application Data(23) in epoch 2 and length: 64
  288. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: SSL 3.3 Application Data packet received. Epoch 2, length: 487
  289. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Expected Packet Application Data(23)
  290. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Received Packet Application Data(23) with length: 487
  291. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Decrypted Packet[2] Application Data(23) with length: 470
  292. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:589
  293. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: record.c[_gnutls_recv_int]:1775
  294. Nov 3 21:25:14 to kresd[27449]: [43135.20][slct] => id: '50897' updating: '.'@'1.0.0.1#00853' zone cut: 'cssz.cz.' with rtt 38 to srtt: 35 and variance: 8
  295. Nov 3 21:25:14 to kresd[27449]: [43135.20][slct] => id: '50897' noting selection error: '.'@'1.0.0.1#00853' zone cut: 'cssz.cz.' error: 6 SERVFAIL
  296. Nov 3 21:25:14 to kresd[27449]: [43135.20][iter] <= rcode: SERVFAIL
  297. Nov 3 21:25:14 to kresd[27449]: [43135.20][iter] 'www.cssz.cz.' type 'NS' new uid was assigned .21, parent uid .16
  298. Nov 3 21:25:14 to kresd[27449]: [43135.21][resl] => id: '04210' querying: '.'@'1.1.1.1#00853' zone cut: 'cssz.cz.' qname: 'www.cssz.cz.' qtype: 'NS' proto: 'tcp'
  299. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Allocating epoch #0
  300. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) added 4 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list
  301. Nov 3 21:25:14 to kresd[27449]: [tls_client] set hostname, ret = 0
  302. Nov 3 21:25:14 to kresd[27449]: [43135.21][wrkr] => connecting to: '1.1.1.1#00853'
  303. Nov 3 21:25:14 to kresd[27449]: [wrkr]=> connected to '1.1.1.1#00853'
  304. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Allocating epoch #1
  305. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: Adv. version: 3.3
  306. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 13.02 (GNUTLS_AES_256_GCM_SHA384)
  307. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 13.03 (GNUTLS_CHACHA20_POLY1305_SHA256)
  308. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 13.01 (GNUTLS_AES_128_GCM_SHA256)
  309. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 13.04 (GNUTLS_AES_128_CCM_SHA256)
  310. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.2c (GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384)
  311. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite cc.a9 (GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305)
  312. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.ad (GNUTLS_ECDHE_ECDSA_AES_256_CCM)
  313. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.0a (GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1)
  314. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.2b (GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256)
  315. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.ac (GNUTLS_ECDHE_ECDSA_AES_128_CCM)
  316. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.09 (GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1)
  317. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.30 (GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384)
  318. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite cc.a8 (GNUTLS_ECDHE_RSA_CHACHA20_POLY1305)
  319. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.14 (GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1)
  320. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.2f (GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256)
  321. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1)
  322. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.9d (GNUTLS_RSA_AES_256_GCM_SHA384)
  323. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.9d (GNUTLS_RSA_AES_256_CCM)
  324. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.35 (GNUTLS_RSA_AES_256_CBC_SHA1)
  325. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.9c (GNUTLS_RSA_AES_128_GCM_SHA256)
  326. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.9c (GNUTLS_RSA_AES_128_CCM)
  327. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.2f (GNUTLS_RSA_AES_128_CBC_SHA1)
  328. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.9f (GNUTLS_DHE_RSA_AES_256_GCM_SHA384)
  329. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite cc.aa (GNUTLS_DHE_RSA_CHACHA20_POLY1305)
  330. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.9f (GNUTLS_DHE_RSA_AES_256_CCM)
  331. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.39 (GNUTLS_DHE_RSA_AES_256_CBC_SHA1)
  332. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.9e (GNUTLS_DHE_RSA_AES_128_GCM_SHA256)
  333. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite c0.9e (GNUTLS_DHE_RSA_AES_128_CCM)
  334. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Keeping ciphersuite 00.33 (GNUTLS_DHE_RSA_AES_128_CBC_SHA1)
  335. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (OCSP Status Request/5) for 'client hello'
  336. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sending extension OCSP Status Request/5 (5 bytes)
  337. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Client Certificate Type/19) for 'client hello'
  338. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Server Certificate Type/20) for 'client hello'
  339. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Supported Groups/10) for 'client hello'
  340. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sent group SECP256R1 (0x17)
  341. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sent group SECP384R1 (0x18)
  342. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sent group SECP521R1 (0x19)
  343. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sent group X25519 (0x1d)
  344. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sent group X448 (0x1e)
  345. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sent group FFDHE2048 (0x100)
  346. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sent group FFDHE3072 (0x101)
  347. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sent group FFDHE4096 (0x102)
  348. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sent group FFDHE6144 (0x103)
  349. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sent group FFDHE8192 (0x104)
  350. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sending extension Supported Groups/10 (22 bytes)
  351. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Supported EC Point Formats/11) for 'client hello'
  352. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sending extension Supported EC Point Formats/11 (2 bytes)
  353. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Signature Algorithms/13) for 'client hello'
  354. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (4.1) RSA-SHA256
  355. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (8.9) RSA-PSS-SHA256
  356. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
  357. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (4.3) ECDSA-SHA256
  358. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (8.7) EdDSA-Ed25519
  359. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (5.1) RSA-SHA384
  360. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (8.10) RSA-PSS-SHA384
  361. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
  362. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (5.3) ECDSA-SHA384
  363. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (8.8) EdDSA-Ed448
  364. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (6.1) RSA-SHA512
  365. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (8.11) RSA-PSS-SHA512
  366. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
  367. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (6.3) ECDSA-SHA512
  368. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (2.1) RSA-SHA1
  369. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sent signature algo (2.3) ECDSA-SHA1
  370. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sending extension Signature Algorithms/13 (34 bytes)
  371. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (SRTP/14) for 'client hello'
  372. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Heartbeat/15) for 'client hello'
  373. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (ALPN/16) for 'client hello'
  374. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Encrypt-then-MAC/22) for 'client hello'
  375. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sending extension Encrypt-then-MAC/22 (0 bytes)
  376. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Extended Master Secret/23) for 'client hello'
  377. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sending extension Extended Master Secret/23 (0 bytes)
  378. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Session Ticket/35) for 'client hello'
  379. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sending extension Session Ticket/35 (0 bytes)
  380. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Key Share/51) for 'client hello'
  381. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sending key share for SECP256R1
  382. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: sending key share for X25519
  383. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sending extension Key Share/51 (107 bytes)
  384. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Supported Versions/43) for 'client hello'
  385. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Advertizing version 3.4
  386. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) Advertizing version 3.3
  387. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sending extension Supported Versions/43 (5 bytes)
  388. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Post Handshake Auth/49) for 'client hello'
  389. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Safe Renegotiation/65281) for 'client hello'
  390. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sending extension Safe Renegotiation/65281 (1 bytes)
  391. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Server Name Indication/0) for 'client hello'
  392. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) HSK[0x23a3a10]: sent server name: 'cloudflare-dns.com'
  393. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sending extension Server Name Indication/0 (23 bytes)
  394. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Cookie/44) for 'client hello'
  395. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Early Data/42) for 'client hello'
  396. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (PSK Key Exchange Modes/45) for 'client hello'
  397. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sending extension PSK Key Exchange Modes/45 (3 bytes)
  398. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Record Size Limit/28) for 'client hello'
  399. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Sending extension Record Size Limit/28 (2 bytes)
  400. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Maximum Record Size/1) for 'client hello'
  401. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (ClientHello Padding/21) for 'client hello'
  402. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Preparing extension (Pre Shared Key/41) for 'client hello'
  403. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: CLIENT HELLO was queued [359 bytes]
  404. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Preparing Packet Handshake(22) with length: 359 and min pad: 0
  405. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Sent Packet[1] Handshake(22) in epoch 0 and length: 364
  406. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  407. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:589
  408. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  409. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: SSL 3.3 Handshake packet received. Epoch 0, length: 90
  410. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Expected Packet Handshake(22)
  411. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Received Packet Handshake(22) with length: 90
  412. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Decrypted Packet[0] Handshake(22) with length: 90
  413. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: SERVER HELLO (2) was received. Length 86[86], frag offset 0, frag length: 86, sequence: 0
  414. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1160
  415. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1411
  416. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: Server's version: 3.3
  417. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Parsing extension 'Supported Versions/43' (2 bytes)
  418. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Negotiated version: 3.4
  419. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384
  420. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Parsing extension 'Key Share/51' (36 bytes)
  421. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: Selected group X25519 (6)
  422. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) EXT[0x23a3a10]: client generated X25519 shared key
  423. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
  424. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6
  425. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) REC[0x23a3a10]: Sent ChangeCipherSpec
  426. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Initializing epoch #1
  427. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Epoch #1 ready
  428. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384
  429. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  430. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: SSL 3.3 ChangeCipherSpec packet received. Epoch 1, length: 1
  431. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Expected Packet Handshake(22)
  432. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Received Packet ChangeCipherSpec(20) with length: 1
  433. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: SSL 3.3 Application Data packet received. Epoch 1, length: 2759
  434. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Expected Packet Handshake(22)
  435. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Received Packet Application Data(23) with length: 2759
  436. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Decrypted Packet[0] Handshake(22) with length: 2742
  437. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: ENCRYPTED EXTENSIONS (8) was received. Length 6[2738], frag offset 0, frag length: 6, sequence: 0
  438. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: parsing encrypted extensions
  439. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) EXT[0x23a3a10]: Parsing extension 'Server Name Indication/0' (0 bytes)
  440. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  441. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: CERTIFICATE (11) was received. Length 2598[2728], frag offset 0, frag length: 2598, sequence: 0
  442. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1160
  443. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1429
  444. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1411
  445. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: parsing certificate message
  446. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  447. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: CERTIFICATE VERIFY (15) was received. Length 74[126], frag offset 0, frag length: 74, sequence: 0
  448. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1429
  449. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: Parsing certificate verify
  450. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: verifying TLS 1.3 handshake data using ECDSA-SECP256R1-SHA256
  451. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: ocsp-api.c[gnutls_ocsp_status_request_get2]:99
  452. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: ocsp-api.c[gnutls_ocsp_status_request_get2]:99
  453. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:469
  454. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:469
  455. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  456. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: FINISHED (20) was received. Length 48[48], frag offset 0, frag length: 48, sequence: 0
  457. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1429
  458. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: parsing finished
  459. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: sending finished
  460. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: FINISHED was queued [52 bytes]
  461. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Preparing Packet Handshake(22) with length: 52 and min pad: 0
  462. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Sent Packet[1] Handshake(22) in epoch 1 and length: 74
  463. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: constate.c[_gnutls_epoch_get]:931
  464. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Allocating epoch #2
  465. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Initializing epoch #2
  466. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Epoch #2 ready
  467. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384
  468. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Start of epoch cleanup
  469. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Epoch #0 freed
  470. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Epoch #1 freed
  471. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: End of epoch cleanup
  472. Nov 3 21:25:14 to kresd[27449]: [tls_client] TLS handshake with 1.1.1.1#00853 has completed
  473. Nov 3 21:25:14 to kresd[27449]: [tls_client] TLS session has not resumed
  474. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Preparing Packet Application Data(23) with length: 42 and min pad: 0
  475. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Sent Packet[1] Application Data(23) in epoch 2 and length: 64
  476. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:589
  477. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: record.c[_gnutls_recv_int]:1775
  478. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: SSL 3.3 Application Data packet received. Epoch 2, length: 445
  479. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Expected Packet Application Data(23)
  480. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Received Packet Application Data(23) with length: 445
  481. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Decrypted Packet[0] Handshake(22) with length: 428
  482. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  483. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: NEW SESSION TICKET (4) was received. Length 210[424], frag offset 0, frag length: 210, sequence: 0
  484. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1429
  485. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: parsing session ticket message
  486. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1169
  487. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: NEW SESSION TICKET (4) was received. Length 210[210], frag offset 0, frag length: 210, sequence: 0
  488. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1429
  489. Nov 3 21:25:14 to kresd[27449]: [gnutls] (4) HSK[0x23a3a10]: parsing session ticket message
  490. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: record.c[_gnutls_recv_in_buffers]:1577
  491. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: record.c[_gnutls_recv_int]:1775
  492. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: SSL 3.3 Application Data packet received. Epoch 2, length: 487
  493. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Expected Packet Application Data(23)
  494. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Received Packet Application Data(23) with length: 487
  495. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Decrypted Packet[1] Application Data(23) with length: 470
  496. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:589
  497. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: record.c[_gnutls_recv_int]:1775
  498. Nov 3 21:25:14 to kresd[27449]: [43135.21][slct] => id: '04210' updating: '.'@'1.1.1.1#00853' zone cut: 'cssz.cz.' with rtt 49 to srtt: 46 and variance: 18
  499. Nov 3 21:25:14 to kresd[27449]: [43135.21][slct] => id: '04210' noting selection error: '.'@'1.1.1.1#00853' zone cut: 'cssz.cz.' error: 6 SERVFAIL
  500. Nov 3 21:25:14 to kresd[27449]: [43135.21][iter] <= rcode: SERVFAIL
  501. Nov 3 21:25:14 to kresd[27449]: [43135.21][iter] 'www.cssz.cz.' type 'NS' new uid was assigned .22, parent uid .16
  502. Nov 3 21:25:14 to kresd[27449]: [43135.22][resl] => id: '27441' querying: '.'@'2606:4700:4700::1111#00853' zone cut: 'cssz.cz.' qname: 'www.cssz.cz.' qtype: 'NS' proto: 'tcp'
  503. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x24c2150]: Allocating epoch #0
  504. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) added 4 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list
  505. Nov 3 21:25:14 to kresd[27449]: [tls_client] set hostname, ret = 0
  506. Nov 3 21:25:14 to kresd[27449]: [43135.22][wrkr] => connecting to: '2606:4700:4700::1111#00853'
  507. Nov 3 21:25:14 to kresd[27449]: [43135.22][slct] NO6: timeouted, repeated prefix, timeouts 1/6
  508. Nov 3 21:25:14 to kresd[27449]: [43135.22][slct] => id: '27441' noting selection error: '.'@'2606:4700:4700::1111#00853' zone cut: 'cssz.cz.' error: 3 TCP_CONNECT_FAILED
  509. Nov 3 21:25:14 to kresd[27449]: [43135.22][iter] 'www.cssz.cz.' type 'NS' new uid was assigned .23, parent uid .16
  510. Nov 3 21:25:14 to kresd[27449]: [43135.23][resl] => id: '41916' querying: '.'@'2606:4700:4700::1001#00853' zone cut: 'cssz.cz.' qname: 'wWw.CsSz.cz.' qtype: 'NS' proto: 'tcp'
  511. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23edb10]: Allocating epoch #0
  512. Nov 3 21:25:14 to kresd[27449]: [gnutls] (2) added 4 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list
  513. Nov 3 21:25:14 to kresd[27449]: [tls_client] set hostname, ret = 0
  514. Nov 3 21:25:14 to kresd[27449]: [43135.23][wrkr] => connecting to: '2606:4700:4700::1001#00853'
  515. Nov 3 21:25:14 to kresd[27449]: [43135.23][slct] NO6: timeouted, repeated prefix, timeouts 1/6
  516. Nov 3 21:25:14 to kresd[27449]: [43135.23][slct] => id: '41916' noting selection error: '.'@'2606:4700:4700::1001#00853' zone cut: 'cssz.cz.' error: 3 TCP_CONNECT_FAILED
  517. Nov 3 21:25:14 to kresd[27449]: [43135.23][iter] 'www.cssz.cz.' type 'NS' new uid was assigned .24, parent uid .16
  518. Nov 3 21:25:14 to kresd[27449]: [43135.24][resl] => id: '60729' querying: '.'@'1.0.0.1#00853' zone cut: 'cssz.cz.' qname: 'WWW.Cssz.CZ.' qtype: 'NS' proto: 'tcp'
  519. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Preparing Packet Application Data(23) with length: 42 and min pad: 0
  520. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Sent Packet[3] Application Data(23) in epoch 2 and length: 64
  521. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x24c2150]: Start of epoch cleanup
  522. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x24c2150]: End of epoch cleanup
  523. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x24c2150]: Epoch #0 freed
  524. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23edb10]: Start of epoch cleanup
  525. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23edb10]: End of epoch cleanup
  526. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23edb10]: Epoch #0 freed
  527. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: SSL 3.3 Application Data packet received. Epoch 2, length: 487
  528. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Expected Packet Application Data(23)
  529. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Received Packet Application Data(23) with length: 487
  530. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Decrypted Packet[3] Application Data(23) with length: 470
  531. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:589
  532. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: record.c[_gnutls_recv_int]:1775
  533. Nov 3 21:25:14 to kresd[27449]: [43135.24][slct] => id: '60729' updating: '.'@'1.0.0.1#00853' zone cut: 'cssz.cz.' with rtt 23 to srtt: 34 and variance: 9
  534. Nov 3 21:25:14 to kresd[27449]: [43135.24][slct] => id: '60729' noting selection error: '.'@'1.0.0.1#00853' zone cut: 'cssz.cz.' error: 6 SERVFAIL
  535. Nov 3 21:25:14 to kresd[27449]: [43135.24][iter] <= rcode: SERVFAIL
  536. Nov 3 21:25:14 to kresd[27449]: [43135.24][iter] 'www.cssz.cz.' type 'NS' new uid was assigned .25, parent uid .16
  537. Nov 3 21:25:14 to kresd[27449]: [43135.25][resl] => id: '43135' querying: '.'@'1.1.1.1#00853' zone cut: 'cssz.cz.' qname: 'www.cssz.cz.' qtype: 'NS' proto: 'tcp'
  538. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Preparing Packet Application Data(23) with length: 42 and min pad: 0
  539. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Sent Packet[2] Application Data(23) in epoch 2 and length: 64
  540. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: SSL 3.3 Application Data packet received. Epoch 2, length: 487
  541. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Expected Packet Application Data(23)
  542. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Received Packet Application Data(23) with length: 487
  543. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x23a3a10]: Decrypted Packet[2] Application Data(23) with length: 470
  544. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:589
  545. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: record.c[_gnutls_recv_int]:1775
  546. Nov 3 21:25:14 to kresd[27449]: [43135.25][slct] => id: '43135' updating: '.'@'1.1.1.1#00853' zone cut: 'cssz.cz.' with rtt 21 to srtt: 43 and variance: 20
  547. Nov 3 21:25:14 to kresd[27449]: [43135.25][slct] => id: '43135' noting selection error: '.'@'1.1.1.1#00853' zone cut: 'cssz.cz.' error: 6 SERVFAIL
  548. Nov 3 21:25:14 to kresd[27449]: [43135.25][iter] <= rcode: SERVFAIL
  549. Nov 3 21:25:14 to kresd[27449]: [43135.00][resl] => too many failures in a row, bail out (mitigation for NXNSAttack CVE-2020-12667)
  550. Nov 3 21:25:14 to kresd[27449]: [43135.25][iter] 'www.cssz.cz.' type 'NS' new uid was assigned .26, parent uid .16
  551. Nov 3 21:25:14 to kresd[27449]: [43135.26][resl] => id: '49062' querying: '.'@'1.0.0.1#00853' zone cut: 'cssz.cz.' qname: 'www.cssz.cz.' qtype: 'NS' proto: 'tcp'
  552. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Preparing Packet Application Data(23) with length: 42 and min pad: 0
  553. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Sent Packet[4] Application Data(23) in epoch 2 and length: 64
  554. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: SSL 3.3 Application Data packet received. Epoch 2, length: 487
  555. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Expected Packet Application Data(23)
  556. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Received Packet Application Data(23) with length: 487
  557. Nov 3 21:25:14 to kresd[27449]: [gnutls] (5) REC[0x26188e0]: Decrypted Packet[4] Application Data(23) with length: 470
  558. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:589
  559. Nov 3 21:25:14 to kresd[27449]: [gnutls] (3) ASSERT: record.c[_gnutls_recv_int]:1775
  560. Nov 3 21:25:14 to kresd[27449]: [43135.26][slct] => id: '49062' updating: '.'@'1.0.0.1#00853' zone cut: 'cssz.cz.' with rtt 17 to srtt: 32 and variance: 11
  561. Nov 3 21:25:14 to kresd[27449]: [43135.26][slct] => id: '49062' noting selection error: '.'@'1.0.0.1#00853' zone cut: 'cssz.cz.' error: 6 SERVFAIL
  562. Nov 3 21:25:14 to kresd[27449]: [43135.26][iter] <= rcode: SERVFAIL
  563. Nov 3 21:25:14 to kresd[27449]: [43135.00][resl] => too many failures in a row, bail out (mitigation for NXNSAttack CVE-2020-12667)
  564. Nov 3 21:25:14 to kresd[27449]: [43135.18][resl] insecure because of opt-out
  565. Nov 3 21:25:14 to kresd[27449]: [43135.18][resl] AD: request NOT classified as SECURE
  566. Nov 3 21:25:14 to kresd[27449]: [43135.26][resl] finished in state: 8, queries: 6, mempool: 131136 B
  567.  
RAW Paste Data