Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [root@bigip14:Active:Standalone] etc # ssldump -Adi 0.0 host 192.168.0.132
- New TCP connection #1: 192.168.0.132(12860) <-> bigip14.f5traffic.com(443)
- 1 1 0.0008 (0.0008) C>SV3.1(512) Handshake
- ClientHello
- Version 3.3
- random[32]=
- 11 b3 7f 35 d7 df 04 f6 69 05 ee b6 17 f9 7d a4
- 8b 40 ee 2a 92 75 c4 92 3d 05 96 71 c4 5a 25 d1
- resume [32]=
- 2e 9c 2d 18 de 10 d4 c7 13 67 01 a0 33 3c 94 fc
- 41 c9 7c 5e 92 a9 fd 4a c9 4d 59 46 d3 44 93 6f
- cipher suites
- Unknown value 0x7a7a
- Unknown value 0x1301
- Unknown value 0x1302
- Unknown value 0x1303
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_AES_128_GCM_SHA256
- TLS_RSA_WITH_AES_256_GCM_SHA384
- TLS_RSA_WITH_AES_128_CBC_SHA
- TLS_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_3DES_EDE_CBC_SHA
- compression methods
- NULL
- extensions
- Unknown extension (0xfafa)
- server_name
- extended_master_secret
- renegotiation_info
- supported_groups
- ec_point_formats
- SessionTicket
- application_layer_protocol_negotiation
- status_request
- signature_algorithms
- signature_algorithms[18]=
- 04 03 08 04 04 01 05 03 08 05 05 01 08 06 06 01
- 02 01
- signed_certificate_timestamp
- Unknown extension (0x33)
- Unknown extension (0x2d)
- Unknown extension (0x2b)
- Unknown extension (0x1b)
- Unknown extension (0x8a8a)
- padding
- 1 2 0.0029 (0.0021) S>CV3.3(91) Handshake
- ServerHello
- Version 3.3
- random[32]=
- d0 7d 0c 95 60 64 62 0f bf d4 9b 28 85 ac a2 a7
- 3f aa 18 16 19 15 e6 2b 97 31 d4 9e bb 02 21 07
- session_id[32]=
- 32 e8 34 02 86 2c a8 e6 1a b0 5c 0b ee 75 50 6f
- 52 b3 c9 9f 19 77 b5 7b 18 1a 05 45 be 05 a0 7f
- cipherSuite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- compressionMethod NULL
- extensions
- renegotiation_info
- ec_point_formats
- extended_master_secret
- 1 3 0.0029 (0.0000) S>CV3.3(956) Handshake
- Certificate
- 1 4 0.0029 (0.0000) S>CV3.3(333) Handshake
- ServerKeyExchange
- ServerKeyExchange[329]=
- 03 00 17 41 04 f5 84 3a fc 6e b7 dc f9 03 9f 35
- 70 6a 29 72 fa fd dc 86 3f 43 89 2f 72 99 07 25
- fd f5 f7 0b 84 59 f1 5c 61 eb 12 86 e3 d1 b3 20
- 09 a8 e3 85 66 fd ea 0e 61 02 4f 8d 29 8b 3a 45
- 7c d7 a8 a3 0c 04 01 01 00 ad 11 b5 cf 7f 1d 79
- 21 fe 76 ed 6b 02 29 52 16 82 11 6f 0f d5 c5 23
- 89 7e 6d 45 83 9b 99 f4 19 b2 f2 f1 ae 52 03 5d
- 3d 37 98 ea f3 21 36 96 a3 35 e2 ca 84 d0 23 42
- e8 46 5f 8e 9a 88 8d 8b d3 76 67 1f 8b 70 c0 f7
- 05 7f a1 5c c2 ff de 5e 8c ec 37 ca a2 a6 63 93
- 77 c7 5f 95 fc cd 80 e4 09 12 e6 0a da da 6c ef
- 05 bf ef 04 1d 09 da 41 84 5b c0 b9 a4 fe 65 47
- a2 e4 32 ec 66 e0 24 52 f7 7d ce 2f 8b 31 75 56
- fe 39 94 f2 ba c2 ec a5 89 49 52 01 46 7e 61 86
- f5 b9 9a 1d 70 84 ce 4e 9e 6e 8a 9a 3b fc 8f 34
- cf ca ac 6c 2d 89 0b f9 24 43 4e 17 7e aa cc bf
- 1b 56 9c 4f 17 5b 49 73 3c 85 f5 f1 8b e3 39 3b
- 1c 35 2b ed b4 f9 ee 4c c7 0c fa e4 41 9d 1b 13
- d7 c2 ca 13 4c 00 5d 4e a1 9b 08 7d 84 15 42 b2
- 9f e9 fb 13 86 cf 35 d2 90 e4 cd 3a 8f 1b fc 12
- 54 d7 ae 3b 21 33 04 59 29
- 1 5 0.0029 (0.0000) S>CV3.3(4) Handshake
- ServerHelloDone
- 1 6 0.0041 (0.0012) C>SV3.3(2) Alert
- level fatal
- value certificate_unknown
- 1 0.0042 (0.0000) C>S TCP FIN
- 1 0.0042 (0.0000) S>C TCP FIN
- New TCP connection #2: 192.168.0.132(12861) <-> bigip14.f5traffic.com(443)
- 2 1 0.0010 (0.0010) C>SV3.1(512) Handshake
- ClientHello
- Version 3.3
- random[32]=
- 43 f3 60 9b e1 ef 22 6d a9 48 cd 89 c9 95 76 e6
- ab aa 19 c5 4f 77 b8 8c 52 6a dd d9 79 cd af 45
- resume [32]=
- 4e b5 94 f3 ed 95 6d 2a 72 a8 b8 f9 e6 13 6a c4
- ef 8f 32 1d 94 78 60 1b 1f 75 6d f9 95 76 66 05
- cipher suites
- Unknown value 0x8a8a
- Unknown value 0x1301
- Unknown value 0x1302
- Unknown value 0x1303
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_AES_128_GCM_SHA256
- TLS_RSA_WITH_AES_256_GCM_SHA384
- TLS_RSA_WITH_AES_128_CBC_SHA
- TLS_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_3DES_EDE_CBC_SHA
- compression methods
- NULL
- extensions
- Unknown extension (0xfafa)
- server_name
- extended_master_secret
- renegotiation_info
- supported_groups
- ec_point_formats
- SessionTicket
- application_layer_protocol_negotiation
- status_request
- signature_algorithms
- signature_algorithms[18]=
- 04 03 08 04 04 01 05 03 08 05 05 01 08 06 06 01
- 02 01
- signed_certificate_timestamp
- Unknown extension (0x33)
- Unknown extension (0x2d)
- Unknown extension (0x2b)
- Unknown extension (0x1b)
- Unknown extension (0x4a4a)
- padding
- 2 2 0.0021 (0.0010) S>CV3.3(91) Handshake
- ServerHello
- Version 3.3
- random[32]=
- 20 b9 32 67 1d 92 ee a9 53 91 4e 63 17 6f ae f0
- b1 77 c1 95 e8 0d 14 0f 50 b0 dd 4a f8 52 8d f5
- session_id[32]=
- 5e 24 41 9f 72 28 75 42 c7 6c e9 27 5a f1 9c 4a
- 62 9c 91 9e 08 90 c5 62 64 a6 91 69 2a 81 ec 5b
- cipherSuite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- compressionMethod NULL
- extensions
- renegotiation_info
- ec_point_formats
- extended_master_secret
- 2 3 0.0021 (0.0000) S>CV3.3(956) Handshake
- Certificate
- 2 4 0.0021 (0.0000) S>CV3.3(333) Handshake
- ServerKeyExchange
- ServerKeyExchange[329]=
- 03 00 17 41 04 59 e0 2c a0 55 c0 2d 80 dc 6e 1f
- 9d c8 52 7f 41 d1 00 18 fe 68 2f d4 9f 0a 39 91
- 3b a8 c4 fc b7 5e c3 00 e0 4f 71 cb 5b 5b 53 b7
- 45 24 2d fa e9 22 43 a6 88 6e ae 05 02 09 8e df
- be f1 06 33 2c 04 01 01 00 2f f3 a0 42 9e 92 c5
- 04 5a 3d 0c 70 b1 4a 83 77 de 62 01 b6 8e 43 9b
- 72 d0 9f 76 ad 93 91 b1 f2 6e 2a 1a bc 84 2e 44
- aa 82 f8 e1 d1 43 7c 48 23 0d 26 52 2d 07 38 05
- 6f 4c 2e 57 ae 2a 56 7d eb fc 93 d2 f8 d6 5d 9f
- 49 ca 33 3f 17 14 ae f2 8e 70 52 ed 1c 2d 7d 54
- 5e fc eb ae fd 7c a6 8b 09 b7 43 84 f0 0e b6 d7
- f6 49 1f 27 c3 d8 07 76 7e 34 d9 78 c6 5b 59 38
- 1a ba ba 42 d2 50 66 d4 46 0d 28 63 1a af a8 27
- 7a 32 10 d1 ff 89 14 1b 77 52 fe 03 e3 9f 6c 09
- 00 9f ae 64 b9 c1 cc b5 e9 0b b1 64 a6 d5 3b c2
- fb 55 b6 e1 f5 06 d1 d5 f0 0e be 6e b5 02 65 de
- cc e9 20 dc 60 ae a2 e9 2a 3b 9c fb 1b f4 a3 a7
- e9 f0 b3 0c 6e 13 69 20 83 36 09 ed f1 08 04 2b
- d8 25 30 fa 99 80 a7 97 d5 d2 62 1e 73 cf e6 54
- f8 8a ae a9 e8 69 64 a3 c0 1a 08 82 e1 c9 2d e8
- 7a 9b ce 2d 26 d1 cb 84 56
- 2 5 0.0021 (0.0000) S>CV3.3(4) Handshake
- ServerHelloDone
- 2 6 0.0029 (0.0007) C>SV3.3(2) Alert
- level fatal
- value certificate_unknown
- 2 0.0030 (0.0001) C>S TCP FIN
- 2 0.0031 (0.0000) S>C TCP FIN
- New TCP connection #3: 192.168.0.132(12862) <-> bigip14.f5traffic.com(443)
- 3 1 0.0014 (0.0014) C>SV3.1(512) Handshake
- ClientHello
- Version 3.3
- random[32]=
- 83 14 73 77 e6 23 03 d4 4c 62 ad b2 44 49 de d4
- c1 69 8e 3e 8c 02 bc 27 e7 39 85 a6 2d 36 50 7f
- resume [32]=
- 1f aa ab d0 9b f1 ea b4 e1 8c 91 f1 19 34 ef 9c
- 23 bd 34 2a 5b 7c da da 68 1c 0c 90 36 6e 78 90
- cipher suites
- Unknown value 0x4a4a
- Unknown value 0x1301
- Unknown value 0x1302
- Unknown value 0x1303
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_AES_128_GCM_SHA256
- TLS_RSA_WITH_AES_256_GCM_SHA384
- TLS_RSA_WITH_AES_128_CBC_SHA
- TLS_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_3DES_EDE_CBC_SHA
- compression methods
- NULL
- extensions
- Unknown extension (0xcaca)
- server_name
- extended_master_secret
- renegotiation_info
- supported_groups
- ec_point_formats
- SessionTicket
- application_layer_protocol_negotiation
- status_request
- signature_algorithms
- signature_algorithms[18]=
- 04 03 08 04 04 01 05 03 08 05 05 01 08 06 06 01
- 02 01
- signed_certificate_timestamp
- Unknown extension (0x33)
- Unknown extension (0x2d)
- Unknown extension (0x2b)
- Unknown extension (0x1b)
- Unknown extension (0xdada)
- padding
- 3 2 0.0028 (0.0014) S>CV3.3(91) Handshake
- ServerHello
- Version 3.3
- random[32]=
- 83 72 bd 41 17 2d 7b 52 30 3e 2f 83 f7 e1 0c 13
- 0d 78 4f bb 9d df b4 2b 4e c5 bb 02 cc 70 a5 e9
- session_id[32]=
- dc 8b 6e f5 d1 ee 82 f9 04 93 d4 3d 78 77 6a c0
- 61 b2 3f b4 6a d6 53 b8 a3 f8 0f 93 c8 87 3a 51
- cipherSuite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- compressionMethod NULL
- extensions
- renegotiation_info
- ec_point_formats
- extended_master_secret
- 3 3 0.0028 (0.0000) S>CV3.3(956) Handshake
- Certificate
- 3 4 0.0028 (0.0000) S>CV3.3(333) Handshake
- ServerKeyExchange
- ServerKeyExchange[329]=
- 03 00 17 41 04 59 e0 2c a0 55 c0 2d 80 dc 6e 1f
- 9d c8 52 7f 41 d1 00 18 fe 68 2f d4 9f 0a 39 91
- 3b a8 c4 fc b7 5e c3 00 e0 4f 71 cb 5b 5b 53 b7
- 45 24 2d fa e9 22 43 a6 88 6e ae 05 02 09 8e df
- be f1 06 33 2c 04 01 01 00 82 14 44 05 88 9f 2e
- 0e 1f 24 79 79 7b 3b 3e 69 cb 11 32 db 5d 82 65
- d9 8f b3 aa f0 0b 13 43 68 ed a3 7b 17 21 39 d6
- 91 a3 dc eb 24 7f cd 3f 75 29 6f 72 bd f8 c9 61
- 3b 19 45 d0 3c 8c b5 4b 05 0c 69 db e0 55 db 82
- 2a 37 e9 eb 8b 12 c0 42 f6 f3 fe 60 5f 7d 4a 71
- 87 bc e5 ff 17 5d 88 7a fa a7 2e 68 54 6c 05 5b
- f2 b8 b4 fb e1 9a 47 86 ae f0 f1 a9 6d d4 29 40
- 3d 6d 11 ab 89 d7 1d 16 d1 53 bd 56 89 a8 12 30
- 37 47 dd 8e 22 32 fa c9 60 d9 f2 4b 0b f8 6a 77
- 9e db 54 91 33 d5 26 51 b6 1e 4b 82 40 b0 c0 d6
- 98 94 17 75 af b4 d6 ba a9 a1 cb f5 8d b4 f7 42
- cd 4a 6f 2c d1 61 23 49 67 92 d1 f4 ad e0 e0 c8
- af 28 53 00 8c 04 87 c4 37 a4 28 a2 c5 15 c8 8a
- 93 57 6b 87 02 20 6e fd ea 07 f1 ae 97 67 7f 54
- c9 8b 35 fb f7 f1 3d 44 25 14 f6 e8 00 65 a5 5c
- 81 a1 80 bd ad c9 c9 1c fd
- 3 5 0.0028 (0.0000) S>CV3.3(4) Handshake
- ServerHelloDone
- 3 6 0.0034 (0.0005) C>SV3.3(2) Alert
- level fatal
- value certificate_unknown
- 3 0.0036 (0.0001) C>S TCP FIN
- 3 0.0036 (0.0000) S>C TCP FIN
- New TCP connection #4: 192.168.0.132(12863) <-> bigip14.f5traffic.com(443)
- 4 1 0.0007 (0.0007) C>SV3.1(512) Handshake
- ClientHello
- Version 3.3
- random[32]=
- 15 0d 6d f3 86 52 1f 83 05 e0 30 97 d8 ed f5 a6
- 30 13 65 3b 77 a3 67 ea 32 c3 8f 29 d1 9d ab 07
- resume [32]=
- 78 90 da aa 1e 6d e2 be c1 d0 30 51 f6 cd d6 98
- 87 8a 11 ca 2c 96 26 9f 1a f5 5c 15 08 29 30 f1
- cipher suites
- Unknown value 0x7a7a
- Unknown value 0x1301
- Unknown value 0x1302
- Unknown value 0x1303
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_AES_128_GCM_SHA256
- TLS_RSA_WITH_AES_256_GCM_SHA384
- TLS_RSA_WITH_AES_128_CBC_SHA
- TLS_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_3DES_EDE_CBC_SHA
- compression methods
- NULL
- extensions
- Unknown extension (0xeaea)
- server_name
- extended_master_secret
- renegotiation_info
- supported_groups
- ec_point_formats
- SessionTicket
- application_layer_protocol_negotiation
- status_request
- signature_algorithms
- signature_algorithms[18]=
- 04 03 08 04 04 01 05 03 08 05 05 01 08 06 06 01
- 02 01
- signed_certificate_timestamp
- Unknown extension (0x33)
- Unknown extension (0x2d)
- Unknown extension (0x2b)
- Unknown extension (0x1b)
- Unknown extension (0x7a7a)
- padding
- 4 2 0.0019 (0.0012) S>CV3.3(91) Handshake
- ServerHello
- Version 3.3
- random[32]=
- 2c 79 be ee 38 af 43 02 b8 f9 7d 47 8d eb a5 90
- 5e 6a 3d 1f bf f8 13 fe 4f 87 f4 a5 1e 71 bd 98
- session_id[32]=
- ab 0e 14 70 0f 22 19 a4 b2 77 5c 18 97 0a e1 cc
- ea 14 e8 4c 50 38 e4 78 34 1d 44 36 a7 da 71 1c
- cipherSuite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- compressionMethod NULL
- extensions
- renegotiation_info
- ec_point_formats
- extended_master_secret
- 4 3 0.0019 (0.0000) S>CV3.3(956) Handshake
- Certificate
- 4 4 0.0019 (0.0000) S>CV3.3(333) Handshake
- ServerKeyExchange
- ServerKeyExchange[329]=
- 03 00 17 41 04 f5 84 3a fc 6e b7 dc f9 03 9f 35
- 70 6a 29 72 fa fd dc 86 3f 43 89 2f 72 99 07 25
- fd f5 f7 0b 84 59 f1 5c 61 eb 12 86 e3 d1 b3 20
- 09 a8 e3 85 66 fd ea 0e 61 02 4f 8d 29 8b 3a 45
- 7c d7 a8 a3 0c 04 01 01 00 25 20 35 df 00 23 d9
- 21 dc 8f 8d 06 b3 5f 77 8a 54 83 d7 1b df df 13
- f6 8a 2d 0d f0 89 f6 da 2d 7d 5f d2 db fe d4 27
- 27 a2 90 5d a9 04 4b 4d 30 0f 77 62 52 bf b5 1f
- 97 00 c8 f9 92 ec a8 46 cd 89 ea b4 62 0e 21 6e
- 39 35 1e 1c ab d3 db 5e b0 6b b3 61 24 45 e6 3d
- e3 12 05 66 7d fd 88 3c 83 a3 b9 9e 0b 54 cc 24
- de 39 aa 64 59 ea 2d d0 c2 93 59 f7 d1 f1 4f 71
- 24 18 21 a1 bb d7 7b 36 a9 cc 0d 68 6b f9 f8 ee
- 8d 86 ee b7 80 a6 e7 80 f0 1a 2b 19 0c 14 dd af
- 62 80 45 d4 5a b8 84 63 df 49 ff 50 ef a8 57 2b
- 51 a6 97 94 0a 78 45 fa af 56 e9 0a 6f e1 cc 0d
- a4 0e 4b a9 5d bd ce 0c 0c d7 07 24 64 bd 35 b2
- c2 bd f5 3f fa d1 6c 4f fe 75 8c 8f 7b b9 cd 8f
- ee 35 68 51 69 8d d9 fe c0 69 25 14 1f 12 24 be
- d1 dc ee c9 5a bc 77 86 2c 9c 01 46 f7 e8 a4 ac
- 02 76 6e c5 df 52 0c 33 dc
- 4 5 0.0019 (0.0000) S>CV3.3(4) Handshake
- ServerHelloDone
- 4 6 0.0034 (0.0014) C>SV3.3(70) Handshake
- ClientKeyExchange
- ClientKeyExchange[66]=
- 41 04 59 31 ed 35 e7 e7 2e a9 7a 0b 57 46 ba 08
- 4e cb 22 21 51 8c 79 86 40 16 31 00 33 e6 24 f4
- c5 6c 61 ea e3 b2 92 4d d1 06 18 dd 9d ef e4 6c
- 0b cc 82 57 e3 ff cc a9 97 b8 16 8c ab ec 52 03
- 69 60
- 4 7 0.0034 (0.0000) C>SV3.3(1) ChangeCipherSpec
- 4 8 0.0034 (0.0000) C>SV3.3(40) Handshake
- 4 9 0.0039 (0.0005) S>CV3.3(1) ChangeCipherSpec
- 4 10 0.0039 (0.0000) S>CV3.3(40) Handshake
- 4 11 0.0047 (0.0008) C>SV3.3(584) application_data
- 4 0.0049 (0.0001) S>C TCP RST
- New TCP connection #5: 192.168.0.132(12866) <-> bigip14.f5traffic.com(443)
- 5 1 0.0020 (0.0020) C>SV3.1(512) Handshake
- ClientHello
- Version 3.3
- random[32]=
- 19 cf ea 32 54 80 e3 d5 13 af 63 cd 85 9c b4 4f
- 4d 29 14 22 74 94 36 d9 8f ee 09 5f d8 38 ed 9d
- resume [32]=
- ab 0e 14 70 0f 22 19 a4 b2 77 5c 18 97 0a e1 cc
- ea 14 e8 4c 50 38 e4 78 34 1d 44 36 a7 da 71 1c
- cipher suites
- Unknown value 0x4a4a
- Unknown value 0x1301
- Unknown value 0x1302
- Unknown value 0x1303
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_AES_128_GCM_SHA256
- TLS_RSA_WITH_AES_256_GCM_SHA384
- TLS_RSA_WITH_AES_128_CBC_SHA
- TLS_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_3DES_EDE_CBC_SHA
- compression methods
- NULL
- extensions
- Unknown extension (0x5a5a)
- server_name
- extended_master_secret
- renegotiation_info
- supported_groups
- ec_point_formats
- SessionTicket
- application_layer_protocol_negotiation
- status_request
- signature_algorithms
- signature_algorithms[18]=
- 04 03 08 04 04 01 05 03 08 05 05 01 08 06 06 01
- 02 01
- signed_certificate_timestamp
- Unknown extension (0x33)
- Unknown extension (0x2d)
- Unknown extension (0x2b)
- Unknown extension (0x1b)
- Unknown extension (0xfafa)
- padding
- 5 2 0.0025 (0.0005) S>CV3.3(91) Handshake
- ServerHello
- Version 3.3
- random[32]=
- 98 df ba f2 45 98 ca a1 00 25 9b b4 19 43 12 66
- fb 2e 5f ff 25 8e 36 3c fd 3d a7 ce ec 2a 28 cb
- session_id[32]=
- ab 0e 14 70 0f 22 19 a4 b2 77 5c 18 97 0a e1 cc
- ea 14 e8 4c 50 38 e4 78 34 1d 44 36 a7 da 71 1c
- cipherSuite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- compressionMethod NULL
- extensions
- renegotiation_info
- ec_point_formats
- extended_master_secret
- 5 3 0.0025 (0.0000) S>CV3.3(1) ChangeCipherSpec
- 5 4 0.0030 (0.0004) S>CV3.3(40) Handshake
- 5 5 0.0031 (0.0001) C>SV3.3(2) Alert
- level fatal
- value certificate_unknown
- 5 0.0033 (0.0001) C>S TCP FIN
- 5 0.0040 (0.0006) S>C TCP FIN
- New TCP connection #6: 192.168.0.132(12867) <-> bigip14.f5traffic.com(443)
- 6 1 0.0007 (0.0007) C>SV3.1(512) Handshake
- ClientHello
- Version 3.3
- random[32]=
- 72 91 68 50 fc 42 89 e3 75 4b 0f d9 d9 db 68 0a
- 55 3b 09 17 cd 15 60 0b 83 ca ab 99 61 42 6b ca
- resume [32]=
- ab 0e 14 70 0f 22 19 a4 b2 77 5c 18 97 0a e1 cc
- ea 14 e8 4c 50 38 e4 78 34 1d 44 36 a7 da 71 1c
- cipher suites
- Unknown value 0x8a8a
- Unknown value 0x1301
- Unknown value 0x1302
- Unknown value 0x1303
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_AES_128_GCM_SHA256
- TLS_RSA_WITH_AES_256_GCM_SHA384
- TLS_RSA_WITH_AES_128_CBC_SHA
- TLS_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_3DES_EDE_CBC_SHA
- compression methods
- NULL
- extensions
- Unknown extension (0x5a5a)
- server_name
- extended_master_secret
- renegotiation_info
- supported_groups
- ec_point_formats
- SessionTicket
- application_layer_protocol_negotiation
- status_request
- signature_algorithms
- signature_algorithms[18]=
- 04 03 08 04 04 01 05 03 08 05 05 01 08 06 06 01
- 02 01
- signed_certificate_timestamp
- Unknown extension (0x33)
- Unknown extension (0x2d)
- Unknown extension (0x2b)
- Unknown extension (0x1b)
- Unknown extension (0x9a9a)
- padding
- 6 2 0.0007 (0.0000) S>CV3.3(91) Handshake
- ServerHello
- Version 3.3
- random[32]=
- 2a 15 33 66 91 88 ae ef 00 c3 b1 df f5 94 05 24
- ef 4a 8c 50 d3 39 97 1d 55 63 e0 85 b7 00 e8 c4
- session_id[32]=
- ab 0e 14 70 0f 22 19 a4 b2 77 5c 18 97 0a e1 cc
- ea 14 e8 4c 50 38 e4 78 34 1d 44 36 a7 da 71 1c
- cipherSuite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- compressionMethod NULL
- extensions
- renegotiation_info
- ec_point_formats
- extended_master_secret
- 6 3 0.0007 (0.0000) S>CV3.3(1) ChangeCipherSpec
- 6 4 0.0009 (0.0001) S>CV3.3(40) Handshake
- 6 5 0.0016 (0.0007) C>SV3.3(1) ChangeCipherSpec
- 6 6 0.0016 (0.0000) C>SV3.3(40) Handshake
- 6 7 0.0016 (0.0000) C>SV3.3(570) application_data
- 6 0.0023 (0.0007) S>C TCP RST
- New TCP connection #4: 192.168.0.132(12863) <-> bigip14.f5traffic.com(443)^C[root@bigip14:Active:Standalone]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement