[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: gnutls26 insanely slow on m68k (compared to openssl)



Dixi quod…

>Should being the keyword, as you can see from below, with

Meh, forgot the attachment.

root@ara2:~ # dd if=/dev/random of=/dev/null iflag=fullblock count=20 # to show I have rng-tools running
20+0 records in
20+0 records out
10240 bytes (10 kB) copied, 0.530935 s, 19.3 kB/s
root@ara2:~ # print 'HEAD / HTTP/1.0\n' | time openssl s_client -connect www.mirbsd.org:443
CONNECTED(00000003)
depth=3 L = ValiCert Validation Network, O = "ValiCert, Inc.", OU = ValiCert Class 2 Policy Validation Authority, CN = http://www.valicert.com/, emailAddress = info@valicert.com
verify error:num=19:self signed certificate in certificate chain
verify return:0
---
Certificate chain
 0 s:/O=*.mirbsd.org/OU=Domain Control Validated/CN=*.mirbsd.org
   i:/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=http://certificates.godaddy.com/repository/CN=Go Daddy Secure Certification Authority/serialNumber=07969287
 1 s:/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=http://certificates.godaddy.com/repository/CN=Go Daddy Secure Certification Authority/serialNumber=07969287
   i:/C=US/O=The Go Daddy Group, Inc./OU=Go Daddy Class 2 Certification Authority
 2 s:/C=US/O=The Go Daddy Group, Inc./OU=Go Daddy Class 2 Certification Authority
   i:/L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert Class 2 Policy Validation Authority/CN=http://www.valicert.com//emailAddress=info@valicert.com
 3 s:/L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert Class 2 Policy Validation Authority/CN=http://www.valicert.com//emailAddress=info@valicert.com
   i:/L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert Class 2 Policy Validation Authority/CN=http://www.valicert.com//emailAddress=info@valicert.com
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/O=*.mirbsd.org/OU=Domain Control Validated/CN=*.mirbsd.org
issuer=/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=http://certificates.godaddy.com/repository/CN=Go Daddy Secure Certification Authority/serialNumber=07969287
---
No client certificate CA names sent
---
SSL handshake has read 5060 bytes and written 890 bytes
---
New, TLSv1/SSLv3, Cipher is RC4-SHA
Server public key is 4096 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : RC4-SHA
    Session-ID: B6E06DAF3DD6C10FE18A717031C436D5419519A7C2DF00F3E6526F042430E365
    Session-ID-ctx:
    Master-Key: 8AA1DF7EA1BA25E3BFBA987C9729FCE1BD53D3552C364A3CBA1A0EA88EAC53871AEB925D71D0A7D2E7D29915A606EEC3
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1356011891
    Timeout   : 300 (sec)
    Verify return code: 19 (self signed certificate in certificate chain)
---
DONE
    0m1.06s real     0m0.23s user     0m0.40s system
root@ara2:~ # print 'HEAD / HTTP/1.0\n' | time /usr/lib/m68k-linux-gnu/libgnutls26/gnutls-cli -p 443 www.mirbsd>
Resolving 'www.mirbsd.org'...
Connecting to '81.169.181.30:443'...
|<4>| REC[0x8001a1c8]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x8001a1c8]: Allocating epoch #1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA256
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA256
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA256
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA256
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x8001a1c8]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<2>| EXT[0x8001a1c8]: Sending extension SERVER NAME (19 bytes)
|<2>| EXT[0x8001a1c8]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<2>| EXT[0x8001a1c8]: Sending extension SESSION TICKET (0 bytes)
|<2>| EXT[SIGA]: sent signature algo (4.2) DSA-SHA256
|<2>| EXT[SIGA]: sent signature algo (4.1) RSA-SHA256
|<2>| EXT[SIGA]: sent signature algo (2.1) RSA-SHA1
|<2>| EXT[SIGA]: sent signature algo (2.2) DSA-SHA1
|<2>| EXT[0x8001a1c8]: Sending extension SIGNATURE ALGORITHMS (10 bytes)
|<3>| HSK[0x8001a1c8]: CLIENT HELLO was sent [139 bytes]
|<6>| BUF[HSK]: Inserted 139 bytes of Data
|<7>| HWRITE: enqueued 139. Total 139 bytes.
|<7>| HWRITE FLUSH: 139 bytes in buffer.
|<4>| REC[0x8001a1c8]: Sending Packet[0] Handshake(22) with length: 139
|<7>| WRITE: enqueued 144 bytes for 0x4. Total 144 bytes.
|<4>| REC[0x8001a1c8]: Sent Packet[1] Handshake(22) with length: 144
|<7>| HWRITE: wrote 139 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 144 bytes in buffer.
|<7>| WRITE: wrote 144 bytes, 0 bytes left.
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x8001a1c8]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x8001a1c8]: Received Packet[0] Handshake(22) with length: 74
|<7>| READ: Got 74 bytes from 0x4
|<7>| READ: read 74 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 74 bytes.
|<7>| RB: Requested 79 bytes
|<4>| REC[0x8001a1c8]: Decrypted Packet[0] Handshake(22) with length: 74
|<6>| BUF[HSK]: Inserted 74 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
|<3>| HSK[0x8001a1c8]: SERVER HELLO was received [74 bytes]
|<6>| BUF[REC][HD]: Read 70 bytes of Data(22)
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<6>| BUF[HSK]: Inserted 70 bytes of Data
|<3>| HSK[0x8001a1c8]: Server's version: 3.1
|<3>| HSK[0x8001a1c8]: SessionID length: 32
|<3>| HSK[0x8001a1c8]: SessionID: f9465eabe4cc3239449fdb59f4f5804d1f14ce393936fd3c52d4d21f5ea74250
|<3>| HSK[0x8001a1c8]: Selected cipher suite: RSA_ARCFOUR_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x8001a1c8]: Allowing unsafe initial negotiation
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x8001a1c8]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x8001a1c8]: Received Packet[1] Handshake(22) with length: 4920
|<7>| READ: Got 1964 bytes from 0x4
|<7>| READ: Got 1448 bytes from 0x4
|<7>| READ: Got 1508 bytes from 0x4
|<7>| READ: read 4920 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 4920 bytes.
|<7>| RB: Requested 4925 bytes
|<4>| REC[0x8001a1c8]: Decrypted Packet[1] Handshake(22) with length: 4920
|<6>| BUF[HSK]: Inserted 4920 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
|<3>| HSK[0x8001a1c8]: CERTIFICATE was received [4920 bytes]
|<6>| BUF[REC][HD]: Read 4916 bytes of Data(22)
|<6>| BUF[HSK]: Peeked 213 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<6>| BUF[HSK]: Inserted 4916 bytes of Data
|<2>| ASSERT: ext_signature.c:393
|<2>| ASSERT: ext_signature.c:393
|<2>| ASSERT: ext_signature.c:393
|<2>| ASSERT: ext_signature.c:393
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x8001a1c8]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x8001a1c8]: Received Packet[2] Handshake(22) with length: 4
|<7>| READ: Got 4 bytes from 0x4
|<7>| READ: read 4 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 4 bytes.
|<7>| RB: Requested 9 bytes
|<4>| REC[0x8001a1c8]: Decrypted Packet[2] Handshake(22) with length: 4
|<6>| BUF[HSK]: Inserted 4 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
|<3>| HSK[0x8001a1c8]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<6>| BUF[HSK]: Peeked 4920 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<3>| HSK[0x8001a1c8]: CLIENT KEY EXCHANGE was sent [518 bytes]
|<6>| BUF[HSK]: Peeked 4 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<7>| HWRITE: enqueued 518. Total 518 bytes.
|<7>| HWRITE FLUSH: 518 bytes in buffer.
|<4>| REC[0x8001a1c8]: Sending Packet[1] Handshake(22) with length: 518
|<7>| WRITE: enqueued 523 bytes for 0x4. Total 523 bytes.
|<4>| REC[0x8001a1c8]: Sent Packet[2] Handshake(22) with length: 523
|<7>| HWRITE: wrote 518 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 523 bytes in buffer.
|<7>| WRITE: wrote 523 bytes, 0 bytes left.
|<3>| REC[0x8001a1c8]: Sent ChangeCipherSpec
|<4>| REC[0x8001a1c8]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<7>| WRITE: enqueued 6 bytes for 0x4. Total 6 bytes.
|<7>| WRITE FLUSH: 6 bytes in buffer.
|<7>| WRITE: wrote 6 bytes, 0 bytes left.
|<4>| REC[0x8001a1c8]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<9>| INT: PREMASTER SECRET[48]: 030354685028a3ed29416cfcaa68182a185d75803895560b7a266afeb53bf44a91f6b696cdfe2a0eed20093a1c623035
|<9>| INT: CLIENT RANDOM[32]: 50d319845ecc8038217d152382efb3e8521d3e80c088acdf183de69d8108c5cf
|<9>| INT: SERVER RANDOM[32]: 50d3199c66fc8fcaa750a5c2c0631942356bfa8d854fc6d48e9e0c5f7a6d58ef
|<9>| INT: MASTER SECRET: 77aa0bd4e4629c952ecf7317bb71f490fdb7739a28e0eb898d1903df61639414e20e2f040e20675f7ca817e4b5f61d80
|<4>| REC[0x8001a1c8]: Initializing epoch #1
|<9>| INT: KEY BLOCK[72]: 53b4270e009b15345024665349a42e8f0e50249a9232723790f993c3e84c56c2
|<9>| INT: CLIENT WRITE KEY [16]: 41ada2b68db08292bee98b1013844cbb
|<9>| INT: SERVER WRITE KEY [16]: 0069c0c735d9b54f6a53300effe729a8
|<4>| REC[0x8001a1c8]: Epoch #1 ready
|<3>| HSK[0x8001a1c8]: Cipher Suite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x8001a1c8]: Initializing internal [write] cipher sessions
|<4>| REC[0x8001a1c8]: Start of epoch cleanup
|<4>| REC[0x8001a1c8]: End of epoch cleanup
|<6>| BUF[HSK]: Peeked 0 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<3>| HSK[0x8001a1c8]: recording tls-unique CB (send)
|<3>| HSK[0x8001a1c8]: FINISHED was sent [16 bytes]
|<6>| BUF[HSK]: Peeked 0 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<7>| HWRITE: enqueued 16. Total 16 bytes.
|<7>| HWRITE FLUSH: 16 bytes in buffer.
|<4>| REC[0x8001a1c8]: Sending Packet[0] Handshake(22) with length: 16
|<7>| WRITE: enqueued 41 bytes for 0x4. Total 41 bytes.
|<4>| REC[0x8001a1c8]: Sent Packet[1] Handshake(22) with length: 41
|<7>| HWRITE: wrote 16 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 41 bytes in buffer.
|<7>| WRITE: wrote 41 bytes, 0 bytes left.
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x8001a1c8]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x8001a1c8]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<7>| READ: Got 1 bytes from 0x4
|<7>| READ: read 1 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 1 bytes.
|<7>| RB: Requested 6 bytes
|<4>| REC[0x8001a1c8]: ChangeCipherSpec Packet was received
|<3>| HSK[0x8001a1c8]: Cipher Suite: RSA_ARCFOUR_SHA1
|<4>| REC[0x8001a1c8]: Start of epoch cleanup
|<4>| REC[0x8001a1c8]: Epoch #0 freed
|<4>| REC[0x8001a1c8]: End of epoch cleanup
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x8001a1c8]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x8001a1c8]: Received Packet[0] Handshake(22) with length: 36
|<7>| READ: Got 36 bytes from 0x4
|<7>| READ: read 36 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 36 bytes.
|<7>| RB: Requested 41 bytes
|<4>| REC[0x8001a1c8]: Decrypted Packet[0] Handshake(22) with length: 16
|<6>| BUF[HSK]: Inserted 16 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
|<3>| HSK[0x8001a1c8]: FINISHED was received [16 bytes]
|<6>| BUF[REC][HD]: Read 12 bytes of Data(22)
|<6>| BUF[HSK]: Peeked 0 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<6>| BUF[HSK]: Inserted 12 bytes of Data
|<6>| BUF[HSK]: Cleared Data from buffer
|<6>| BUF[HSK]: Cleared Data from buffer
|<2>| ASSERT: ext_server_name.c:300
- Certificate type: X.509
 - Got a certificate list of 4 certificates.
 - Certificate[0] info:
|<2>| ASSERT: dn.c:305
|<2>| ASSERT: dn.c:305
  - subject `O=*.mirbsd.org,OU=Domain Control Validated,CN=*.mirbsd.org', issuer `C=US,ST=Arizona,L=Scottsdale,O=GoDaddy.com\, Inc.,OU=http://certificates.godaddy.com/repository,CN=Go Daddy Secure Certification Authority,serialNumber=07969287', RSA key 4096 bits, signed using RSA-SHA1, activated `2012-04-12 20:38:30 UTC', expires `2014-04-12 20:38:30 UTC', SHA-1 fingerprint `443e73738e1b25356380a1336dee58cde3c0c1df'
 - Certificate[1] info:
|<2>| ASSERT: dn.c:305
|<2>| ASSERT: dn.c:305
  - subject `C=US,ST=Arizona,L=Scottsdale,O=GoDaddy.com\, Inc.,OU=http://certificates.godaddy.com/repository,CN=Go Daddy Secure Certification Authority,serialNumber=07969287', issuer `C=US,O=The Go Daddy Group\, Inc.,OU=Go Daddy Class 2 Certification Authority', RSA key 2048 bits, signed using RSA-SHA1, activated `2006-11-16 01:54:37 UTC', expires `2026-11-16 01:54:37 UTC', SHA-1 fingerprint `7c4656c3061f7f4c0d67b319a855f60ebc11fc44'
 - Certificate[2] info:
|<2>| ASSERT: dn.c:305
|<2>| ASSERT: dn.c:305
  - subject `C=US,O=The Go Daddy Group\, Inc.,OU=Go Daddy Class 2 Certification Authority', issuer `L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 2 Policy Validation Authority,CN=http://www.valicert.com/,EMAIL=info@valicert.com', RSA key 2048 bits, signed using RSA-SHA1, activated `2004-06-29 17:06:20 UTC', expires `2024-06-29 17:06:20 UTC', SHA-1 fingerprint `de70f4e2116f7fdce75f9d13012b7e687a3b2c62'
 - Certificate[3] info:
|<2>| ASSERT: dn.c:305
|<2>| ASSERT: dn.c:305
  - subject `L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 2 Policy Validation Authority,CN=http://www.valicert.com/,EMAIL=info@valicert.com', issuer `L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 2 Policy Validation Authority,CN=http://www.valicert.com/,EMAIL=info@valicert.com', RSA key 1024 bits, signed using RSA-SHA1, activated `1999-06-26 00:19:54 UTC', expires `2019-06-26 00:19:54 UTC', SHA-1 fingerprint `317a2ad07f2b335ef5a1c34e4b57e8b7d8f1fca6'
- The hostname in the certificate matches 'www.mirbsd.org'.
|<2>| ASSERT: verify.c:342
|<2>| ASSERT: verify.c:584
- Peer's certificate issuer is unknown
- Peer's certificate is NOT trusted
- Version: TLS1.0
- Key Exchange: RSA
- Cipher: ARCFOUR-128
- MAC: SHA1
- Compression: NULL
- Handshake was completed

- Simple Client Mode:

|<4>| REC[0x8001a1c8]: Sending Packet[1] Application Data(23) with length: 17
|<7>| WRITE: enqueued 42 bytes for 0x4. Total 42 bytes.
|<7>| WRITE FLUSH: 42 bytes in buffer.
|<7>| WRITE: wrote 42 bytes, 0 bytes left.
|<4>| REC[0x8001a1c8]: Sent Packet[2] Application Data(23) with length: 42
|<7>| WRITE FLUSH: 0 bytes in buffer.
|<2>| ASSERT: gnutls_buffers.c:731
|<4>| REC: Sending Alert[1|0] - Close notify
|<4>| REC[0x8001a1c8]: Sending Packet[2] Alert(21) with length: 2
|<7>| WRITE: enqueued 27 bytes for 0x4. Total 27 bytes.
|<7>| WRITE FLUSH: 27 bytes in buffer.
|<7>| WRITE: wrote 27 bytes, 0 bytes left.
|<4>| REC[0x8001a1c8]: Sent Packet[3] Alert(21) with length: 27
|<6>| BUF[HSK]: Cleared Data from buffer
|<4>| REC[0x8001a1c8]: Epoch #1 freed
    0m1.41s real     0m0.25s user     0m0.59s system
root@ara2:~ # print 'HEAD / HTTP/1.0\n' | time /usr/bin/gnutls-cli -p 443 www.mirbsd.org -d 4711
gnutls-cli        gnutls-cli-debug
root@ara2:~ # print 'HEAD / HTTP/1.0\n' | time /usr/bin/gnutls-cli -p 443 www.mirbsd.org -d 4711
|<2>| ASSERT: pkcs11.c:459
Processed 205 CA certificate(s).
Resolving 'www.mirbsd.org'...
Connecting to '81.169.181.30:443'...
|<4>| REC[0x802a10f0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:717
|<4>| REC[0x802a10f0]: Allocating epoch #1
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1 (00.33)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA256 (00.67)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_AES_128_GCM_SHA256 (00.9E)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1 (00.39)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA256 (00.6B)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1 (00.16)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1 (00.32)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA256 (00.40)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1 (00.44)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_AES_128_GCM_SHA256 (00.A2)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1 (00.38)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA256 (00.6A)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1 (00.87)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1 (00.13)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1 (00.66)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1 (00.05)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_ARCFOUR_MD5 (00.04)
|<3>| EXT[0x802a10f0]: Sending extension SERVER NAME (19 bytes)
|<3>| EXT[0x802a10f0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| EXT[0x802a10f0]: Sending extension SUPPORTED ECC (12 bytes)
|<3>| EXT[0x802a10f0]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
|<3>| EXT[0x802a10f0]: sent signature algo (4.1) RSA-SHA256
|<3>| EXT[0x802a10f0]: sent signature algo (4.2) DSA-SHA256
|<3>| EXT[0x802a10f0]: sent signature algo (4.3) ECDSA-SHA256
|<3>| EXT[0x802a10f0]: sent signature algo (5.1) RSA-SHA384
|<3>| EXT[0x802a10f0]: sent signature algo (5.3) ECDSA-SHA384
|<3>| EXT[0x802a10f0]: sent signature algo (6.1) RSA-SHA512
|<3>| EXT[0x802a10f0]: sent signature algo (6.3) ECDSA-SHA512
|<3>| EXT[0x802a10f0]: sent signature algo (3.1) RSA-SHA224
|<3>| EXT[0x802a10f0]: sent signature algo (3.2) DSA-SHA224
|<3>| EXT[0x802a10f0]: sent signature algo (3.3) ECDSA-SHA224
|<3>| EXT[0x802a10f0]: sent signature algo (2.1) RSA-SHA1
|<3>| EXT[0x802a10f0]: sent signature algo (2.2) DSA-SHA1
|<3>| EXT[0x802a10f0]: sent signature algo (2.3) ECDSA-SHA1
|<3>| EXT[0x802a10f0]: Sending extension SIGNATURE ALGORITHMS (28 bytes)
|<3>| HSK[0x802a10f0]: CLIENT HELLO was queued [207 bytes]
|<7>| HWRITE: enqueued [CLIENT HELLO] 207. Total 207 bytes.
|<7>| HWRITE FLUSH: 207 bytes in buffer.
|<4>| REC[0x802a10f0]: Preparing Packet Handshake(22) with length: 207
|<9>| ENC[0x802a10f0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
|<7>| WRITE: enqueued 212 bytes for 0x4. Total 212 bytes.
|<4>| REC[0x802a10f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 212
|<7>| HWRITE: wrote 1 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 212 bytes in buffer.
|<7>| WRITE: wrote 212 bytes, 0 bytes left.
|<2>| ASSERT: gnutls_buffers.c:976
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x802a10f0]: SSL 3.1 Handshake packet received. Epoch 0, length: 74
|<4>| REC[0x802a10f0]: Expected Packet Handshake(22)
|<4>| REC[0x802a10f0]: Received Packet Handshake(22) with length: 74
|<7>| READ: Got 74 bytes from 0x4
|<7>| READ: read 74 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 74 bytes.
|<7>| RB: Requested 79 bytes
|<4>| REC[0x802a10f0]: Decrypted Packet[0] Handshake(22) with length: 74
|<6>| BUF[REC]: Inserted 74 bytes of Data(22)
|<3>| HSK[0x802a10f0]: SERVER HELLO was received. Length 70[70], frag offset 0, frag length: 70, sequence: 0
|<3>| HSK[0x802a10f0]: Server's version: 3.1
|<3>| HSK[0x802a10f0]: SessionID length: 32
|<3>| HSK[0x802a10f0]: SessionID: ae9f3884e840b66e52ed32609c1ffd5284785705b6a1d7cf095f3553f18bad8d
|<3>| HSK[0x802a10f0]: Selected cipher suite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x802a10f0]: Selected compression method: NULL (0)
|<2>| ASSERT: gnutls_extensions.c:161
|<3>| HSK[0x802a10f0]: Allowing unsafe initial negotiation
|<2>| ASSERT: gnutls_buffers.c:976
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x802a10f0]: SSL 3.1 Handshake packet received. Epoch 0, length: 4920
|<4>| REC[0x802a10f0]: Expected Packet Handshake(22)
|<4>| REC[0x802a10f0]: Received Packet Handshake(22) with length: 4920
|<7>| READ: Got 3412 bytes from 0x4
|<7>| READ: Got 1508 bytes from 0x4
|<7>| READ: read 4920 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 4920 bytes.
|<7>| RB: Requested 4925 bytes
|<4>| REC[0x802a10f0]: Decrypted Packet[1] Handshake(22) with length: 4920
|<6>| BUF[REC]: Inserted 4920 bytes of Data(22)
|<3>| HSK[0x802a10f0]: CERTIFICATE was received. Length 4916[4916], frag offset 0, frag length: 4916, sequence: 0
|<2>| ASSERT: x509.c:977
|<2>| ASSERT: x509.c:840
|<2>| ASSERT: x509.c:968
|<2>| ASSERT: dn.c:1190
|<2>| ASSERT: x509.c:977
|<2>| ASSERT: dn.c:1190
|<2>| ASSERT: mpi.c:249
|<2>| ASSERT: dn.c:1190
|<2>| ASSERT: dn.c:1190
- Peer's certificate is trusted
- The hostname in the certificate matches 'www.mirbsd.org'.
|<2>| ASSERT: gnutls_buffers.c:976
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x802a10f0]: SSL 3.1 Handshake packet received. Epoch 0, length: 4
|<4>| REC[0x802a10f0]: Expected Packet Handshake(22)
|<4>| REC[0x802a10f0]: Received Packet Handshake(22) with length: 4
|<7>| READ: Got 4 bytes from 0x4
|<7>| READ: read 4 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 4 bytes.
|<7>| RB: Requested 9 bytes
|<4>| REC[0x802a10f0]: Decrypted Packet[2] Handshake(22) with length: 4
|<6>| BUF[REC]: Inserted 4 bytes of Data(22)
|<3>| HSK[0x802a10f0]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0
|<2>| ASSERT: gnutls_buffers.c:968
|<2>| ASSERT: gnutls_buffers.c:1152
|<3>| HSK[0x802a10f0]: CLIENT KEY EXCHANGE was queued [518 bytes]
|<7>| HWRITE: enqueued [CLIENT KEY EXCHANGE] 518. Total 518 bytes.
|<7>| HWRITE: enqueued [CHANGE CIPHER SPEC] 1. Total 519 bytes.
|<3>| REC[0x802a10f0]: Sent ChangeCipherSpec
|<9>| INT: PREMASTER SECRET[48]: 0303be171d1da7349743cdfb79349b94a0a85e598cf597c438fb05e2d8e852091529bcfcf3361258d99f3f18f8fd87e4
|<9>| INT: CLIENT RANDOM[32]: 50d3199c79c38049d0cde241f9ce4901beb9f64e954f5448b0c6ef275ce0fbfa
|<9>| INT: SERVER RANDOM[32]: 50d319b46fed66d6cde0d05bd3fcf944f503dcf8e0adaff8998561175fe5116a
|<9>| INT: MASTER SECRET: 2b158fd00aeabff1068ebf106b7bb78f6a950e2e7a406fb4b1b85627aadc18f006698497bfc7a8799f3ccb4e511332fa
|<4>| REC[0x802a10f0]: Initializing epoch #1
|<9>| INT: KEY BLOCK[72]: 808ae4be005b40af5b369361b829298e105613c08e8f3d7ad54827bf11e53536
|<9>| INT: CLIENT WRITE KEY [16]: 37c42dbe7678584be904a02c4997f2d4
|<9>| INT: SERVER WRITE KEY [16]: e56f8e1ed79194cbb9d7f4d9a5235d31
|<4>| REC[0x802a10f0]: Epoch #1 ready
|<3>| HSK[0x802a10f0]: Cipher Suite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x802a10f0]: Initializing internal [write] cipher sessions
|<3>| HSK[0x802a10f0]: recording tls-unique CB (send)
|<3>| HSK[0x802a10f0]: FINISHED was queued [16 bytes]
|<7>| HWRITE: enqueued [FINISHED] 16. Total 535 bytes.
|<7>| HWRITE FLUSH: 535 bytes in buffer.
|<4>| REC[0x802a10f0]: Preparing Packet Handshake(22) with length: 518
|<9>| ENC[0x802a10f0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
|<7>| WRITE: enqueued 523 bytes for 0x4. Total 523 bytes.
|<4>| REC[0x802a10f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 523
|<7>| HWRITE: wrote 1 bytes, 17 bytes left.
|<4>| REC[0x802a10f0]: Preparing Packet ChangeCipherSpec(20) with length: 1
|<9>| ENC[0x802a10f0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
|<7>| WRITE: enqueued 6 bytes for 0x4. Total 529 bytes.
|<4>| REC[0x802a10f0]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6
|<7>| HWRITE: wrote 1 bytes, 16 bytes left.
|<4>| REC[0x802a10f0]: Preparing Packet Handshake(22) with length: 16
|<9>| ENC[0x802a10f0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
|<7>| WRITE: enqueued 41 bytes for 0x4. Total 570 bytes.
|<4>| REC[0x802a10f0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 41
|<7>| HWRITE: wrote 1 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 570 bytes in buffer.
|<7>| WRITE: wrote 570 bytes, 0 bytes left.
|<2>| ASSERT: session_ticket.c:684
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x802a10f0]: SSL 3.1 ChangeCipherSpec packet received. Epoch 0, length: 1
|<4>| REC[0x802a10f0]: Expected Packet ChangeCipherSpec(20)
|<4>| REC[0x802a10f0]: Received Packet ChangeCipherSpec(20) with length: 1
|<7>| READ: Got 1 bytes from 0x4
|<7>| READ: read 1 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 1 bytes.
|<7>| RB: Requested 6 bytes
|<4>| REC[0x802a10f0]: Decrypted Packet[3] ChangeCipherSpec(20) with length: 1
|<6>| BUF[REC]: Inserted 1 bytes of Data(20)
|<3>| HSK[0x802a10f0]: Cipher Suite: RSA_ARCFOUR_SHA1
|<2>| ASSERT: gnutls_buffers.c:976
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x802a10f0]: SSL 3.1 Handshake packet received. Epoch 0, length: 36
|<4>| REC[0x802a10f0]: Expected Packet Handshake(22)
|<4>| REC[0x802a10f0]: Received Packet Handshake(22) with length: 36
|<7>| READ: Got 36 bytes from 0x4
|<7>| READ: read 36 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 36 bytes.
|<7>| RB: Requested 41 bytes
|<4>| REC[0x802a10f0]: Decrypted Packet[0] Handshake(22) with length: 16
|<6>| BUF[REC]: Inserted 16 bytes of Data(22)
|<3>| HSK[0x802a10f0]: FINISHED was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
|<4>| REC[0x802a10f0]: Start of epoch cleanup
|<4>| REC[0x802a10f0]: Epoch #0 freed
|<4>| REC[0x802a10f0]: End of epoch cleanup
- Session ID: AE:9F:38:84:E8:40:B6:6E:52:ED:32:60:9C:1F:FD:52:84:78:57:05:B6:A1:D7:CF:09:5F:35:53:F1:8B:AD:8D
|<2>| ASSERT: server_name.c:291
- Certificate type: X.509
- Got a certificate list of 4 certificates.
- Certificate[0] info:
|<2>| ASSERT: dn.c:286
|<2>| ASSERT: dn.c:286
 - subject `O=*.mirbsd.org,OU=Domain Control Validated,CN=*.mirbsd.org', issuer `C=US,ST=Arizona,L=Scottsdale,O=GoDaddy.com\, Inc.,OU=http://certificates.godaddy.com/repository,CN=Go Daddy Secure Certification Authority,serialNumber=07969287', RSA key 4096 bits, signed using RSA-SHA1, activated `2012-04-12 20:38:30 UTC', expires `2014-04-12 20:38:30 UTC', SHA-1 fingerprint `443e73738e1b25356380a1336dee58cde3c0c1df'
        Public Key Id:
                bfa185b1e134775ba097468e0e95b1a676599705
        Public key's random art:
                +--[ RSA 4096]----+
                |          .   E..|
                |           +   o |
                |          = + o  |
                |         + B +   |
                |        S * * .  |
                |       + % + o   |
                |        + = .    |
                |         o o     |
                |        . .      |
                +-----------------+

- Certificate[1] info:
|<2>| ASSERT: dn.c:286
|<2>| ASSERT: dn.c:286
 - subject `C=US,ST=Arizona,L=Scottsdale,O=GoDaddy.com\, Inc.,OU=http://certificates.godaddy.com/repository,CN=Go Daddy Secure Certification Authority,serialNumber=07969287', issuer `C=US,O=The Go Daddy Group\, Inc.,OU=Go Daddy Class 2 Certification Authority', RSA key 2048 bits, signed using RSA-SHA1, activated `2006-11-16 01:54:37 UTC', expires `2026-11-16 01:54:37 UTC', SHA-1 fingerprint `7c4656c3061f7f4c0d67b319a855f60ebc11fc44'
- Certificate[2] info:
|<2>| ASSERT: dn.c:286
|<2>| ASSERT: dn.c:286
 - subject `C=US,O=The Go Daddy Group\, Inc.,OU=Go Daddy Class 2 Certification Authority', issuer `L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 2 Policy Validation Authority,CN=http://www.valicert.com/,EMAIL=info@valicert.com', RSA key 2048 bits, signed using RSA-SHA1, activated `2004-06-29 17:06:20 UTC', expires `2024-06-29 17:06:20 UTC', SHA-1 fingerprint `de70f4e2116f7fdce75f9d13012b7e687a3b2c62'
- Certificate[3] info:
|<2>| ASSERT: dn.c:286
|<2>| ASSERT: dn.c:286
 - subject `L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 2 Policy Validation Authority,CN=http://www.valicert.com/,EMAIL=info@valicert.com', issuer `L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 2 Policy Validation Authority,CN=http://www.valicert.com/,EMAIL=info@valicert.com', RSA key 1024 bits, signed using RSA-SHA1, activated `1999-06-26 00:19:54 UTC', expires `2019-06-26 00:19:54 UTC', SHA-1 fingerprint `317a2ad07f2b335ef5a1c34e4b57e8b7d8f1fca6'
- Version: TLS1.0
- Key Exchange: RSA
- Cipher: ARCFOUR-128
- MAC: SHA1
- Compression: NULL
- Handshake was completed

- Simple Client Mode:

|<4>| REC[0x802a10f0]: Preparing Packet Application Data(23) with length: 17
|<9>| ENC[0x802a10f0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
|<7>| WRITE: enqueued 42 bytes for 0x4. Total 42 bytes.
|<7>| WRITE FLUSH: 42 bytes in buffer.
|<7>| WRITE: wrote 42 bytes, 0 bytes left.
|<4>| REC[0x802a10f0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 42
|<7>| WRITE FLUSH: 0 bytes in buffer.
|<2>| ASSERT: gnutls_buffers.c:570
|<4>| REC: Sending Alert[1|0] - Close notify
|<4>| REC[0x802a10f0]: Preparing Packet Alert(21) with length: 2
|<9>| ENC[0x802a10f0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
|<7>| WRITE: enqueued 27 bytes for 0x4. Total 27 bytes.
|<7>| WRITE FLUSH: 27 bytes in buffer.
|<7>| WRITE: wrote 27 bytes, 0 bytes left.
|<4>| REC[0x802a10f0]: Sent Packet[3] Alert(21) in epoch 1 and length: 27
|<4>| REC[0x802a10f0]: Start of epoch cleanup
|<4>| REC[0x802a10f0]: End of epoch cleanup
|<4>| REC[0x802a10f0]: Epoch #1 freed
    0m11.53s real     0m4.86s user     0m5.99s system
lient -CAfile /etc/ssl/certs/ca-certificates.crt -connect www.mirbsd.org:443                                   <
CONNECTED(00000003)
depth=3 L = ValiCert Validation Network, O = "ValiCert, Inc.", OU = ValiCert Class 2 Policy Validation Authority, CN = http://www.valicert.com/, emailAddress = info@valicert.com
verify return:1
depth=2 C = US, O = "The Go Daddy Group, Inc.", OU = Go Daddy Class 2 Certification Authority
verify return:1
depth=1 C = US, ST = Arizona, L = Scottsdale, O = "GoDaddy.com, Inc.", OU = http://certificates.godaddy.com/repository, CN = Go Daddy Secure Certification Authority, serialNumber = 07969287
verify return:1
depth=0 O = *.mirbsd.org, OU = Domain Control Validated, CN = *.mirbsd.org
verify return:1
---
Certificate chain
 0 s:/O=*.mirbsd.org/OU=Domain Control Validated/CN=*.mirbsd.org
   i:/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=http://certificates.godaddy.com/repository/CN=Go Daddy Secure Certification Authority/serialNumber=07969287
 1 s:/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=http://certificates.godaddy.com/repository/CN=Go Daddy Secure Certification Authority/serialNumber=07969287
   i:/C=US/O=The Go Daddy Group, Inc./OU=Go Daddy Class 2 Certification Authority
 2 s:/C=US/O=The Go Daddy Group, Inc./OU=Go Daddy Class 2 Certification Authority
   i:/L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert Class 2 Policy Validation Authority/CN=http://www.valicert.com//emailAddress=info@valicert.com
 3 s:/L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert Class 2 Policy Validation Authority/CN=http://www.valicert.com//emailAddress=info@valicert.com
   i:/L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert Class 2 Policy Validation Authority/CN=http://www.valicert.com//emailAddress=info@valicert.com
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/O=*.mirbsd.org/OU=Domain Control Validated/CN=*.mirbsd.org
issuer=/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=http://certificates.godaddy.com/repository/CN=Go Daddy Secure Certification Authority/serialNumber=07969287
---
No client certificate CA names sent
---
SSL handshake has read 5060 bytes and written 890 bytes
---
New, TLSv1/SSLv3, Cipher is RC4-SHA
Server public key is 4096 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : RC4-SHA
    Session-ID: 7FFA0B311E0EE99CE59FA55BD933AEBC6E901D99A1F2FBCE4EA8E2D4A2AD80B4
    Session-ID-ctx:
    Master-Key: B62D7960EE4CA602385F26F7DBA6F4B417D3A46D088F4B594F72BCBD8AB0A68E02EB6FA1F2A0F2CEECD8E9AB333CA6BC
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1356011961
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)
---
DONE
    0m2.84s real     0m1.11s user     0m1.29s system
tls-cli --x509cafile=/etc/ssl/certs/ca-certificates.crt -p 443 www.mirbsd.org -d 4711 #gnutls28                <
|<2>| ASSERT: pkcs11.c:459
Processed 205 CA certificate(s).
Resolving 'www.mirbsd.org'...
Connecting to '81.169.181.30:443'...
|<4>| REC[0x802a10f0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:717
|<4>| REC[0x802a10f0]: Allocating epoch #1
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1 (00.33)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA256 (00.67)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_AES_128_GCM_SHA256 (00.9E)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1 (00.39)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA256 (00.6B)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1 (00.16)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1 (00.32)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA256 (00.40)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1 (00.44)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_AES_128_GCM_SHA256 (00.A2)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1 (00.38)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA256 (00.6A)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1 (00.87)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1 (00.13)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1 (00.66)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1 (00.05)
|<3>| HSK[0x802a10f0]: Keeping ciphersuite: RSA_ARCFOUR_MD5 (00.04)
|<3>| EXT[0x802a10f0]: Sending extension SERVER NAME (19 bytes)
|<3>| EXT[0x802a10f0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| EXT[0x802a10f0]: Sending extension SUPPORTED ECC (12 bytes)
|<3>| EXT[0x802a10f0]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
|<3>| EXT[0x802a10f0]: sent signature algo (4.1) RSA-SHA256
|<3>| EXT[0x802a10f0]: sent signature algo (4.2) DSA-SHA256
|<3>| EXT[0x802a10f0]: sent signature algo (4.3) ECDSA-SHA256
|<3>| EXT[0x802a10f0]: sent signature algo (5.1) RSA-SHA384
|<3>| EXT[0x802a10f0]: sent signature algo (5.3) ECDSA-SHA384
|<3>| EXT[0x802a10f0]: sent signature algo (6.1) RSA-SHA512
|<3>| EXT[0x802a10f0]: sent signature algo (6.3) ECDSA-SHA512
|<3>| EXT[0x802a10f0]: sent signature algo (3.1) RSA-SHA224
|<3>| EXT[0x802a10f0]: sent signature algo (3.2) DSA-SHA224
|<3>| EXT[0x802a10f0]: sent signature algo (3.3) ECDSA-SHA224
|<3>| EXT[0x802a10f0]: sent signature algo (2.1) RSA-SHA1
|<3>| EXT[0x802a10f0]: sent signature algo (2.2) DSA-SHA1
|<3>| EXT[0x802a10f0]: sent signature algo (2.3) ECDSA-SHA1
|<3>| EXT[0x802a10f0]: Sending extension SIGNATURE ALGORITHMS (28 bytes)
|<3>| HSK[0x802a10f0]: CLIENT HELLO was queued [207 bytes]
|<7>| HWRITE: enqueued [CLIENT HELLO] 207. Total 207 bytes.
|<7>| HWRITE FLUSH: 207 bytes in buffer.
|<4>| REC[0x802a10f0]: Preparing Packet Handshake(22) with length: 207
|<9>| ENC[0x802a10f0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
|<7>| WRITE: enqueued 212 bytes for 0x4. Total 212 bytes.
|<4>| REC[0x802a10f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 212
|<7>| HWRITE: wrote 1 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 212 bytes in buffer.
|<7>| WRITE: wrote 212 bytes, 0 bytes left.
|<2>| ASSERT: gnutls_buffers.c:976
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x802a10f0]: SSL 3.1 Handshake packet received. Epoch 0, length: 74
|<4>| REC[0x802a10f0]: Expected Packet Handshake(22)
|<4>| REC[0x802a10f0]: Received Packet Handshake(22) with length: 74
|<7>| READ: Got 74 bytes from 0x4
|<7>| READ: read 74 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 74 bytes.
|<7>| RB: Requested 79 bytes
|<4>| REC[0x802a10f0]: Decrypted Packet[0] Handshake(22) with length: 74
|<6>| BUF[REC]: Inserted 74 bytes of Data(22)
|<3>| HSK[0x802a10f0]: SERVER HELLO was received. Length 70[70], frag offset 0, frag length: 70, sequence: 0
|<3>| HSK[0x802a10f0]: Server's version: 3.1
|<3>| HSK[0x802a10f0]: SessionID length: 32
|<3>| HSK[0x802a10f0]: SessionID: ff9d1bec2409240bdef901008c95f181b0f03c240aa7e837088b6916b766e2e1
|<3>| HSK[0x802a10f0]: Selected cipher suite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x802a10f0]: Selected compression method: NULL (0)
|<2>| ASSERT: gnutls_extensions.c:161
|<3>| HSK[0x802a10f0]: Allowing unsafe initial negotiation
|<2>| ASSERT: gnutls_buffers.c:976
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x802a10f0]: SSL 3.1 Handshake packet received. Epoch 0, length: 4920
|<4>| REC[0x802a10f0]: Expected Packet Handshake(22)
|<4>| REC[0x802a10f0]: Received Packet Handshake(22) with length: 4920
|<7>| READ: Got 1964 bytes from 0x4
|<7>| READ: Got 1448 bytes from 0x4
|<7>| READ: Got 1508 bytes from 0x4
|<7>| READ: read 4920 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 4920 bytes.
|<7>| RB: Requested 4925 bytes
|<4>| REC[0x802a10f0]: Decrypted Packet[1] Handshake(22) with length: 4920
|<6>| BUF[REC]: Inserted 4920 bytes of Data(22)
|<3>| HSK[0x802a10f0]: CERTIFICATE was received. Length 4916[4916], frag offset 0, frag length: 4916, sequence: 0
|<2>| ASSERT: x509.c:977
|<2>| ASSERT: x509.c:840
|<2>| ASSERT: x509.c:968
|<2>| ASSERT: dn.c:1190
|<2>| ASSERT: x509.c:977
|<2>| ASSERT: dn.c:1190
|<2>| ASSERT: mpi.c:249
|<2>| ASSERT: dn.c:1190
|<2>| ASSERT: dn.c:1190
- Peer's certificate is trusted
- The hostname in the certificate matches 'www.mirbsd.org'.
|<2>| ASSERT: gnutls_buffers.c:976
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x802a10f0]: SSL 3.1 Handshake packet received. Epoch 0, length: 4
|<4>| REC[0x802a10f0]: Expected Packet Handshake(22)
|<4>| REC[0x802a10f0]: Received Packet Handshake(22) with length: 4
|<7>| READ: Got 4 bytes from 0x4
|<7>| READ: read 4 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 4 bytes.
|<7>| RB: Requested 9 bytes
|<4>| REC[0x802a10f0]: Decrypted Packet[2] Handshake(22) with length: 4
|<6>| BUF[REC]: Inserted 4 bytes of Data(22)
|<3>| HSK[0x802a10f0]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0
|<2>| ASSERT: gnutls_buffers.c:968
|<2>| ASSERT: gnutls_buffers.c:1152
|<3>| HSK[0x802a10f0]: CLIENT KEY EXCHANGE was queued [518 bytes]
|<7>| HWRITE: enqueued [CLIENT KEY EXCHANGE] 518. Total 518 bytes.
|<7>| HWRITE: enqueued [CHANGE CIPHER SPEC] 1. Total 519 bytes.
|<3>| REC[0x802a10f0]: Sent ChangeCipherSpec
|<9>| INT: PREMASTER SECRET[48]: 030373180d92cfcbe8de329a2f9aff23e9ae5b1b7679e45c39174e7adafaa2d5a010f7002979d95d6cbd998c8ddcd47e
|<9>| INT: CLIENT RANDOM[32]: 50d319dd0ac518b800f0cf79d250fcd3410f344266db9f9b9ba5741c59f1c893
|<9>| INT: SERVER RANDOM[32]: 50d319f5004460daa656633e6f4e68141e5b006697c091289ae3ce04954ab939
|<9>| INT: MASTER SECRET: ebe32516c44b46f36c5fa32cd76df03eb721c0abde0a2b087eebc93fec5464f9fc521932a14a4658099c84396274b932
|<4>| REC[0x802a10f0]: Initializing epoch #1
|<9>| INT: KEY BLOCK[72]: 0322828c2b7dd337a1ad6e4122757eb3b35cace9c3d308d9f87438d778e683bd
|<9>| INT: CLIENT WRITE KEY [16]: 7373614150c3b26119daf4c8215fad40
|<9>| INT: SERVER WRITE KEY [16]: b0615e382d3f03ac6f734607e974bfa0
|<4>| REC[0x802a10f0]: Epoch #1 ready
|<3>| HSK[0x802a10f0]: Cipher Suite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x802a10f0]: Initializing internal [write] cipher sessions
|<3>| HSK[0x802a10f0]: recording tls-unique CB (send)
|<3>| HSK[0x802a10f0]: FINISHED was queued [16 bytes]
|<7>| HWRITE: enqueued [FINISHED] 16. Total 535 bytes.
|<7>| HWRITE FLUSH: 535 bytes in buffer.
|<4>| REC[0x802a10f0]: Preparing Packet Handshake(22) with length: 518
|<9>| ENC[0x802a10f0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
|<7>| WRITE: enqueued 523 bytes for 0x4. Total 523 bytes.
|<4>| REC[0x802a10f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 523
|<7>| HWRITE: wrote 1 bytes, 17 bytes left.
|<4>| REC[0x802a10f0]: Preparing Packet ChangeCipherSpec(20) with length: 1
|<9>| ENC[0x802a10f0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
|<7>| WRITE: enqueued 6 bytes for 0x4. Total 529 bytes.
|<4>| REC[0x802a10f0]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6
|<7>| HWRITE: wrote 1 bytes, 16 bytes left.
|<4>| REC[0x802a10f0]: Preparing Packet Handshake(22) with length: 16
|<9>| ENC[0x802a10f0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
|<7>| WRITE: enqueued 41 bytes for 0x4. Total 570 bytes.
|<4>| REC[0x802a10f0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 41
|<7>| HWRITE: wrote 1 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 570 bytes in buffer.
|<7>| WRITE: wrote 570 bytes, 0 bytes left.
|<2>| ASSERT: session_ticket.c:684
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x802a10f0]: SSL 3.1 ChangeCipherSpec packet received. Epoch 0, length: 1
|<4>| REC[0x802a10f0]: Expected Packet ChangeCipherSpec(20)
|<4>| REC[0x802a10f0]: Received Packet ChangeCipherSpec(20) with length: 1
|<7>| READ: Got 1 bytes from 0x4
|<7>| READ: read 1 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 1 bytes.
|<7>| RB: Requested 6 bytes
|<4>| REC[0x802a10f0]: Decrypted Packet[3] ChangeCipherSpec(20) with length: 1
|<6>| BUF[REC]: Inserted 1 bytes of Data(20)
|<3>| HSK[0x802a10f0]: Cipher Suite: RSA_ARCFOUR_SHA1
|<2>| ASSERT: gnutls_buffers.c:976
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x802a10f0]: SSL 3.1 Handshake packet received. Epoch 0, length: 36
|<4>| REC[0x802a10f0]: Expected Packet Handshake(22)
|<4>| REC[0x802a10f0]: Received Packet Handshake(22) with length: 36
|<7>| READ: Got 36 bytes from 0x4
|<7>| READ: read 36 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 36 bytes.
|<7>| RB: Requested 41 bytes
|<4>| REC[0x802a10f0]: Decrypted Packet[0] Handshake(22) with length: 16
|<6>| BUF[REC]: Inserted 16 bytes of Data(22)
|<3>| HSK[0x802a10f0]: FINISHED was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
|<4>| REC[0x802a10f0]: Start of epoch cleanup
|<4>| REC[0x802a10f0]: Epoch #0 freed
|<4>| REC[0x802a10f0]: End of epoch cleanup
- Session ID: FF:9D:1B:EC:24:09:24:0B:DE:F9:01:00:8C:95:F1:81:B0:F0:3C:24:0A:A7:E8:37:08:8B:69:16:B7:66:E2:E1
|<2>| ASSERT: server_name.c:291
- Certificate type: X.509
- Got a certificate list of 4 certificates.
- Certificate[0] info:
|<2>| ASSERT: dn.c:286
|<2>| ASSERT: dn.c:286
 - subject `O=*.mirbsd.org,OU=Domain Control Validated,CN=*.mirbsd.org', issuer `C=US,ST=Arizona,L=Scottsdale,O=GoDaddy.com\, Inc.,OU=http://certificates.godaddy.com/repository,CN=Go Daddy Secure Certification Authority,serialNumber=07969287', RSA key 4096 bits, signed using RSA-SHA1, activated `2012-04-12 20:38:30 UTC', expires `2014-04-12 20:38:30 UTC', SHA-1 fingerprint `443e73738e1b25356380a1336dee58cde3c0c1df'
        Public Key Id:
                bfa185b1e134775ba097468e0e95b1a676599705
        Public key's random art:
                +--[ RSA 4096]----+
                |          .   E..|
                |           +   o |
                |          = + o  |
                |         + B +   |
                |        S * * .  |
                |       + % + o   |
                |        + = .    |
                |         o o     |
                |        . .      |
                +-----------------+

- Certificate[1] info:
|<2>| ASSERT: dn.c:286
|<2>| ASSERT: dn.c:286
 - subject `C=US,ST=Arizona,L=Scottsdale,O=GoDaddy.com\, Inc.,OU=http://certificates.godaddy.com/repository,CN=Go Daddy Secure Certification Authority,serialNumber=07969287', issuer `C=US,O=The Go Daddy Group\, Inc.,OU=Go Daddy Class 2 Certification Authority', RSA key 2048 bits, signed using RSA-SHA1, activated `2006-11-16 01:54:37 UTC', expires `2026-11-16 01:54:37 UTC', SHA-1 fingerprint `7c4656c3061f7f4c0d67b319a855f60ebc11fc44'
- Certificate[2] info:
|<2>| ASSERT: dn.c:286
|<2>| ASSERT: dn.c:286
 - subject `C=US,O=The Go Daddy Group\, Inc.,OU=Go Daddy Class 2 Certification Authority', issuer `L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 2 Policy Validation Authority,CN=http://www.valicert.com/,EMAIL=info@valicert.com', RSA key 2048 bits, signed using RSA-SHA1, activated `2004-06-29 17:06:20 UTC', expires `2024-06-29 17:06:20 UTC', SHA-1 fingerprint `de70f4e2116f7fdce75f9d13012b7e687a3b2c62'
- Certificate[3] info:
|<2>| ASSERT: dn.c:286
|<2>| ASSERT: dn.c:286
 - subject `L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 2 Policy Validation Authority,CN=http://www.valicert.com/,EMAIL=info@valicert.com', issuer `L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 2 Policy Validation Authority,CN=http://www.valicert.com/,EMAIL=info@valicert.com', RSA key 1024 bits, signed using RSA-SHA1, activated `1999-06-26 00:19:54 UTC', expires `2019-06-26 00:19:54 UTC', SHA-1 fingerprint `317a2ad07f2b335ef5a1c34e4b57e8b7d8f1fca6'
- Version: TLS1.0
- Key Exchange: RSA
- Cipher: ARCFOUR-128
- MAC: SHA1
- Compression: NULL
- Handshake was completed

- Simple Client Mode:

|<4>| REC[0x802a10f0]: Preparing Packet Application Data(23) with length: 17
|<9>| ENC[0x802a10f0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
|<7>| WRITE: enqueued 42 bytes for 0x4. Total 42 bytes.
|<7>| WRITE FLUSH: 42 bytes in buffer.
|<7>| WRITE: wrote 42 bytes, 0 bytes left.
|<4>| REC[0x802a10f0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 42
|<7>| WRITE FLUSH: 0 bytes in buffer.
|<2>| ASSERT: gnutls_buffers.c:570
|<4>| REC: Sending Alert[1|0] - Close notify
|<4>| REC[0x802a10f0]: Preparing Packet Alert(21) with length: 2
|<9>| ENC[0x802a10f0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
|<7>| WRITE: enqueued 27 bytes for 0x4. Total 27 bytes.
|<7>| WRITE FLUSH: 27 bytes in buffer.
|<7>| WRITE: wrote 27 bytes, 0 bytes left.
|<4>| REC[0x802a10f0]: Sent Packet[3] Alert(21) in epoch 1 and length: 27
|<4>| REC[0x802a10f0]: Start of epoch cleanup
|<4>| REC[0x802a10f0]: End of epoch cleanup
|<4>| REC[0x802a10f0]: Epoch #1 freed
    0m11.33s real     0m4.91s user     0m5.84s system
/libgnutls26/gnutls-cli --x509cafile /etc/ssl/certs/ca-certificates.crt -p 443 www.mirbsd.org -d 4711 #gnutls26<
Processed 205 CA certificate(s).
Resolving 'www.mirbsd.org'...
Connecting to '81.169.181.30:443'...
|<4>| REC[0x80256448]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80256448]: Allocating epoch #1
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA256
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA256
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA256
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA256
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256
|<3>| HSK[0x80256448]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256
|<3>| HSK[0x80256448]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80256448]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<2>| EXT[0x80256448]: Sending extension SERVER NAME (19 bytes)
|<2>| EXT[0x80256448]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<2>| EXT[0x80256448]: Sending extension SESSION TICKET (0 bytes)
|<2>| EXT[SIGA]: sent signature algo (4.2) DSA-SHA256
|<2>| EXT[SIGA]: sent signature algo (4.1) RSA-SHA256
|<2>| EXT[SIGA]: sent signature algo (2.1) RSA-SHA1
|<2>| EXT[SIGA]: sent signature algo (2.2) DSA-SHA1
|<2>| EXT[0x80256448]: Sending extension SIGNATURE ALGORITHMS (10 bytes)
|<3>| HSK[0x80256448]: CLIENT HELLO was sent [139 bytes]
|<6>| BUF[HSK]: Inserted 139 bytes of Data
|<7>| HWRITE: enqueued 139. Total 139 bytes.
|<7>| HWRITE FLUSH: 139 bytes in buffer.
|<4>| REC[0x80256448]: Sending Packet[0] Handshake(22) with length: 139
|<7>| WRITE: enqueued 144 bytes for 0x4. Total 144 bytes.
|<4>| REC[0x80256448]: Sent Packet[1] Handshake(22) with length: 144
|<7>| HWRITE: wrote 139 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 144 bytes in buffer.
|<7>| WRITE: wrote 144 bytes, 0 bytes left.
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x80256448]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80256448]: Received Packet[0] Handshake(22) with length: 74
|<7>| READ: Got 74 bytes from 0x4
|<7>| READ: read 74 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 74 bytes.
|<7>| RB: Requested 79 bytes
|<4>| REC[0x80256448]: Decrypted Packet[0] Handshake(22) with length: 74
|<6>| BUF[HSK]: Inserted 74 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
|<3>| HSK[0x80256448]: SERVER HELLO was received [74 bytes]
|<6>| BUF[REC][HD]: Read 70 bytes of Data(22)
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<6>| BUF[HSK]: Inserted 70 bytes of Data
|<3>| HSK[0x80256448]: Server's version: 3.1
|<3>| HSK[0x80256448]: SessionID length: 32
|<3>| HSK[0x80256448]: SessionID: 2a30d81a6a2050de9907b015bce3c88dd14f6a44348440ab91cdb6165815c093
|<3>| HSK[0x80256448]: Selected cipher suite: RSA_ARCFOUR_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80256448]: Allowing unsafe initial negotiation
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x80256448]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80256448]: Received Packet[1] Handshake(22) with length: 4920
|<7>| READ: Got 1964 bytes from 0x4
|<7>| READ: Got 2956 bytes from 0x4
|<7>| READ: read 4920 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 4920 bytes.
|<7>| RB: Requested 4925 bytes
|<4>| REC[0x80256448]: Decrypted Packet[1] Handshake(22) with length: 4920
|<6>| BUF[HSK]: Inserted 4920 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
|<3>| HSK[0x80256448]: CERTIFICATE was received [4920 bytes]
|<6>| BUF[REC][HD]: Read 4916 bytes of Data(22)
|<6>| BUF[HSK]: Peeked 213 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<6>| BUF[HSK]: Inserted 4916 bytes of Data
|<2>| ASSERT: ext_signature.c:393
|<2>| ASSERT: ext_signature.c:393
|<2>| ASSERT: ext_signature.c:393
|<2>| ASSERT: ext_signature.c:393
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1214
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1214
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: mpi.c:609
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x80256448]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80256448]: Received Packet[2] Handshake(22) with length: 4
|<7>| READ: Got 4 bytes from 0x4
|<7>| READ: read 4 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 4 bytes.
|<7>| RB: Requested 9 bytes
|<4>| REC[0x80256448]: Decrypted Packet[2] Handshake(22) with length: 4
|<6>| BUF[HSK]: Inserted 4 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
|<3>| HSK[0x80256448]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<6>| BUF[HSK]: Peeked 4920 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<3>| HSK[0x80256448]: CLIENT KEY EXCHANGE was sent [518 bytes]
|<6>| BUF[HSK]: Peeked 4 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<7>| HWRITE: enqueued 518. Total 518 bytes.
|<7>| HWRITE FLUSH: 518 bytes in buffer.
|<4>| REC[0x80256448]: Sending Packet[1] Handshake(22) with length: 518
|<7>| WRITE: enqueued 523 bytes for 0x4. Total 523 bytes.
|<4>| REC[0x80256448]: Sent Packet[2] Handshake(22) with length: 523
|<7>| HWRITE: wrote 518 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 523 bytes in buffer.
|<7>| WRITE: wrote 523 bytes, 0 bytes left.
|<3>| REC[0x80256448]: Sent ChangeCipherSpec
|<4>| REC[0x80256448]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<7>| WRITE: enqueued 6 bytes for 0x4. Total 6 bytes.
|<7>| WRITE FLUSH: 6 bytes in buffer.
|<7>| WRITE: wrote 6 bytes, 0 bytes left.
|<4>| REC[0x80256448]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<9>| INT: PREMASTER SECRET[48]: 0303debad5fbd6e843b2e9d8081aa300ba28519a677de9e93b74a9518d7f192aa5ba52982cc974a803addbb756769379
|<9>| INT: CLIENT RANDOM[32]: 50d31a49b6d511731ecc7111ddf68ef3fbfe4d93b04e77ef3230bc960c9f2527
|<9>| INT: SERVER RANDOM[32]: 50d31a6129e10ffac8c310c2116d3d2c844cb90fe0b5a4f2eb27a1c3f1f83c9c
|<9>| INT: MASTER SECRET: e0427be96f506676ab689bb0b54bba2c8760eb9c6bf35cfb9f7a82ac69a292d10e19c0b832037970a66242b0d4f3813b
|<4>| REC[0x80256448]: Initializing epoch #1
|<9>| INT: KEY BLOCK[72]: 85128f9a28ac5f813179f1ad70e964c83c696c03e9296035c26a4f03a0df7258
|<9>| INT: CLIENT WRITE KEY [16]: c885e51c546492b6cd852c87ed9dfb52
|<9>| INT: SERVER WRITE KEY [16]: 8288e5a24160ecc4e77bf2c9daff348c
|<4>| REC[0x80256448]: Epoch #1 ready
|<3>| HSK[0x80256448]: Cipher Suite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80256448]: Initializing internal [write] cipher sessions
|<4>| REC[0x80256448]: Start of epoch cleanup
|<4>| REC[0x80256448]: End of epoch cleanup
|<6>| BUF[HSK]: Peeked 0 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<3>| HSK[0x80256448]: recording tls-unique CB (send)
|<3>| HSK[0x80256448]: FINISHED was sent [16 bytes]
|<6>| BUF[HSK]: Peeked 0 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<7>| HWRITE: enqueued 16. Total 16 bytes.
|<7>| HWRITE FLUSH: 16 bytes in buffer.
|<4>| REC[0x80256448]: Sending Packet[0] Handshake(22) with length: 16
|<7>| WRITE: enqueued 41 bytes for 0x4. Total 41 bytes.
|<4>| REC[0x80256448]: Sent Packet[1] Handshake(22) with length: 41
|<7>| HWRITE: wrote 16 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 41 bytes in buffer.
|<7>| WRITE: wrote 41 bytes, 0 bytes left.
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x80256448]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80256448]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<7>| READ: Got 1 bytes from 0x4
|<7>| READ: read 1 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 1 bytes.
|<7>| RB: Requested 6 bytes
|<4>| REC[0x80256448]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80256448]: Cipher Suite: RSA_ARCFOUR_SHA1
|<4>| REC[0x80256448]: Start of epoch cleanup
|<4>| REC[0x80256448]: Epoch #0 freed
|<4>| REC[0x80256448]: End of epoch cleanup
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x80256448]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80256448]: Received Packet[0] Handshake(22) with length: 36
|<7>| READ: Got 36 bytes from 0x4
|<7>| READ: read 36 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 36 bytes.
|<7>| RB: Requested 41 bytes
|<4>| REC[0x80256448]: Decrypted Packet[0] Handshake(22) with length: 16
|<6>| BUF[HSK]: Inserted 16 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
|<3>| HSK[0x80256448]: FINISHED was received [16 bytes]
|<6>| BUF[REC][HD]: Read 12 bytes of Data(22)
|<6>| BUF[HSK]: Peeked 0 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<6>| BUF[HSK]: Inserted 12 bytes of Data
|<6>| BUF[HSK]: Cleared Data from buffer
|<6>| BUF[HSK]: Cleared Data from buffer
|<2>| ASSERT: ext_server_name.c:300
- Certificate type: X.509
 - Got a certificate list of 4 certificates.
 - Certificate[0] info:
|<2>| ASSERT: dn.c:305
|<2>| ASSERT: dn.c:305
  - subject `O=*.mirbsd.org,OU=Domain Control Validated,CN=*.mirbsd.org', issuer `C=US,ST=Arizona,L=Scottsdale,O=GoDaddy.com\, Inc.,OU=http://certificates.godaddy.com/repository,CN=Go Daddy Secure Certification Authority,serialNumber=07969287', RSA key 4096 bits, signed using RSA-SHA1, activated `2012-04-12 20:38:30 UTC', expires `2014-04-12 20:38:30 UTC', SHA-1 fingerprint `443e73738e1b25356380a1336dee58cde3c0c1df'
 - Certificate[1] info:
|<2>| ASSERT: dn.c:305
|<2>| ASSERT: dn.c:305
  - subject `C=US,ST=Arizona,L=Scottsdale,O=GoDaddy.com\, Inc.,OU=http://certificates.godaddy.com/repository,CN=Go Daddy Secure Certification Authority,serialNumber=07969287', issuer `C=US,O=The Go Daddy Group\, Inc.,OU=Go Daddy Class 2 Certification Authority', RSA key 2048 bits, signed using RSA-SHA1, activated `2006-11-16 01:54:37 UTC', expires `2026-11-16 01:54:37 UTC', SHA-1 fingerprint `7c4656c3061f7f4c0d67b319a855f60ebc11fc44'
 - Certificate[2] info:
|<2>| ASSERT: dn.c:305
|<2>| ASSERT: dn.c:305
  - subject `C=US,O=The Go Daddy Group\, Inc.,OU=Go Daddy Class 2 Certification Authority', issuer `L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 2 Policy Validation Authority,CN=http://www.valicert.com/,EMAIL=info@valicert.com', RSA key 2048 bits, signed using RSA-SHA1, activated `2004-06-29 17:06:20 UTC', expires `2024-06-29 17:06:20 UTC', SHA-1 fingerprint `de70f4e2116f7fdce75f9d13012b7e687a3b2c62'
 - Certificate[3] info:
|<2>| ASSERT: dn.c:305
|<2>| ASSERT: dn.c:305
  - subject `L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 2 Policy Validation Authority,CN=http://www.valicert.com/,EMAIL=info@valicert.com', issuer `L=ValiCert Validation Network,O=ValiCert\, Inc.,OU=ValiCert Class 2 Policy Validation Authority,CN=http://www.valicert.com/,EMAIL=info@valicert.com', RSA key 1024 bits, signed using RSA-SHA1, activated `1999-06-26 00:19:54 UTC', expires `2019-06-26 00:19:54 UTC', SHA-1 fingerprint `317a2ad07f2b335ef5a1c34e4b57e8b7d8f1fca6'
- The hostname in the certificate matches 'www.mirbsd.org'.
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1214
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1214
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: mpi.c:609
|<2>| ASSERT: dn.c:1209
|<2>| ASSERT: dn.c:1209
- Peer's certificate is trusted
- Version: TLS1.0
- Key Exchange: RSA
- Cipher: ARCFOUR-128
- MAC: SHA1
- Compression: NULL
- Handshake was completed

- Simple Client Mode:

|<4>| REC[0x80256448]: Sending Packet[1] Application Data(23) with length: 17
|<7>| WRITE: enqueued 42 bytes for 0x4. Total 42 bytes.
|<7>| WRITE FLUSH: 42 bytes in buffer.
|<7>| WRITE: wrote 42 bytes, 0 bytes left.
|<4>| REC[0x80256448]: Sent Packet[2] Application Data(23) with length: 42
|<7>| WRITE FLUSH: 0 bytes in buffer.
|<2>| ASSERT: gnutls_buffers.c:731
|<4>| REC: Sending Alert[1|0] - Close notify
|<4>| REC[0x80256448]: Sending Packet[2] Alert(21) with length: 2
|<7>| WRITE: enqueued 27 bytes for 0x4. Total 27 bytes.
|<7>| WRITE FLUSH: 27 bytes in buffer.
|<7>| WRITE: wrote 27 bytes, 0 bytes left.
|<4>| REC[0x80256448]: Sent Packet[3] Alert(21) with length: 27
|<6>| BUF[HSK]: Cleared Data from buffer
|<4>| REC[0x80256448]: Epoch #1 freed
    0m22.30s real     0m9.43s user     0m11.67s system
root@ara2:~ # time wget -O - https://www.mirbsd.org/ >/dev/null
--2012-12-20 15:02:19--  https://www.mirbsd.org/
Resolving www.mirbsd.org (www.mirbsd.org)... 81.169.181.30, 2001:6f8:94d:10::10
Connecting to www.mirbsd.org (www.mirbsd.org)|81.169.181.30|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 15463 (15K) [text/html]
Saving to: ‘STDOUT’

100%[=======================================================================>] 15,463      --.-K/s   in 0.03s

2012-12-20 15:03:15 (519 KB/s) - written to stdout [15463/15463]

    0m56.05s real     0m21.24s user     0m34.08s system
root@ara2:~ # dd if=/dev/random of=/dev/null iflag=fullblock count=20 # to show I _still_ have rng-tools runnin>
20+0 records in
20+0 records out
10240 bytes (10 kB) copied, 0.57 s, 18.0 kB/s


Reply to: