[Cryptech Core] Etherpad for meeting agenda
Fredrik Thulin
fredrik at thulin.net
Fri Sep 28 08:47:56 UTC 2018
On fredag 28 september 2018 kl. 10:40:39 CEST Vasily Dolmatov wrote:
...
> MacBook-Air-Vasily-2:Desktop dol$ curl -v https://tid.isoc.org
> * Rebuilt URL to: https://tid.isoc.org/
> * Trying 159.65.181.154...
> * TCP_NODELAY set
> * Connected to tid.isoc.org (159.65.181.154) port 443 (#0)
> …
> * ALPN, offering h2
> * ALPN, offering http/1.1
> * Cipher selection:
> ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH * successfully
> set certificate verify locations:
> * CAfile: /etc/ssl/cert.pem
> CApath: none
> * TLSv1.2 (OUT), TLS handshake, Client hello (1):
> * LibreSSL SSL_connect: SSL_ERROR_SYSCALL in connection to tid.isoc.org:443
> * stopped the pause stream!
> * Closing connection 0
> curl: (35) LibreSSL SSL_connect: SSL_ERROR_SYSCALL in connection to
> tid.isoc.org:443
...
> > Sorry that I can't solve your problem then =)
>
> But you do help by looking from another point of view to understand a cause
> of problem.
Ok, full curl output until the HTML starts from here (I get the same end
result for both v4 and v6):
$ curl -4v https://tid.isoc.org
* Rebuilt URL to: https://tid.isoc.org/
* Trying 159.65.181.154...
* TCP_NODELAY set
* Connected to tid.isoc.org (159.65.181.154) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: /etc/ssl/certs
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / DHE-RSA-AES256-GCM-SHA384
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=tid.isoc.org
* start date: Sep 21 16:33:05 2018 GMT
* expire date: Dec 20 16:33:05 2018 GMT
* subjectAltName: host "tid.isoc.org" matched cert's "tid.isoc.org"
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
* SSL certificate verify ok.
> GET / HTTP/1.1
> Host: tid.isoc.org
> User-Agent: curl/7.58.0
> Accept: */*
>
< HTTP/1.1 200 OK
/Fredrik
More information about the Core
mailing list