gnutls-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Unable to connect to https server using wget/curl with gnutls (or openss


From: Burton Samograd
Subject: Unable to connect to https server using wget/curl with gnutls (or openssl)
Date: Wed, 19 Dec 2012 14:05:59 -0700
User-agent: Gnus/5.13 (Gnus v5.13) Emacs/24.3.50 (gnu/linux)

Hello,

I am having problems connecting to an HTTPS server using gnutls through
wget, curl and emacs.  I have contacted the company and they claim that
it must be a problem with my SSL implementation, so I am looking into
it.  I would like to not that this problem is not specific to gnutls; I
have built a version of curl that uses only libssl (openssl) and I still
have problems connecting to their server.

Starting from the beginning, when I try to connect to their server using
wget I get a 'Unable to establish SSL connection'::

===================================================================================
~ $ wget 
https://demoweb.efxnow.com/gaincapitalwebservices/authenticate/authenticationservice.asmx/AuthenticateCredentials?UserID=username&Password=password
[wget] 14212
nil: command not found
~ $ --2012-12-19 13:56:17--  
https://demoweb.efxnow.com/gaincapitalwebservices/authenticate/authenticationservice.asmx/AuthenticateCredentials?UserID=username
Resolving demoweb.efxnow.com (demoweb.efxnow.com)... 74.217.51.150
Connecting to demoweb.efxnow.com (demoweb.efxnow.com)|74.217.51.150|:443... 
connected.
Unable to establish SSL connection.
===================================================================================

Using curl:

===================================================================================
~ $ curl -v 
https://demoweb.efxnow.com/gaincapitalwebservices/authenticate/authenticationservice.asmx/AuthenticateCredentials?UserID=username&Password=password
[curl] 14226
* About to connect() to demoweb.efxnow.com port 443 (#0)
*   Trying 74.217.51.150... connected
* successfully set certificate verify locations:
*   CAfile: none
  CApath: /etc/ssl/certs
* SSLv3, TLS handshake, Client hello (1):
* Unknown SSL protocol error in connection to demoweb.efxnow.com:443 
* Closing connection #0
curl: (35) Unknown SSL protocol error in connection to demoweb.efxnow.com:443 
===================================================================================

Looking further I used gnutls-cli:

===================================================================================
~ $ gnutls-cli -d 4 demoweb.efxnow.com
Resolving 'demoweb.efxnow.com'...
Connecting to '74.217.51.150:443'...
|<4>| REC[0x8062958]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x8062958]: Allocating epoch #1
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA256
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA256
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA256
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA256
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256
|<3>| HSK[0x8062958]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256
|<3>| HSK[0x8062958]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x8062958]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<2>| EXT[0x8062958]: Sending extension SERVER NAME (23 bytes)
|<2>| EXT[0x8062958]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<2>| EXT[0x8062958]: Sending extension SESSION TICKET (0 bytes)
|<2>| EXT[SIGA]: sent signature algo (4.2) DSA-SHA256
|<2>| EXT[SIGA]: sent signature algo (4.1) RSA-SHA256
|<2>| EXT[SIGA]: sent signature algo (2.1) RSA-SHA1
|<2>| EXT[SIGA]: sent signature algo (2.2) DSA-SHA1
|<2>| EXT[0x8062958]: Sending extension SIGNATURE ALGORITHMS (10 bytes)
|<3>| HSK[0x8062958]: CLIENT HELLO was sent [143 bytes]
|<4>| REC[0x8062958]: Sending Packet[0] Handshake(22) with length: 143
|<4>| REC[0x8062958]: Sent Packet[1] Handshake(22) with length: 148
|<2>| ASSERT: gnutls_buffers.c:640
|<2>| ASSERT: gnutls_record.c:969
|<2>| ASSERT: gnutls_handshake.c:2762
*** Fatal error: A TLS packet with unexpected length was received.
|<4>| REC: Sending Alert[2|22] - Record overflow
|<4>| REC[0x8062958]: Sending Packet[1] Alert(21) with length: 2
|<4>| REC[0x8062958]: Sent Packet[2] Alert(21) with length: 7
*** Handshake has failed
GnuTLS error: A TLS packet with unexpected length was received.
|<4>| REC[0x8062958]: Epoch #0 freed
|<4>| REC[0x8062958]: Epoch #1 freed
===================================================================================

I found that "A TLS packet with unexpected length was recieved." could
also mean that the other side forcibly closed the connection.  

Finally with gnutls-cli-debug:

===================================================================================
~ $ gnutls-cli-debug -d 4 demoweb.efxnow.com
Resolving 'demoweb.efxnow.com'...
Connecting to '74.217.51.150:443'...
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [57 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 57
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 62
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.0
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ad49aa952983c0121d5c6d138ae34c6914707204dc9f7fce0499cf370bd
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [260 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 260
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 265
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [40 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 40
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 69
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 64
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 40
|<3>| HSK[0x80618d0]: FINISHED was received [40 bytes]
Checking for SSL 3.0 support... yes
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_AES_128_CBC_SHA1
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [62 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 62
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 67
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ad5051bb1f518777e07327e754e1c12b0982371fd130335f1158e97d0fa
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 261
|<2>| ASSERT: ext_session_ticket.c:710
|<2>| ASSERT: gnutls_buffers.c:640
|<2>| ASSERT: gnutls_record.c:969
|<2>| ASSERT: gnutls_handshake.c:2933
|<2>| ASSERT: gnutls_handshake.c:3139
Checking whether %COMPAT is required... yes
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [64 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 64
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 69
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ad506db796d53a9dda06670096ca92fee0a319e8bbcb8d37b1a8ba8c0a2
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 45
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 40
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking for TLS 1.0 support... yes
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [62 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 62
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 67
|<2>| ASSERT: gnutls_buffers.c:640
|<2>| ASSERT: gnutls_record.c:969
|<2>| ASSERT: gnutls_handshake.c:2762
Checking for TLS 1.1 support... no
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [62 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 62
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 67
|<2>| ASSERT: gnutls_buffers.c:640
|<2>| ASSERT: gnutls_record.c:969
|<2>| ASSERT: gnutls_handshake.c:2762
Checking fallback from TLS 1.1 to... failed
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [62 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 62
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 67
|<2>| ASSERT: gnutls_buffers.c:640
|<2>| ASSERT: gnutls_record.c:969
|<2>| ASSERT: gnutls_handshake.c:2762
Checking for TLS 1.2 support... no
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
Checking whether we need to disable TLS 1.0... N/A
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [64 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 64
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 69
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ad6bf35135f0b433875e303415c7c256fa1f0abef5a1558cffd007a1c15
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<2>| ASSERT: ext_safe_renegotiation.c:191
|<3>| HSK[0x80618d0]: Denying unsafe initial negotiation
|<2>| ASSERT: gnutls_handshake.c:2366
|<2>| ASSERT: gnutls_handshake.c:2762
Checking for Safe renegotiation support... no
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [57 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 57
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 62
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.0
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ad6547d6f745d9c98bfc3f61a153b08545bf2b5e36ce8f2048b621921b4
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<2>| ASSERT: ext_safe_renegotiation.c:191
|<3>| HSK[0x80618d0]: Denying unsafe initial negotiation
|<2>| ASSERT: gnutls_handshake.c:2366
|<2>| ASSERT: gnutls_handshake.c:2762
Checking for Safe renegotiation support (SCSV)... no
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
Checking for HTTPS server name... not checked
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [56 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 56
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 61
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ad72fd74de70f7db76f43508c2f58ccf2ab36113e47b455b99683ae1dde
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 45
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 40
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking for version rollback bug in RSA PMS... no
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [64 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 64
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 69
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ad71f07b77c2759928b45c3f35edab6f3447843b973daee5aae076aaf30
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 45
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 40
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking for version rollback bug in Client Hello... no
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [64 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 64
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 69
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ad7b2dccf391da9ade34a970f3b0d5006b5b33dbbfa53c50ebd9fe65656
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 45
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 40
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking whether the server ignores the RSA PMS version... yes
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension MAX RECORD SIZE (1 bytes)
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [69 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 69
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ad813fcf3bda0a16df9ee719fb6a493150639dc8a4c09ec99ad502eeab5
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 45
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 40
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking whether the server can accept Hello Extensions... yes
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [64 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 64
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 69
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ad8e43e53ca88c71b18dcca2a9f69696166597a413b3b33d5e3f148064b
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 45
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 40
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking whether the server can accept cipher suites not in SSL 3.0 spec... yes
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [64 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 64
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 69
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ad91d0449bddb4c1bcba9e0edf306e06e17340f208191b62b4c10752406
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 45
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 40
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking whether the server can accept a bogus TLS record version in the client 
hello... yes
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
Checking for certificate information... N/A
Checking for trusted CAs... N/A
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [64 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 64
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 69
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ad9679e1203be346630d71a787a679ddcf45b5c06c77af1c98a98547f02
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 45
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 40
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
|<2>| ASSERT: gnutls_buffers.c:727
|<4>| REC: Sending Alert[1|0] - Close notify
|<4>| REC[0x80618d0]: Sending Packet[1] Alert(21) with length: 2
|<4>| REC[0x80618d0]: Sent Packet[2] Alert(21) with length: 29
Checking whether the server understands TLS closure alerts... no
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [100 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 100
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 105
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ae0755a80c39753e835bc786e89291fd2adce3334da749248d683e3b64c
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 45
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 40
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking whether the server supports session resumption... no
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [52 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 52
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 57
|<2>| ASSERT: gnutls_buffers.c:640
|<2>| ASSERT: gnutls_record.c:969
|<2>| ASSERT: gnutls_handshake.c:2762
Checking for export-grade ciphersuite support... no
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
Checking RSA-export ciphersuite info... N/A
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: ANON_DH_ARCFOUR_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [54 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 54
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 59
|<2>| ASSERT: gnutls_buffers.c:640
|<2>| ASSERT: gnutls_record.c:969
|<2>| ASSERT: gnutls_handshake.c:2762
Checking for anonymous authentication support... no
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
Checking anonymous Diffie-Hellman group info... N/A
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [56 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 56
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 61
|<2>| ASSERT: gnutls_buffers.c:640
|<2>| ASSERT: gnutls_record.c:969
|<2>| ASSERT: gnutls_handshake.c:2762
|<2>| ASSERT: gnutls_ui.c:183
Checking for ephemeral Diffie-Hellman support... no
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
Checking ephemeral Diffie-Hellman group info... N/A
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_AES_128_CBC_SHA1
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [56 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 56
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 61
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ae10932de1d5a63432f6e08de5651c3d2173caf4ed86250b568b5e79a18
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_AES_128_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 53
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 48
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking for AES cipher support (TLS extension)... yes
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_CAMELLIA_128_CBC_SHA1
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [56 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 56
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 61
|<2>| ASSERT: gnutls_buffers.c:640
|<2>| ASSERT: gnutls_record.c:969
|<2>| ASSERT: gnutls_handshake.c:2762
Checking for CAMELLIA cipher support (TLS extension)... no
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [56 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 56
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 61
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ae1fc8d3eee4703f54e593e742e11ff59d6e013ef3e8ea859ea4c54502c
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 45
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 40
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking for 3DES cipher support... yes
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [56 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 56
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 61
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ae262d6b55547ff1872eeb056ec4b222253c734222e4a19cb2b40bd61e8
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_ARCFOUR_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 41
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_ARCFOUR_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 36
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking for ARCFOUR 128 cipher support... yes
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [52 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 52
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 57
|<2>| ASSERT: gnutls_buffers.c:640
|<2>| ASSERT: gnutls_record.c:969
|<2>| ASSERT: gnutls_handshake.c:2762
Checking for ARCFOUR 40 cipher support... no
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [54 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 54
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 59
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ae29008a1a0b85adeaa35ecb01c79d9bcd7eebc8b11703a56998e2de6d1
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_ARCFOUR_MD5
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 37
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_ARCFOUR_MD5
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 32
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking for MD5 MAC support... yes
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_AES_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [66 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 66
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 71
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ae35632ad8bcd0f647128ab37603ab325d478299fe121b6c8b925849324
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_AES_128_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 53
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 48
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking for SHA1 MAC support... yes
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension MAX RECORD SIZE (1 bytes)
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [69 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 69
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ae3b2f0ede70f72492d47a4bd370e0d0c8bef039a3abb8c9097f1e23c6b
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 45
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 40
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking for max record size (TLS extension)... no
|<4>| REC[0x80618d0]: Epoch #1 freed
|<4>| REC[0x80618d0]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x80618d0]: Allocating epoch #1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x80618d0]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x80618d0]: Sending extension CERT TYPE (2 bytes)
|<2>| EXT[0x80618d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x80618d0]: CLIENT HELLO was sent [70 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 70
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 75
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 74
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[0x80618d0]: SERVER HELLO was received [74 bytes]
|<3>| HSK[0x80618d0]: Server's version: 3.1
|<3>| HSK[0x80618d0]: SessionID length: 32
|<3>| HSK[0x80618d0]: SessionID: 
50d22ae3e5e185e94ecab1e348f46293b7d414e95a0ae1c3971c28b22aca8377
|<3>| HSK[0x80618d0]: Selected cipher suite: RSA_3DES_EDE_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:163
|<3>| HSK[0x80618d0]: Allowing unsafe initial negotiation
|<4>| REC[0x80618d0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[1] Handshake(22) with length: 2297
|<4>| REC[0x80618d0]: Decrypted Packet[1] Handshake(22) with length: 2297
|<3>| HSK[0x80618d0]: CERTIFICATE was received [2297 bytes]
|<2>| ASSERT: ext_signature.c:388
|<2>| ASSERT: ext_signature.c:388
|<4>| REC[0x80618d0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[2] Handshake(22) with length: 4
|<4>| REC[0x80618d0]: Decrypted Packet[2] Handshake(22) with length: 4
|<3>| HSK[0x80618d0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1369
|<3>| HSK[0x80618d0]: CLIENT KEY EXCHANGE was sent [262 bytes]
|<4>| REC[0x80618d0]: Sending Packet[1] Handshake(22) with length: 262
|<4>| REC[0x80618d0]: Sent Packet[2] Handshake(22) with length: 267
|<3>| REC[0x80618d0]: Sent ChangeCipherSpec
|<4>| REC[0x80618d0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x80618d0]: Initializing epoch #1
|<4>| REC[0x80618d0]: Epoch #1 ready
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x80618d0]: Initializing internal [write] cipher sessions
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: End of epoch cleanup
|<3>| HSK[0x80618d0]: recording tls-unique CB (send)
|<3>| HSK[0x80618d0]: FINISHED was sent [16 bytes]
|<4>| REC[0x80618d0]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x80618d0]: Sent Packet[1] Handshake(22) with length: 45
|<2>| ASSERT: ext_session_ticket.c:710
|<4>| REC[0x80618d0]: Expected Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<4>| REC[0x80618d0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x80618d0]: Cipher Suite: RSA_3DES_EDE_CBC_SHA1
|<4>| REC[0x80618d0]: Start of epoch cleanup
|<4>| REC[0x80618d0]: Epoch #0 freed
|<4>| REC[0x80618d0]: End of epoch cleanup
|<4>| REC[0x80618d0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x80618d0]: Received Packet[0] Handshake(22) with length: 40
|<4>| REC[0x80618d0]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x80618d0]: FINISHED was received [16 bytes]
Checking for OpenPGP authentication support (TLS extension)... no
|<4>| REC[0x80618d0]: Epoch #1 freed
===================================================================================

After this I am stumped on what else to do to figure out what might be
the problem. Can anyone see what might be wrong on my end when connecting to 
this
server?

Thanks.

--
Burton Samograd




reply via email to

[Prev in Thread] Current Thread [Next in Thread]