WOMM…
git pull origin
$ git pull origin master
remote: Enumerating objects: 107, done.
remote: Counting objects: 100% (107/107), done.
remote: Compressing objects: 100% (79/79), done.
remote: Total 79 (delta 60), reused 0 (delta 0)
Unpacking objects: 100% (79/79), done.
From https://tt-rss.org/git/tt-rss
* branch master -> FETCH_HEAD
5f66f872..e08990f7 master -> origin/master
Updating 5f66f872..e08990f7
Fast-forward
.gitignore | 3 +
classes/article.php | 8 +-
classes/ccache.php | 4 +-
classes/db/prefs.php | 10 +-
classes/digest.php | 16 +-
classes/feeds.php | 6 +-
classes/handler/public.php | 33 +-
classes/labels.php | 4 +-
classes/mailer.php | 52 ++
classes/opml.php | 18 +-
classes/pluginhost.php | 3 +-
classes/pref/feeds.php | 10 +-
classes/pref/users.php | 29 +-
classes/rssutils.php | 25 +-
classes/ttrssmailer.php | 63 --
config.php-dist | 46 +-
lib/phpmailer/class.phpmailer.php | 4039 ----------------------------------------------------------------------------------
lib/phpmailer/class.smtp.php | 1249 --------------------------
lib/phpmailer/language/phpmailer.lang-am.php | 26 -
lib/phpmailer/language/phpmailer.lang-ar.php | 27 -
lib/phpmailer/language/phpmailer.lang-az.php | 26 -
lib/phpmailer/language/phpmailer.lang-be.php | 26 -
lib/phpmailer/language/phpmailer.lang-bg.php | 26 -
lib/phpmailer/language/phpmailer.lang-br.php | 26 -
lib/phpmailer/language/phpmailer.lang-ca.php | 26 -
lib/phpmailer/language/phpmailer.lang-ch.php | 26 -
lib/phpmailer/language/phpmailer.lang-cs.php | 25 -
lib/phpmailer/language/phpmailer.lang-cz.php | 25 -
lib/phpmailer/language/phpmailer.lang-da.php | 26 -
lib/phpmailer/language/phpmailer.lang-de.php | 25 -
lib/phpmailer/language/phpmailer.lang-dk.php | 26 -
lib/phpmailer/language/phpmailer.lang-el.php | 25 -
lib/phpmailer/language/phpmailer.lang-eo.php | 25 -
lib/phpmailer/language/phpmailer.lang-es.php | 26 -
lib/phpmailer/language/phpmailer.lang-et.php | 27 -
lib/phpmailer/language/phpmailer.lang-fa.php | 27 -
lib/phpmailer/language/phpmailer.lang-fi.php | 27 -
lib/phpmailer/language/phpmailer.lang-fo.php | 26 -
lib/phpmailer/language/phpmailer.lang-fr.php | 29 -
lib/phpmailer/language/phpmailer.lang-gl.php | 26 -
lib/phpmailer/language/phpmailer.lang-he.php | 26 -
lib/phpmailer/language/phpmailer.lang-hr.php | 26 -
lib/phpmailer/language/phpmailer.lang-hu.php | 26 -
lib/phpmailer/language/phpmailer.lang-id.php | 26 -
lib/phpmailer/language/phpmailer.lang-it.php | 27 -
lib/phpmailer/language/phpmailer.lang-ja.php | 27 -
lib/phpmailer/language/phpmailer.lang-ka.php | 26 -
lib/phpmailer/language/phpmailer.lang-ko.php | 26 -
lib/phpmailer/language/phpmailer.lang-lt.php | 26 -
lib/phpmailer/language/phpmailer.lang-lv.php | 26 -
lib/phpmailer/language/phpmailer.lang-ms.php | 26 -
lib/phpmailer/language/phpmailer.lang-nb.php | 25 -
lib/phpmailer/language/phpmailer.lang-nl.php | 26 -
lib/phpmailer/language/phpmailer.lang-no.php | 25 -
lib/phpmailer/language/phpmailer.lang-pl.php | 26 -
lib/phpmailer/language/phpmailer.lang-pt.php | 26 -
lib/phpmailer/language/phpmailer.lang-pt_br.php | 28 -
lib/phpmailer/language/phpmailer.lang-ro.php | 26 -
lib/phpmailer/language/phpmailer.lang-ru.php | 27 -
lib/phpmailer/language/phpmailer.lang-se.php | 26 -
lib/phpmailer/language/phpmailer.lang-sk.php | 26 -
lib/phpmailer/language/phpmailer.lang-sl.php | 26 -
lib/phpmailer/language/phpmailer.lang-sr.php | 26 -
lib/phpmailer/language/phpmailer.lang-sv.php | 26 -
lib/phpmailer/language/phpmailer.lang-tr.php | 29 -
lib/phpmailer/language/phpmailer.lang-uk.php | 27 -
lib/phpmailer/language/phpmailer.lang-vi.php | 26 -
lib/phpmailer/language/phpmailer.lang-zh.php | 28 -
lib/phpmailer/language/phpmailer.lang-zh_cn.php | 27 -
plugins/mail/init.php | 26 +-
plugins/search_sphinx/sphinxapi.php | 40 +-
plugins/vf_shared/init.php | 4 +-
register.php | 23 +-
73 files changed, 218 insertions(+), 6831 deletions(-)
create mode 100644 classes/mailer.php
delete mode 100644 classes/ttrssmailer.php
delete mode 100755 lib/phpmailer/class.phpmailer.php
delete mode 100644 lib/phpmailer/class.smtp.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-am.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-ar.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-az.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-be.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-bg.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-br.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-ca.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-ch.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-cs.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-cz.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-da.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-de.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-dk.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-el.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-eo.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-es.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-et.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-fa.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-fi.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-fo.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-fr.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-gl.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-he.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-hr.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-hu.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-id.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-it.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-ja.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-ka.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-ko.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-lt.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-lv.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-ms.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-nb.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-nl.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-no.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-pl.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-pt.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-pt_br.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-ro.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-ru.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-se.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-sk.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-sl.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-sr.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-sv.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-tr.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-uk.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-vi.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-zh.php
delete mode 100644 lib/phpmailer/language/phpmailer.lang-zh_cn.php
openssl s_client -connect git.tt-rss.org:443
$ openssl s_client -connect git.tt-rss.org:443
CONNECTED(00000003)
140349786542528:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:../ssl/record/rec_layer_s3.c:1399:SSL alert number 40
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 176 bytes
Verification: OK
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : 0000
Session-ID:
Session-ID-ctx:
Master-Key:
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1542904744
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
---
gnutls-cli -d 5 git.tt-rss.org -p 443
$ gnutls-cli -d 5 git.tt-rss.org -p 443
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
<snip lots of more asserts>
|<3>| ASSERT: mpi.c[_gnutls_x509_read_uint]:246
|<3>| ASSERT: mpi.c[_gnutls_x509_read_uint]:246
Processed 133 CA certificate(s).
Resolving 'git.tt-rss.org:443'...
Connecting to '2606:4700:30::6818:6422:443'...
|<5>| REC[0x560f51fe4930]: Allocating epoch #0
|<3>| ASSERT: constate.c[_gnutls_epoch_get]:600
|<5>| REC[0x560f51fe4930]: Allocating epoch #1
|<4>| HSK[0x560f51fe4930]: Adv. version: 3.3
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384 (C0.87)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305 (CC.A9)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CCM (C0.AD)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384 (C0.73)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256 (C0.86)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CCM (C0.AC)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256 (C0.72)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CHACHA20_POLY1305 (CC.A8)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA384 (C0.28)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_AES_256_GCM_SHA384 (00.9D)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_GCM_SHA384 (C0.7B)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CCM (C0.9D)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA1 (00.35)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA256 (00.3D)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA1 (00.84)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA256 (00.C0)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_AES_128_GCM_SHA256 (00.9C)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_GCM_SHA256 (C0.7A)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CCM (C0.9C)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA1 (00.2F)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA256 (00.3C)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA1 (00.41)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA256 (00.BA)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_RSA_3DES_EDE_CBC_SHA1 (00.0A)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_GCM_SHA384 (00.9F)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.7D)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_CHACHA20_POLY1305 (CC.AA)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CCM (C0.9F)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA1 (00.39)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA256 (00.6B)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA256 (00.C4)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_GCM_SHA256 (00.9E)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.7C)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CCM (C0.9E)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA1 (00.33)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA256 (00.67)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA256 (00.BE)
|<4>| HSK[0x560f51fe4930]: Keeping ciphersuite: GNUTLS_DHE_RSA_3DES_EDE_CBC_SHA1 (00.16)
|<4>| EXT[0x560f51fe4930]: Sending extension Extended Master Secret (0 bytes)
|<4>| EXT[0x560f51fe4930]: Sending extension Encrypt-then-MAC (0 bytes)
|<4>| EXT[0x560f51fe4930]: Sending extension OCSP Status Request (5 bytes)
|<2>| HSK[0x560f51fe4930]: sent server name: 'git.tt-rss.org'
|<4>| EXT[0x560f51fe4930]: Sending extension Server Name Indication (19 bytes)
|<4>| EXT[0x560f51fe4930]: Sending extension Safe Renegotiation (1 bytes)
|<4>| EXT[0x560f51fe4930]: Sending extension Session Ticket (0 bytes)
|<4>| EXT[0x560f51fe4930]: Sending extension Supported curves (12 bytes)
|<4>| EXT[0x560f51fe4930]: Sending extension Supported ECC Point Formats (2 bytes)
|<4>| EXT[0x560f51fe4930]: sent signature algo (4.1) RSA-SHA256
|<4>| EXT[0x560f51fe4930]: sent signature algo (4.3) ECDSA-SHA256
|<4>| EXT[0x560f51fe4930]: sent signature algo (5.1) RSA-SHA384
|<4>| EXT[0x560f51fe4930]: sent signature algo (5.3) ECDSA-SHA384
|<4>| EXT[0x560f51fe4930]: sent signature algo (6.1) RSA-SHA512
|<4>| EXT[0x560f51fe4930]: sent signature algo (6.3) ECDSA-SHA512
|<4>| EXT[0x560f51fe4930]: sent signature algo (3.1) RSA-SHA224
|<4>| EXT[0x560f51fe4930]: sent signature algo (3.3) ECDSA-SHA224
|<4>| EXT[0x560f51fe4930]: sent signature algo (2.1) RSA-SHA1
|<4>| EXT[0x560f51fe4930]: sent signature algo (2.3) ECDSA-SHA1
|<4>| EXT[0x560f51fe4930]: Sending extension Signature Algorithms (22 bytes)
|<4>| HSK[0x560f51fe4930]: CLIENT HELLO was queued [256 bytes]
|<5>| REC[0x560f51fe4930]: Preparing Packet Handshake(22) with length: 256 and min pad: 0
|<5>| REC[0x560f51fe4930]: Sent Packet[1] Handshake(22) in epoch 0 and length: 261
|<3>| ASSERT: buffers.c[get_last_packet]:1160
|<5>| REC[0x560f51fe4930]: SSL 3.3 Handshake packet received. Epoch 0, length: 67
|<5>| REC[0x560f51fe4930]: Expected Packet Handshake(22)
|<5>| REC[0x560f51fe4930]: Received Packet Handshake(22) with length: 67
|<5>| REC[0x560f51fe4930]: Decrypted Packet[0] Handshake(22) with length: 67
|<4>| HSK[0x560f51fe4930]: SERVER HELLO (2) was received. Length 63[63], frag offset 0, frag length: 63, sequence: 0
|<4>| HSK[0x560f51fe4930]: Server's version: 3.3
|<4>| HSK[0x560f51fe4930]: SessionID length: 0
|<4>| HSK[0x560f51fe4930]: SessionID: cc
|<4>| HSK[0x560f51fe4930]: Selected cipher suite: ECDHE_ECDSA_CHACHA20_POLY1305
|<4>| HSK[0x560f51fe4930]: Selected compression method: NULL (0)
|<4>| EXT[0x560f51fe4930]: Parsing extension 'Extended Master Secret/23' (0 bytes)
|<4>| EXT[0x560f51fe4930]: Parsing extension 'Safe Renegotiation/65281' (1 bytes)
|<4>| EXT[0x560f51fe4930]: Parsing extension 'Supported ECC Point Formats/11' (2 bytes)
|<4>| EXT[0x560f51fe4930]: Parsing extension 'Session Ticket/35' (0 bytes)
|<4>| EXT[0x560f51fe4930]: Parsing extension 'OCSP Status Request/5' (0 bytes)
|<4>| HSK[0x560f51fe4930]: Safe renegotiation succeeded
|<3>| ASSERT: buffers.c[get_last_packet]:1160
|<5>| REC[0x560f51fe4930]: SSL 3.3 Handshake packet received. Epoch 0, length: 2203
|<5>| REC[0x560f51fe4930]: Expected Packet Handshake(22)
|<5>| REC[0x560f51fe4930]: Received Packet Handshake(22) with length: 2203
|<5>| REC[0x560f51fe4930]: Decrypted Packet[1] Handshake(22) with length: 2203
|<4>| HSK[0x560f51fe4930]: CERTIFICATE (11) was received. Length 2199[2199], frag offset 0, frag length: 2199, sequence: 0
|<3>| ASSERT: common.c[x509_read_value]:698
|<3>| ASSERT: common.c[x509_read_value]:698
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
|<3>| ASSERT: buffers.c[get_last_packet]:1160
|<5>| REC[0x560f51fe4930]: SSL 3.3 Handshake packet received. Epoch 0, length: 288
|<5>| REC[0x560f51fe4930]: Expected Packet Handshake(22)
|<5>| REC[0x560f51fe4930]: Received Packet Handshake(22) with length: 288
|<5>| REC[0x560f51fe4930]: Decrypted Packet[2] Handshake(22) with length: 288
|<4>| HSK[0x560f51fe4930]: CERTIFICATE STATUS (22) was received. Length 284[284], frag offset 0, frag length: 284, sequence: 0
- Certificate type: X.509
- Got a certificate list of 2 certificates.
|<3>| ASSERT: common.c[x509_read_value]:698
|<3>| ASSERT: common.c[x509_read_value]:698
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- Certificate[0] info:
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- subject `CN=sni.cloudflaressl.com,O=CloudFlare\, Inc.,L=San Francisco,ST=CA,C=US', issuer `CN=CloudFlare Inc ECC CA-2,O=CloudFlare\, Inc.,L=San Francisco,ST=CA,C=US', serial 0x04a928d7aa8ca7679703fc67e662cbe9, EC/ECDSA key 256 bits, signed using ECDSA-SHA256, activated `2018-11-16 00:00:00 UTC', expires `2019-11-16 12:00:00 UTC', pin-sha256="BF8E47eUGrjH2qWRdiN9ps3wP/SyGnSD5EtzJ5Mon1M="
Public Key ID:
sha1:41847711af25f9e0313d05926222d4022c840b62
sha256:045f04e3b7941ab8c7daa59176237da6cdf03ff4b21a7483e44b732793289f53
Public Key PIN:
pin-sha256:BF8E47eUGrjH2qWRdiN9ps3wP/SyGnSD5EtzJ5Mon1M=
Public key's random art:
+--[SECP256R1]----+
|oo.o.. oo ++... |
|=E. o +.+ o= . |
|+o o +.o* = |
|. o O . |
| S o . |
| |
| |
| |
| |
+-----------------+
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- Certificate[1] info:
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- subject `CN=CloudFlare Inc ECC CA-2,O=CloudFlare\, Inc.,L=San Francisco,ST=CA,C=US', issuer `CN=Baltimore CyberTrust Root,OU=CyberTrust,O=Baltimore,C=IE', serial 0x0ff3e61639aa3d1a1265f41f8b34e5b6, EC/ECDSA key 256 bits, signed using RSA-SHA256, activated `2015-10-14 12:00:00 UTC', expires `2020-10-09 12:00:00 UTC', pin-sha256="3kcNJzkUJ1RqMXJzFX4Zxux5WfETK+uL6Viq9lJNn4o="
|<3>| ASSERT: common.c[x509_read_value]:698
|<3>| ASSERT: common.c[x509_read_value]:698
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
|<3>| ASSERT: common.c[_gnutls_x509_get_raw_field2]:1522
|<3>| ASSERT: ocsp.c[find_signercert]:1909
|<3>| ASSERT: common.c[_gnutls_x509_der_encode]:865
|<3>| ASSERT: ocsp.c[find_signercert]:1996
|<3>| ASSERT: common.c[_gnutls_x509_get_raw_field2]:1522
|<3>| ASSERT: ocsp.c[gnutls_ocsp_resp_verify]:2254
|<3>| ASSERT: common.c[_gnutls_x509_get_raw_field2]:1522
|<3>| ASSERT: ocsp.c[find_signercert]:1909
|<3>| ASSERT: common.c[_gnutls_x509_der_encode]:865
|<3>| ASSERT: ocsp.c[find_signercert]:1996
|<3>| ASSERT: ocsp.c[gnutls_ocsp_resp_get_single]:1562
|<3>| ASSERT: common.c[x509_read_value]:698
|<3>| ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003
|<3>| ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003
|<3>| ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003
|<3>| ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003
|<3>| ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003
|<3>| ASSERT: common.c[x509_read_value]:698
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
|<3>| ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:470
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
|<3>| ASSERT: common.c[x509_read_value]:698
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
|<3>| ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:470
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
|<3>| ASSERT: common.c[x509_read_value]:698
- Status: The certificate is trusted.
|<3>| ASSERT: buffers.c[get_last_packet]:1160
|<5>| REC[0x560f51fe4930]: SSL 3.3 Handshake packet received. Epoch 0, length: 149
|<5>| REC[0x560f51fe4930]: Expected Packet Handshake(22)
|<5>| REC[0x560f51fe4930]: Received Packet Handshake(22) with length: 149
|<5>| REC[0x560f51fe4930]: Decrypted Packet[3] Handshake(22) with length: 149
|<4>| HSK[0x560f51fe4930]: SERVER KEY EXCHANGE (12) was received. Length 145[145], frag offset 0, frag length: 145, sequence: 0
|<2>| received curve SECP256R1
|<4>| HSK[0x560f51fe4930]: Selected ECC curve SECP256R1 (2)
|<3>| ASSERT: common.c[x509_read_value]:698
|<3>| ASSERT: common.c[x509_read_value]:698
|<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
|<4>| HSK[0x560f51fe4930]: verify handshake data: using ECDSA-SHA256
|<3>| ASSERT: buffers.c[get_last_packet]:1160
|<5>| REC[0x560f51fe4930]: SSL 3.3 Handshake packet received. Epoch 0, length: 4
|<5>| REC[0x560f51fe4930]: Expected Packet Handshake(22)
|<5>| REC[0x560f51fe4930]: Received Packet Handshake(22) with length: 4
|<5>| REC[0x560f51fe4930]: Decrypted Packet[4] Handshake(22) with length: 4
|<4>| HSK[0x560f51fe4930]: SERVER HELLO DONE (14) was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0
|<3>| ASSERT: buffers.c[get_last_packet]:1151
|<3>| ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1380
|<4>| HSK[0x560f51fe4930]: CLIENT KEY EXCHANGE was queued [70 bytes]
|<4>| REC[0x560f51fe4930]: Sent ChangeCipherSpec
|<5>| REC[0x560f51fe4930]: Initializing epoch #1
|<5>| REC[0x560f51fe4930]: Epoch #1 ready
|<4>| HSK[0x560f51fe4930]: Cipher Suite: ECDHE_ECDSA_CHACHA20_POLY1305
|<4>| HSK[0x560f51fe4930]: Initializing internal [write] cipher sessions
|<4>| HSK[0x560f51fe4930]: recording tls-unique CB (send)
|<4>| HSK[0x560f51fe4930]: FINISHED was queued [16 bytes]
|<5>| REC[0x560f51fe4930]: Preparing Packet Handshake(22) with length: 70 and min pad: 0
|<5>| REC[0x560f51fe4930]: Sent Packet[2] Handshake(22) in epoch 0 and length: 75
|<5>| REC[0x560f51fe4930]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
|<5>| REC[0x560f51fe4930]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6
|<5>| REC[0x560f51fe4930]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
|<5>| REC[0x560f51fe4930]: Sent Packet[1] Handshake(22) in epoch 1 and length: 37
|<3>| ASSERT: buffers.c[get_last_packet]:1160
|<5>| REC[0x560f51fe4930]: SSL 3.3 Handshake packet received. Epoch 0, length: 202
|<5>| REC[0x560f51fe4930]: Expected Packet Handshake(22)
|<5>| REC[0x560f51fe4930]: Received Packet Handshake(22) with length: 202
|<5>| REC[0x560f51fe4930]: Decrypted Packet[5] Handshake(22) with length: 202
|<4>| HSK[0x560f51fe4930]: NEW SESSION TICKET (4) was received. Length 198[198], frag offset 0, frag length: 198, sequence: 0
|<5>| REC[0x560f51fe4930]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
|<5>| REC[0x560f51fe4930]: Expected Packet ChangeCipherSpec(20)
|<5>| REC[0x560f51fe4930]: Received Packet ChangeCipherSpec(20) with length: 1
|<5>| REC[0x560f51fe4930]: Decrypted Packet[6] ChangeCipherSpec(20) with length: 1
|<4>| HSK[0x560f51fe4930]: Cipher Suite: ECDHE_ECDSA_CHACHA20_POLY1305
|<3>| ASSERT: buffers.c[get_last_packet]:1160
|<5>| REC[0x560f51fe4930]: SSL 3.3 Handshake packet received. Epoch 0, length: 32
|<5>| REC[0x560f51fe4930]: Expected Packet Handshake(22)
|<5>| REC[0x560f51fe4930]: Received Packet Handshake(22) with length: 32
|<5>| REC[0x560f51fe4930]: Decrypted Packet[0] Handshake(22) with length: 16
|<4>| HSK[0x560f51fe4930]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
|<5>| REC[0x560f51fe4930]: Start of epoch cleanup
|<5>| REC[0x560f51fe4930]: Epoch #0 freed
|<5>| REC[0x560f51fe4930]: End of epoch cleanup
- Description: (TLS1.2)-(ECDHE-ECDSA-SECP256R1)-(CHACHA20-POLY1305)
- Session ID: BE:CF:43:41:C6:92:1A:1D:65:62:F8:1D:49:47:C8:E3:F8:DF:FE:53:3A:D5:A6:EC:EB:50:BB:E8:D1:73:73:13
|<3>| ASSERT: server_name.c[gnutls_server_name_get]:301
- Ephemeral EC Diffie-Hellman parameters
- Using curve: SECP256R1
- Curve size: 256 bits
- Version: TLS1.2
- Key Exchange: ECDHE-ECDSA
- Server Signature: ECDSA-SHA256
- Cipher: CHACHA20-POLY1305
- MAC: AEAD
- Compression: NULL
- Options: extended master secret, safe renegotiation, OCSP status request,
|<3>| ASSERT: srtp.c[gnutls_srtp_get_selected_profile]:317
|<3>| ASSERT: alpn.c[gnutls_alpn_get_selected_protocol]:238
- Handshake was completed
- Simple Client Mode:
|<5>| REC[0x560f51fe4930]: SSL 3.3 Alert packet received. Epoch 0, length: 18
|<5>| REC[0x560f51fe4930]: Expected Packet Application Data(23)
|<5>| REC[0x560f51fe4930]: Received Packet Alert(21) with length: 18
|<5>| REC[0x560f51fe4930]: Decrypted Packet[1] Alert(21) with length: 2
|<5>| REC[0x560f51fe4930]: Alert[1|0] - Close notify - was received
|<3>| ASSERT: record.c[_gnutls_recv_in_buffers]:1328
- Peer has closed the GnuTLS connection
|<5>| REC[0x560f51fe4930]: Start of epoch cleanup
|<5>| REC[0x560f51fe4930]: End of epoch cleanup
|<5>| REC[0x560f51fe4930]: Epoch #1 freed
curl -LI https://git.tt-rss.org:443
$ curl -LI https://git.tt-rss.org:443
HTTP/2 302
date: Thu, 22 Nov 2018 16:44:23 GMT
content-type: text/html; charset=utf-8
set-cookie: __cfduid=dcf84ccc6d3cb903df6a145d8b87cfe831542905061; expires=Fri, 22-Nov-19 16:44:21 GMT; path=/; domain=.tt-rss.org; HttpOnly
location: /explore
set-cookie: lang=en-US; Path=/; Max-Age=2147483647
set-cookie: i_like_gogs=d87ed6db4f806c10; Path=/; HttpOnly
set-cookie: _csrf=0OplIrqeHuLdMp3nLfdKK55ydzI6MTU0MjkwNTA2MzMyNzU5NzYzMQ%3D%3D; Path=/; Expires=Fri, 23 Nov 2018 16:44:23 GMT; HttpOnly
x-varnish: 310423
age: 0
via: 1.1 varnish (Varnish/5.0)
expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server: cloudflare
cf-ray: 47dcdc3aedbf93ae-SJC
HTTP/2 302
date: Thu, 22 Nov 2018 16:44:24 GMT
content-type: text/html; charset=utf-8
set-cookie: __cfduid=d2d66bb191a545a8df3058d8c3177e0891542905063; expires=Fri, 22-Nov-19 16:44:23 GMT; path=/; domain=.tt-rss.org; HttpOnly
location: /explore/repos
set-cookie: lang=en-US; Path=/; Max-Age=2147483647
set-cookie: i_like_gogs=9293eebffcc3b01a; Path=/; HttpOnly
set-cookie: _csrf=kiUrYAyLh9xPWsEzOaiyw5gTDzY6MTU0MjkwNTA2NDEwODQ0MjczNQ%3D%3D; Path=/; Expires=Fri, 23 Nov 2018 16:44:24 GMT; HttpOnly
x-varnish: 768012
age: 0
via: 1.1 varnish (Varnish/5.0)
expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server: cloudflare
cf-ray: 47dcdc467bf393ae-SJC
HTTP/2 200
date: Thu, 22 Nov 2018 16:44:24 GMT
content-type: text/html; charset=UTF-8
set-cookie: __cfduid=de26f9d6bc065a1d3f632da9aea06e1611542905064; expires=Fri, 22-Nov-19 16:44:24 GMT; path=/; domain=.tt-rss.org; HttpOnly
set-cookie: lang=en-US; Path=/; Max-Age=2147483647
set-cookie: i_like_gogs=51897f19e102da09; Path=/; HttpOnly
set-cookie: _csrf=YbO8VYEtwsCct6ELUolLLnYFs8U6MTU0MjkwNTA2NDMxNTEzNTE3Mg%3D%3D; Path=/; Expires=Fri, 23 Nov 2018 16:44:24 GMT; HttpOnly
x-varnish: 310426
age: 0
via: 1.1 varnish (Varnish/5.0)
expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server: cloudflare
cf-ray: 47dcdc4b4e3f93ae-SJC