[Cryptech Core] Etherpad for meeting agenda

Fredrik Thulin fredrik at thulin.net
Fri Sep 28 08:47:56 UTC 2018


On fredag 28 september 2018 kl. 10:40:39 CEST Vasily Dolmatov wrote:
...
> MacBook-Air-Vasily-2:Desktop dol$ curl -v https://tid.isoc.org
> * Rebuilt URL to: https://tid.isoc.org/
> *   Trying 159.65.181.154...
> * TCP_NODELAY set
> * Connected to tid.isoc.org (159.65.181.154) port 443 (#0)
>> * ALPN, offering h2
> * ALPN, offering http/1.1
> * Cipher selection:
> ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH * successfully
> set certificate verify locations:
> *   CAfile: /etc/ssl/cert.pem
>   CApath: none
> * TLSv1.2 (OUT), TLS handshake, Client hello (1):
> * LibreSSL SSL_connect: SSL_ERROR_SYSCALL in connection to tid.isoc.org:443
> * stopped the pause stream!
> * Closing connection 0
> curl: (35) LibreSSL SSL_connect: SSL_ERROR_SYSCALL in connection to
> tid.isoc.org:443
...
> > Sorry that I can't solve your problem then =)
> 
> But you do help by looking from another point of view to understand a cause
> of problem.

Ok, full curl output until the HTML starts from here (I get the same end 
result for both v4 and v6):

$ curl -4v https://tid.isoc.org
* Rebuilt URL to: https://tid.isoc.org/
*   Trying 159.65.181.154...
* TCP_NODELAY set
* Connected to tid.isoc.org (159.65.181.154) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/certs/ca-certificates.crt
  CApath: /etc/ssl/certs
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / DHE-RSA-AES256-GCM-SHA384
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: CN=tid.isoc.org
*  start date: Sep 21 16:33:05 2018 GMT
*  expire date: Dec 20 16:33:05 2018 GMT
*  subjectAltName: host "tid.isoc.org" matched cert's "tid.isoc.org"
*  issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
*  SSL certificate verify ok.
> GET / HTTP/1.1
> Host: tid.isoc.org
> User-Agent: curl/7.58.0
> Accept: */*
> 
< HTTP/1.1 200 OK

/Fredrik





More information about the Core mailing list