0s autopkgtest [19:17:38]: starting date and time: 2024-06-03 19:17:38+0000 0s autopkgtest [19:17:38]: git checkout: d60bd36 autopkgtest-build-lxd: Add missing remote prefix in get_boot_id(). 0s autopkgtest [19:17:38]: host juju-7f2275-prod-proposed-migration-environment-9; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.38nocnef/out --timeout-copy=6000 --setup-commands 'ln -s /dev/null /etc/systemd/system/bluetooth.service; printf "http_proxy=http://squid.internal:3128\nhttps_proxy=http://squid.internal:3128\nno_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com\n" >> /etc/environment' --apt-pocket=proposed=src:luajit --apt-upgrade knot-resolver --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=luajit/2.1.0+openresty20240314-1 -- lxd -r lxd-armhf-10.145.243.183 lxd-armhf-10.145.243.183:autopkgtest/ubuntu/oracular/armhf 27s autopkgtest [19:18:05]: testbed dpkg architecture: armhf 28s autopkgtest [19:18:06]: testbed apt version: 2.9.3 28s autopkgtest [19:18:06]: @@@@@@@@@@@@@@@@@@@@ test bed setup 36s Get:1 http://ftpmaster.internal/ubuntu oracular-proposed InRelease [110 kB] 36s Get:2 http://ftpmaster.internal/ubuntu oracular-proposed/restricted Sources [4792 B] 37s Get:3 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse Sources [1680 B] 37s Get:4 http://ftpmaster.internal/ubuntu oracular-proposed/main Sources [43.8 kB] 37s Get:5 http://ftpmaster.internal/ubuntu oracular-proposed/universe Sources [392 kB] 37s Get:6 http://ftpmaster.internal/ubuntu oracular-proposed/main armhf Packages [45.5 kB] 37s Get:7 http://ftpmaster.internal/ubuntu oracular-proposed/universe armhf Packages [276 kB] 37s Get:8 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse armhf Packages [1392 B] 37s Fetched 875 kB in 1s (1033 kB/s) 37s Reading package lists... 53s tee: /proc/self/fd/2: Permission denied 75s Get:1 http://ftpmaster.internal/ubuntu oracular-proposed InRelease [110 kB] 75s Get:2 http://ftpmaster.internal/ubuntu oracular InRelease [110 kB] 75s Hit:3 http://ftpmaster.internal/ubuntu oracular-updates InRelease 75s Hit:4 http://ftpmaster.internal/ubuntu oracular-security InRelease 75s Get:5 http://ftpmaster.internal/ubuntu oracular-proposed/universe Sources [390 kB] 75s Get:6 http://ftpmaster.internal/ubuntu oracular-proposed/universe armhf Packages [275 kB] 75s Get:7 http://ftpmaster.internal/ubuntu oracular/universe Sources [20.1 MB] 76s Get:8 http://ftpmaster.internal/ubuntu oracular/universe armhf Packages [14.5 MB] 79s Fetched 35.5 MB in 5s (7745 kB/s) 80s Reading package lists... 80s Reading package lists... 81s Building dependency tree... 81s Reading state information... 81s Calculating upgrade... 81s The following packages will be upgraded: 81s cryptsetup-bin libcryptsetup12 82s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 82s Need to get 453 kB of archives. 82s After this operation, 0 B of additional disk space will be used. 82s Get:1 http://ftpmaster.internal/ubuntu oracular/main armhf libcryptsetup12 armhf 2:2.7.0-1ubuntu5 [239 kB] 82s Get:2 http://ftpmaster.internal/ubuntu oracular/main armhf cryptsetup-bin armhf 2:2.7.0-1ubuntu5 [214 kB] 83s Fetched 453 kB in 0s (906 kB/s) 83s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 58332 files and directories currently installed.) 83s Preparing to unpack .../libcryptsetup12_2%3a2.7.0-1ubuntu5_armhf.deb ... 83s Unpacking libcryptsetup12:armhf (2:2.7.0-1ubuntu5) over (2:2.7.0-1ubuntu4) ... 83s Preparing to unpack .../cryptsetup-bin_2%3a2.7.0-1ubuntu5_armhf.deb ... 83s Unpacking cryptsetup-bin (2:2.7.0-1ubuntu5) over (2:2.7.0-1ubuntu4) ... 83s Setting up libcryptsetup12:armhf (2:2.7.0-1ubuntu5) ... 83s Setting up cryptsetup-bin (2:2.7.0-1ubuntu5) ... 83s Processing triggers for man-db (2.12.1-1) ... 83s Processing triggers for libc-bin (2.39-0ubuntu8.1) ... 84s Reading package lists... 84s Building dependency tree... 84s Reading state information... 85s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 87s autopkgtest [19:19:05]: rebooting testbed after setup commands that affected boot 131s autopkgtest [19:19:49]: testbed running kernel: Linux 6.5.0-35-generic #35~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Tue May 7 11:19:33 UTC 2 158s autopkgtest [19:20:16]: @@@@@@@@@@@@@@@@@@@@ apt-source knot-resolver 175s Get:1 http://ftpmaster.internal/ubuntu oracular/universe knot-resolver 5.7.2-1 (dsc) [3184 B] 175s Get:2 http://ftpmaster.internal/ubuntu oracular/universe knot-resolver 5.7.2-1 (tar) [1928 kB] 175s Get:3 http://ftpmaster.internal/ubuntu oracular/universe knot-resolver 5.7.2-1 (asc) [833 B] 175s Get:4 http://ftpmaster.internal/ubuntu oracular/universe knot-resolver 5.7.2-1 (diff) [402 kB] 175s gpgv: Signature made Tue Apr 2 05:46:43 2024 UTC 175s gpgv: using RSA key 23EBCF7E8FC47556787100DFA4254072E373042C 175s gpgv: Can't check signature: No public key 175s dpkg-source: warning: cannot verify inline signature for ./knot-resolver_5.7.2-1.dsc: no acceptable signature found 176s autopkgtest [19:20:34]: testing package knot-resolver version 5.7.2-1 178s autopkgtest [19:20:36]: build not needed 180s autopkgtest [19:20:38]: test roundtrip: preparing testbed 191s Reading package lists... 191s Building dependency tree... 191s Reading state information... 191s Starting pkgProblemResolver with broken count: 0 191s Starting 2 pkgProblemResolver with broken count: 0 191s Done 192s The following additional packages will be installed: 192s dns-root-data gnutls-bin knot-dnsutils knot-resolver libdnssec9t64 192s libevent-2.1-7t64 libfstrm0 libgnutls-dane0t64 libjemalloc2 libknot14t64 192s libluajit-5.1-2 libluajit-5.1-common libunbound8 libxdp1 libzscanner4t64 192s lua-sec lua-socket socat 192s Recommended packages: 192s knot-resolver-module-http lua-basexx lua-cqueues 192s The following NEW packages will be installed: 192s autopkgtest-satdep dns-root-data gnutls-bin knot-dnsutils knot-resolver 192s libdnssec9t64 libevent-2.1-7t64 libfstrm0 libgnutls-dane0t64 libjemalloc2 192s libknot14t64 libluajit-5.1-2 libluajit-5.1-common libunbound8 libxdp1 192s libzscanner4t64 lua-sec lua-socket socat 192s 0 upgraded, 19 newly installed, 0 to remove and 0 not upgraded. 192s Need to get 2805 kB/2806 kB of archives. 192s After this operation, 9084 kB of additional disk space will be used. 192s Get:1 /tmp/autopkgtest.cFef6u/1-autopkgtest-satdep.deb autopkgtest-satdep armhf 0 [728 B] 192s Get:2 http://ftpmaster.internal/ubuntu oracular/main armhf dns-root-data all 2024041801 [4330 B] 192s Get:3 http://ftpmaster.internal/ubuntu oracular/main armhf libevent-2.1-7t64 armhf 2.1.12-stable-10 [127 kB] 193s Get:4 http://ftpmaster.internal/ubuntu oracular/main armhf libunbound8 armhf 1.19.2-1ubuntu3 [408 kB] 193s Get:5 http://ftpmaster.internal/ubuntu oracular/main armhf libgnutls-dane0t64 armhf 3.8.5-2ubuntu1 [33.5 kB] 193s Get:6 http://ftpmaster.internal/ubuntu oracular/universe armhf gnutls-bin armhf 3.8.5-2ubuntu1 [277 kB] 193s Get:7 http://ftpmaster.internal/ubuntu oracular/universe armhf libdnssec9t64 armhf 3.3.5-1.1 [47.9 kB] 193s Get:8 http://ftpmaster.internal/ubuntu oracular/main armhf libxdp1 armhf 1.4.2-1ubuntu4 [57.7 kB] 193s Get:9 http://ftpmaster.internal/ubuntu oracular/universe armhf libknot14t64 armhf 3.3.5-1.1 [206 kB] 193s Get:10 http://ftpmaster.internal/ubuntu oracular/universe armhf libzscanner4t64 armhf 3.3.5-1.1 [145 kB] 193s Get:11 http://ftpmaster.internal/ubuntu oracular/universe armhf libfstrm0 armhf 0.6.1-1build4 [17.5 kB] 193s Get:12 http://ftpmaster.internal/ubuntu oracular/universe armhf knot-dnsutils armhf 3.3.5-1.1 [222 kB] 193s Get:13 http://ftpmaster.internal/ubuntu oracular/universe armhf lua-socket armhf 3.1.0-1 [80.3 kB] 193s Get:14 http://ftpmaster.internal/ubuntu oracular/universe armhf lua-sec armhf 1.3.2-2 [36.2 kB] 193s Get:15 http://ftpmaster.internal/ubuntu oracular/universe armhf libjemalloc2 armhf 5.3.0-2build1 [200 kB] 193s Get:16 http://ftpmaster.internal/ubuntu oracular-proposed/universe armhf libluajit-5.1-common all 2.1.0+openresty20240314-1 [48.8 kB] 193s Get:17 http://ftpmaster.internal/ubuntu oracular-proposed/universe armhf libluajit-5.1-2 armhf 2.1.0+openresty20240314-1 [231 kB] 193s Get:18 http://ftpmaster.internal/ubuntu oracular/universe armhf knot-resolver armhf 5.7.2-1 [303 kB] 193s Get:19 http://ftpmaster.internal/ubuntu oracular/main armhf socat armhf 1.8.0.0-4build3 [359 kB] 193s Preconfiguring packages ... 193s Fetched 2805 kB in 1s (3614 kB/s) 193s Selecting previously unselected package dns-root-data. 194s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 58332 files and directories currently installed.) 194s Preparing to unpack .../00-dns-root-data_2024041801_all.deb ... 194s Unpacking dns-root-data (2024041801) ... 194s Selecting previously unselected package libevent-2.1-7t64:armhf. 194s Preparing to unpack .../01-libevent-2.1-7t64_2.1.12-stable-10_armhf.deb ... 194s Unpacking libevent-2.1-7t64:armhf (2.1.12-stable-10) ... 194s Selecting previously unselected package libunbound8:armhf. 195s Preparing to unpack .../02-libunbound8_1.19.2-1ubuntu3_armhf.deb ... 195s Unpacking libunbound8:armhf (1.19.2-1ubuntu3) ... 195s Selecting previously unselected package libgnutls-dane0t64:armhf. 196s Preparing to unpack .../03-libgnutls-dane0t64_3.8.5-2ubuntu1_armhf.deb ... 196s Unpacking libgnutls-dane0t64:armhf (3.8.5-2ubuntu1) ... 197s Selecting previously unselected package gnutls-bin. 199s Preparing to unpack .../04-gnutls-bin_3.8.5-2ubuntu1_armhf.deb ... 199s Unpacking gnutls-bin (3.8.5-2ubuntu1) ... 199s Selecting previously unselected package libdnssec9t64. 199s Preparing to unpack .../05-libdnssec9t64_3.3.5-1.1_armhf.deb ... 199s Unpacking libdnssec9t64 (3.3.5-1.1) ... 199s Selecting previously unselected package libxdp1:armhf. 200s Preparing to unpack .../06-libxdp1_1.4.2-1ubuntu4_armhf.deb ... 200s Unpacking libxdp1:armhf (1.4.2-1ubuntu4) ... 200s Selecting previously unselected package libknot14t64. 201s Preparing to unpack .../07-libknot14t64_3.3.5-1.1_armhf.deb ... 201s Unpacking libknot14t64 (3.3.5-1.1) ... 201s Selecting previously unselected package libzscanner4t64. 201s Preparing to unpack .../08-libzscanner4t64_3.3.5-1.1_armhf.deb ... 201s Unpacking libzscanner4t64 (3.3.5-1.1) ... 201s Selecting previously unselected package libfstrm0:armhf. 201s Preparing to unpack .../09-libfstrm0_0.6.1-1build4_armhf.deb ... 201s Unpacking libfstrm0:armhf (0.6.1-1build4) ... 201s Selecting previously unselected package knot-dnsutils. 201s Preparing to unpack .../10-knot-dnsutils_3.3.5-1.1_armhf.deb ... 201s Unpacking knot-dnsutils (3.3.5-1.1) ... 202s Selecting previously unselected package lua-socket:armhf. 202s Preparing to unpack .../11-lua-socket_3.1.0-1_armhf.deb ... 202s Unpacking lua-socket:armhf (3.1.0-1) ... 202s Selecting previously unselected package lua-sec:armhf. 202s Preparing to unpack .../12-lua-sec_1.3.2-2_armhf.deb ... 202s Unpacking lua-sec:armhf (1.3.2-2) ... 202s Selecting previously unselected package libjemalloc2:armhf. 202s Preparing to unpack .../13-libjemalloc2_5.3.0-2build1_armhf.deb ... 202s Unpacking libjemalloc2:armhf (5.3.0-2build1) ... 202s Selecting previously unselected package libluajit-5.1-common. 202s Preparing to unpack .../14-libluajit-5.1-common_2.1.0+openresty20240314-1_all.deb ... 202s Unpacking libluajit-5.1-common (2.1.0+openresty20240314-1) ... 202s Selecting previously unselected package libluajit-5.1-2:armhf. 202s Preparing to unpack .../15-libluajit-5.1-2_2.1.0+openresty20240314-1_armhf.deb ... 202s Unpacking libluajit-5.1-2:armhf (2.1.0+openresty20240314-1) ... 203s Selecting previously unselected package knot-resolver. 203s Preparing to unpack .../16-knot-resolver_5.7.2-1_armhf.deb ... 203s Unpacking knot-resolver (5.7.2-1) ... 203s Selecting previously unselected package socat. 203s Preparing to unpack .../17-socat_1.8.0.0-4build3_armhf.deb ... 203s Unpacking socat (1.8.0.0-4build3) ... 203s Selecting previously unselected package autopkgtest-satdep. 203s Preparing to unpack .../18-1-autopkgtest-satdep.deb ... 203s Unpacking autopkgtest-satdep (0) ... 203s Setting up libzscanner4t64 (3.3.5-1.1) ... 203s Setting up libfstrm0:armhf (0.6.1-1build4) ... 203s Setting up libevent-2.1-7t64:armhf (2.1.12-stable-10) ... 203s Setting up lua-socket:armhf (3.1.0-1) ... 203s Setting up libjemalloc2:armhf (5.3.0-2build1) ... 203s Setting up dns-root-data (2024041801) ... 203s Setting up libxdp1:armhf (1.4.2-1ubuntu4) ... 203s Setting up libunbound8:armhf (1.19.2-1ubuntu3) ... 203s Setting up libgnutls-dane0t64:armhf (3.8.5-2ubuntu1) ... 203s Setting up socat (1.8.0.0-4build3) ... 203s Setting up libdnssec9t64 (3.3.5-1.1) ... 203s Setting up libluajit-5.1-common (2.1.0+openresty20240314-1) ... 203s Setting up libknot14t64 (3.3.5-1.1) ... 203s Setting up gnutls-bin (3.8.5-2ubuntu1) ... 203s Setting up lua-sec:armhf (1.3.2-2) ... 203s Setting up knot-dnsutils (3.3.5-1.1) ... 203s Setting up libluajit-5.1-2:armhf (2.1.0+openresty20240314-1) ... 203s Setting up knot-resolver (5.7.2-1) ... 204s Created symlink /etc/systemd/system/kresd.target.wants/kres-cache-gc.service → /usr/lib/systemd/system/kres-cache-gc.service. 204s Created symlink /etc/systemd/system/multi-user.target.wants/kresd.target → /usr/lib/systemd/system/kresd.target. 204s Setting up autopkgtest-satdep (0) ... 204s Processing triggers for man-db (2.12.1-1) ... 205s Processing triggers for libc-bin (2.39-0ubuntu8.1) ... 216s (Reading database ... 58732 files and directories currently installed.) 216s Removing autopkgtest-satdep (0) ... 222s autopkgtest [19:21:20]: test roundtrip: [----------------------- 224s /usr/sbin/kresd + /usr/bin/kdig roundtrip tests 224s ------------ 224s workdir: /tmp/autopkgtest.cFef6u/roundtrip-artifacts 224s IP addr: 127.22.10.41 224s kresd args: --addr=127.22.10.41@8053 --tls=127.22.10.41@8853 --noninteractive --config=/tmp/autopkgtest.cFef6u/roundtrip-artifacts/kresd.conf --verbose --verbose --verbose 224s 224s make Certificate Authority key and certificate 224s ---------------------------------------------- 225s Generating a 3072 bit RSA private key... 225s Generating a self signed certificate... 225s X.509 Certificate Information: 225s Version: 3 225s Serial Number (hex): 4dfe8773cf7620e4778e1595f644e10ddb676963 225s Validity: 225s Not Before: Mon Jun 03 19:21:22 UTC 2024 225s Not After: Sat Jun 15 19:21:22 UTC 2024 225s Subject: CN=testing certificate authority (NOT FOR PRODUCTION) 225s Subject Public Key Algorithm: RSA 225s Algorithm Security Level: High (3072 bits) 225s Modulus (bits 3072): 225s 00:c2:53:9d:30:aa:4d:76:f2:2a:de:0d:00:83:47:0b 225s 68:61:a3:7c:c2:c3:de:ff:51:a4:3a:d4:41:3f:62:5c 225s 10:1d:49:00:ca:fa:5f:33:41:cf:45:a6:bf:68:0f:9f 225s 1e:91:fc:54:0c:34:6c:67:cf:a0:4a:0a:7c:4b:55:8e 225s a8:e1:4b:6c:8f:0c:89:9c:71:9c:fb:f2:46:31:0a:84 225s 39:5a:39:8e:d2:ba:50:71:b1:61:52:a6:01:dd:96:74 225s 36:9c:f3:a0:c7:f6:f8:3c:f4:74:81:b7:26:9b:18:ac 225s c5:6f:9a:f0:5c:f1:c1:59:ea:fa:05:bc:58:aa:b7:bc 225s 24:8c:c5:5b:96:05:86:07:cd:53:a9:f2:e7:a7:ee:8e 225s 2b:69:62:68:6f:d0:90:6f:7f:39:47:cc:28:fc:c2:26 225s 6e:d6:a9:bd:ec:ca:85:9e:68:f9:7f:8f:23:f3:6c:98 225s be:b8:1f:e4:7c:37:f2:97:b2:b1:af:6d:80:15:f2:03 225s 3c:22:23:a4:bd:ea:d1:4e:6b:94:91:07:41:c3:6f:77 225s f5:20:97:30:6b:72:5a:b2:56:ea:86:0b:c9:6a:9f:e5 225s 4a:bb:61:d9:d7:87:ed:c3:6a:e3:37:1d:68:c7:de:00 225s 11:49:3c:6c:46:82:a6:51:ef:33:97:88:f5:93:3c:8a 225s 77:12:8f:8e:5a:31:42:7c:49:84:10:f0:fa:26:f7:20 225s 82:54:b3:78:3c:cb:87:8a:72:ea:8b:ce:2d:21:fd:3b 225s c8:e7:75:47:b2:c1:26:f8:b0:01:33:40:d8:fa:0d:fe 225s e8:6c:03:38:d0:97:b3:a7:57:d5:f9:79:38:f1:7c:a9 225s 9d:3f:f4:dd:8d:f6:05:4b:4c:2f:ce:ca:24:26:58:f7 225s 12:04:6b:cf:b9:27:97:e0:8b:19:c8:4d:8a:a4:35:e6 225s 15:63:66:07:54:d6:c9:35:85:71:46:78:dc:05:ea:05 225s 19:ca:f3:4b:2c:24:65:10:7f:4f:31:ff:ae:71:3b:ea 225s fb 225s Exponent (bits 24): 225s 01:00:01 225s Extensions: 225s Basic Constraints (critical): 225s Certificate Authority (CA): TRUE 225s Path Length Constraint: 1 225s Name Constraints (critical): 225s Permitted: 225s DNSname: example 225s Key Usage (critical): 225s Certificate signing. 225s Subject Key Identifier (not critical): 225s eccd22270a8d8fda1c7dba1e3ff9754a6a77a039 225s Other Information: 225s Public Key ID: 225s sha1:eccd22270a8d8fda1c7dba1e3ff9754a6a77a039 225s sha256:48d49c37c23ea84e84370fbc28f3e0fee5eb804a0f20a718df667c779b2c4dd5 225s Public Key PIN: 225s pin-sha256:SNScN8I+qE6ENw+8KPPg/uXrgEoPIKcY32Z8d5ssTdU= 225s 225s 225s 225s Signing certificate... 225s 225s make Bogus Certificate Authority key and certificate 225s ---------------------------------------------------- 225s Generating a 3072 bit RSA private key... 225s Generating a self signed certificate... 225s X.509 Certificate Information: 225s Version: 3 225s Serial Number (hex): 610cb40757e91fd34883e87c43132da183ac10bb 225s Validity: 225s Not Before: Mon Jun 03 19:21:23 UTC 2024 225s Not After: Sat Jun 15 19:21:23 UTC 2024 225s Subject: CN=testing certificate authority (NOT FOR PRODUCTION) 225s Subject Public Key Algorithm: RSA 225s Algorithm Security Level: High (3072 bits) 225s Modulus (bits 3072): 225s 00:d0:03:5e:a0:51:9a:cd:e4:2a:c9:a2:a3:b5:c1:d7 225s ad:24:c1:4d:40:57:86:12:18:85:30:f6:ad:30:c3:d7 225s de:74:d1:2e:9c:c3:81:c2:d6:c9:39:d5:5d:16:ea:e8 225s 34:aa:bd:3e:a5:b1:77:e7:95:9c:e3:20:69:0b:a3:0d 225s 3a:68:dd:ab:c1:41:b9:cd:0d:61:60:38:37:bf:45:52 225s ca:e8:d7:67:de:dd:5c:fe:71:cb:a2:c7:86:d6:b2:67 225s c7:f6:1c:7d:d7:81:db:9a:1e:3d:93:f2:3c:28:5b:85 225s 99:43:48:28:92:49:73:05:f1:24:2e:cb:bf:1a:f3:ee 225s 8b:24:5e:d2:cc:b1:40:52:1a:0b:7e:25:79:93:56:6f 225s 4f:6d:76:98:1c:ef:47:1f:a7:bc:f4:ac:08:04:4c:5d 225s 1a:62:3b:6e:c2:cc:d8:89:0f:3b:67:c9:20:60:9c:40 225s a0:02:ee:e9:bc:a4:79:71:60:a8:ef:19:37:b0:f4:c5 225s c8:df:63:fa:f0:65:3e:55:20:64:a9:00:7c:84:88:41 225s d3:eb:7a:0c:cf:8d:ba:f0:60:1d:b6:a4:d4:05:70:d8 225s b2:b7:79:ed:fc:9e:14:2d:86:42:01:79:09:ed:11:ec 225s 67:34:6f:db:11:a4:47:eb:2e:64:6e:80:17:6b:ec:1c 225s 0d:77:17:6a:a6:f7:89:20:af:c2:2a:b6:81:ea:a0:48 225s 44:1e:1b:12:d3:77:db:d5:69:f5:92:a2:64:bf:8c:97 225s dd:f4:8d:fd:28:b5:3b:58:31:1f:5e:c1:24:be:4c:38 225s 17:13:16:e6:77:ed:60:a3:91:c7:4c:d0:1c:45:f3:07 225s 80:73:b1:68:d9:61:8d:7c:5c:b4:a3:8b:9a:b8:54:2d 225s 83:87:59:00:cf:52:25:b1:59:12:14:92:c2:09:d8:31 225s 04:3e:5f:33:4c:11:a5:60:ab:43:f2:f6:57:b1:14:23 225s f1:78:07:b0:dc:3c:bb:6c:89:53:31:1b:55:35:86:3f 225s 95 225s Exponent (bits 24): 225s 01:00:01 225s Extensions: 225s Basic Constraints (critical): 225s Certificate Authority (CA): TRUE 225s Path Length Constraint: 1 225s Name Constraints (critical): 225s Permitted: 225s DNSname: example 225s Key Usage (critical): 225s Certificate signing. 225s Subject Key Identifier (not critical): 225s 3f4c0321bd9a459c9827f89e01ab000bbfae0873 225s Other Information: 225s Public Key ID: 225s sha1:3f4c0321bd9a459c9827f89e01ab000bbfae0873 225s sha256:08fa3c9f900600aebc4e6f796dce71693a53a6c635bbd9ff9b866b1b03d14d3b 225s Public Key PIN: 225s pin-sha256:CPo8n5AGAK68Tm95bc5xaTpTpsY1u9n/m4ZrGwPRTTs= 225s 225s 225s 225s Signing certificate... 225s 225s make End Entity key and certificate 225s ----------------------------------- 226s Generating a 3072 bit RSA private key... 226s Generating a signed certificate... 226s X.509 Certificate Information: 226s Version: 3 226s Serial Number (hex): 301a24adb66be06a602a5ca7eec293ce102c3c94 226s Validity: 226s Not Before: Mon Jun 03 19:21:24 UTC 2024 226s Not After: Thu Jun 13 19:21:24 UTC 2024 226s Subject: CN=test.example 226s Subject Public Key Algorithm: RSA 226s Algorithm Security Level: High (3072 bits) 226s Modulus (bits 3072): 226s 00:ad:cd:fc:a0:ac:ad:51:e1:c8:67:6b:f5:bd:e4:4b 226s 76:57:9d:ee:3e:8b:53:a3:d3:d4:6a:c2:99:c8:72:37 226s 0c:80:96:ea:a3:d1:2d:ca:5b:9a:0a:eb:58:ce:51:57 226s e3:49:d6:37:c5:47:fd:8d:45:b0:73:31:3c:6d:34:49 226s db:cf:e2:de:f9:23:1a:c1:d9:ed:24:ff:ab:42:5a:06 226s 9d:4c:bf:07:85:5e:d2:77:d4:38:ee:c2:3f:51:86:d1 226s d3:13:eb:a6:95:9a:30:74:f5:11:be:27:33:7f:b2:cf 226s 37:e1:72:14:c5:0f:13:a9:30:5c:ed:ec:94:fd:8e:f3 226s 6f:a9:4d:6f:7e:01:86:1b:ca:b3:a8:b8:88:29:0e:8f 226s c1:8c:08:d0:95:87:ad:ef:aa:52:65:c8:62:de:f8:4c 226s 0d:0c:f8:8a:75:5f:21:a6:94:9f:a6:07:ad:34:23:26 226s 04:52:1e:4f:17:b3:40:10:11:5a:b8:a7:39:42:da:13 226s 78:36:fc:5c:bc:49:2b:50:c5:bd:3c:33:27:ae:47:34 226s ef:1d:2c:9a:46:2d:36:ad:16:94:9c:8f:01:71:7c:98 226s 31:83:bb:ad:31:db:cc:05:a7:84:5a:82:32:de:c5:c0 226s 81:c5:e8:f9:3b:f8:97:ec:45:8b:c3:b5:4f:7b:01:9a 226s fc:6a:21:34:13:57:79:1e:96:65:5e:c1:60:58:a8:0a 226s de:f0:6d:6e:c3:b7:eb:38:40:52:6a:ae:84:0c:bf:40 226s d6:34:f1:49:2e:49:72:08:b8:1a:63:ec:43:b0:cf:7c 226s 94:4b:c7:65:70:7e:17:2c:38:f2:6d:5c:12:61:1d:d7 226s 28:9e:90:96:68:ba:79:30:76:af:51:5d:e2:b9:07:d2 226s ee:44:1f:fc:12:79:9c:71:0f:ad:db:28:fb:f5:85:dc 226s bc:97:37:e1:35:4f:a5:b6:a2:74:22:0c:b0:d9:39:89 226s 8e:c5:31:67:6b:fe:ba:b2:8d:90:c7:2e:19:40:56:41 226s 7d 226s Exponent (bits 24): 226s 01:00:01 226s Extensions: 226s Basic Constraints (critical): 226s Certificate Authority (CA): FALSE 226s Subject Alternative Name (not critical): 226s DNSname: test.example 226s Key Purpose (not critical): 226s TLS WWW Server. 226s Key Usage (critical): 226s Digital signature. 226s Subject Key Identifier (not critical): 226s 09adb5d49fdd852c7733eb4d17ef674beaf4b35c 226s Authority Key Identifier (not critical): 226s eccd22270a8d8fda1c7dba1e3ff9754a6a77a039 226s Other Information: 226s Public Key ID: 226s sha1:09adb5d49fdd852c7733eb4d17ef674beaf4b35c 226s sha256:bbbd983e89cdddf9b83069b9d94640064d896b0de5087ebcdcd15de0b27fe6c9 226s Public Key PIN: 226s pin-sha256:u72YPonN3fm4MGm52UZABk2Jaw3lCH683NFd4LJ/5sk= 226s 226s 226s 226s Signing certificate... 226s 226s set up kresd daemon on 127.22.10.41 on ports 8053 (UDP, TCP) and 8853 (TLS) 226s --------------------------------------------------------------------------- 227s 227s test UDP with kdig 227s ------------------ 227s successful UDP request to 127.22.10.41 on port 8053 227s 227s test TCP with kdig 227s ------------------ 227s successful TCP request to 127.22.10.41 on port 8053 227s 227s test opportunistic DNS-over-TLS with kdig 227s ----------------------------------------- 227s successful opportunistic DNS-over-TLS request to 127.22.10.41 on port 8853 227s 227s test strict DNS-over-TLS with kdig 227s ---------------------------------- 227s successful strict DNS-over-TLS request to 127.22.10.41 on port 8853 227s 227s test invalid name with strict DNS-over-TLS with kdig 227s ---------------------------------------------------- 227s successful strict DNS-over-TLS request failure when name mismatch to 127.22.10.41 on port 8853 227s 227s test bad authority with strict DNS-over-TLS with kdig 227s ----------------------------------------------------- 227s successful strict DNS-over-TLS request failure to 127.22.10.41 on port 8853 227s 227s cleaning up 227s ----------- 227s 70261 0 drwxrwxrwt 1 root root 318 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts 227s 70269 4 -rw-r--r-- 1 root root 136 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/ca.template 227s 70270 8 -rw------- 1 root root 8170 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/ca-key.pem 227s 70271 4 -rw-r--r-- 1 root root 1590 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/ca-cert.pem 227s 70272 8 -rw------- 1 root root 8170 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/bogus-key.pem 227s 70273 4 -rw-r--r-- 1 root root 1590 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/bogus-cert.pem 227s 70274 4 -rw-r--r-- 1 root root 92 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/ee.template 227s 70275 8 -rw------- 1 root root 8170 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/ee-key.pem 227s 70276 4 -rw-r--r-- 1 root root 2218 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/ee-pubkey.pem 227s 70277 4 -rw-r--r-- 1 root root 1602 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/ee-cert.pem 227s 70278 4 -rw-r--r-- 1 root root 387 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/kresd.conf 227s 70279 72 -rw-r--r-- 1 root root 70171 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/kresd.err 227s 70280 4 -rw-r----- 1 root root 8192 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/lock.mdb 227s 70281 102400 -rw-r----- 1 root root 104857600 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/data.mdb 227s 70282 4 -rw-r--r-- 1 root root 118 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/badname.err 227s 70283 4 -rw-r--r-- 1 root root 118 Jun 3 19:21 /tmp/autopkgtest.cFef6u/roundtrip-artifacts/badca.err 227s ==> /tmp/autopkgtest.cFef6u/roundtrip-artifacts/badca.err <== 227s ;; WARNING: TLS, handshake failed (Error in the certificate.) 227s ;; ERROR: failed to query server 127.22.10.41@8853(TCP) 227s 227s ==> /tmp/autopkgtest.cFef6u/roundtrip-artifacts/badname.err <== 227s ;; WARNING: TLS, handshake failed (Error in the certificate.) 227s ;; ERROR: failed to query server 127.22.10.41@8853(TCP) 227s 227s ==> /tmp/autopkgtest.cFef6u/roundtrip-artifacts/kresd.err <== 227s [system] increasing file-descriptor limit: 1024 -> 1048576 227s [tls ] session ticket: epoch 419297, scheduling rotation check in 2123449 ms 227s [wtchdg] disabled in systemd (WatchdogSec= not specified) 227s [ta ] installed trust anchors for domain . are: 227s . 86400 DNSKEY 257 3 8 AwEAAaz/tAm8yTn4Mfeh5eyI96WSVexTBAvkMgJzkKTOiW1vkIbzxeF3+/4RgWOq7HrxRixHlFlExOLAJr5emLvN7SWXgnLh4+B5xQlNVz8Og8kvArMtNROxVQuCaSnIDdD5LKyWbRd2n9WGe2R8PzgCmr3EgVLrjyBxWezF0jLHwVN8efS3rCj/EWgvIWgb9tarpVUDK/b58Da+sqqls3eNbuv7pr+eoZG+SrDK6nWeL3c6H5Apxz7LjVc1uTIdsIXxuOLYA4/ilBmSVIzuDWfdRUfhHdY6+cn8HFRm+2hM8AnXGXws9555KrUB5qihylGa8subX2Nn6UwNR1AkUTV74bU= ; Valid: ; KeyTag:20326 227s 227s [system] loading config '/tmp/autopkgtest.cFef6u/roundtrip-artifacts/kresd.conf' (workdir '/tmp/autopkgtest.cFef6u/roundtrip-artifacts') 227s [system] deprecation WARNING: use log_level() instead of verbose() 227s [gnutls] (3) ASSERT: ../../../lib/x509/x509_ext.c[gnutls_subject_alt_names_get]:111 227s [gnutls] (3) ASSERT: ../../../lib/x509/x509.c[get_alt_name]:2012 227s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 227s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 227s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 227s [tls ] RFC 7858 OOB key-pin (0): pin-sha256="" 227s [gnutls] (3) ASSERT: ../../lib/cert-cred-x509.c[gnutls_certificate_get_x509_crt]:872 227s [system] loading config '/usr/lib/arm-linux-gnueabihf/knot-resolver/postconfig.lua' (workdir '/tmp/autopkgtest.cFef6u/roundtrip-artifacts') 227s [plan ][00000.00] plan '.' type 'NS' uid [65536.00] 227s [iterat][65536.00] '.' type 'NS' new uid was assigned .01, parent uid .00 227s [resolv][65536.01] => using root hints 227s [iterat][65536.01] '.' type 'NS' new uid was assigned .02, parent uid .00 227s [resolv][65536.02] >< TA: '.' 227s [plan ][65536.02] plan '.' type 'DNSKEY' uid [65536.03] 227s [iterat][65536.03] '.' type 'DNSKEY' new uid was assigned .04, parent uid .02 227s [select][65536.04] => id: '42856' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 227s [select][65536.04] => id: '42856' choosing: 'J.ROOT-SERVERS.NET.'@'192.58.128.30#00053' with timeout 400 ms zone cut: '.' 227s [resolv][65536.04] => id: '42856' querying: 'J.ROOT-SERVERS.NET.'@'192.58.128.30#00053' zone cut: '.' qname: '.' qtype: 'DNSKEY' proto: 'udp' 227s [plan ][00000.00] plan '.' type 'NS' uid [65537.00] 227s [iterat][65537.00] '.' type 'NS' new uid was assigned .01, parent uid .00 227s [resolv][65537.01] => using root hints 227s [iterat][65537.01] '.' type 'NS' new uid was assigned .02, parent uid .00 227s [select][65537.02] => id: '10232' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 227s [select][65537.02] => id: '10232' choosing: 'G.ROOT-SERVERS.NET.'@'2001:500:12::d0d#00053' with timeout 400 ms zone cut: '.' 227s [resolv][65537.02] => id: '10232' querying: 'G.ROOT-SERVERS.NET.'@'2001:500:12::d0d#00053' zone cut: '.' qname: '.' qtype: 'NS' proto: 'udp' 227s [taupd ] refreshing TA for . 227s [plan ][00000.00] plan '.' type 'DNSKEY' uid [65538.00] 227s [iterat][65538.00] '.' type 'DNSKEY' new uid was assigned .01, parent uid .00 227s [resolv][65538.01] => using root hints 227s [iterat][65538.01] '.' type 'DNSKEY' new uid was assigned .02, parent uid .00 227s [resolv][65538.02] >< TA: '.' 227s [select][65538.02] => id: '63928' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 227s [select][65538.02] => id: '63928' choosing: 'D.ROOT-SERVERS.NET.'@'2001:500:2d::d#00053' with timeout 400 ms zone cut: '.' 227s [select][65536.04] => id: '42856' noting selection error: 'J.ROOT-SERVERS.NET.'@'192.58.128.30#00053' zone cut: '.' error: 1 QUERY_TIMEOUT 227s [iterat][65538.02] '.' type 'DNSKEY' new uid was assigned .03, parent uid .00 227s [select][65538.03] => id: '22567' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 227s [select][65538.03] => id: '22567' choosing: 'G.ROOT-SERVERS.NET.'@'192.112.36.4#00053' with timeout 400 ms zone cut: '.' 227s [resolv][65538.03] => id: '22567' querying: 'G.ROOT-SERVERS.NET.'@'192.112.36.4#00053' zone cut: '.' qname: '.' qtype: 'DNSKEY' proto: 'udp' 227s [iterat][65536.04] '.' type 'DNSKEY' new uid was assigned .05, parent uid .02 227s [select][65536.05] => id: '58999' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 227s [select][65536.05] => id: '58999' choosing: 'A.ROOT-SERVERS.NET.'@'2001:503:ba3e::2:30#00053' with timeout 800 ms zone cut: '.' 227s [select][65537.02] NO6: timed out, appended, timeouts 1/6 227s [select][65537.02] => id: '10232' noting selection error: 'G.ROOT-SERVERS.NET.'@'2001:500:12::d0d#00053' zone cut: '.' error: 1 QUERY_TIMEOUT 227s [iterat][65537.02] '.' type 'NS' new uid was assigned .03, parent uid .00 227s [select][65537.03] => id: '23047' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 227s [select][65537.03] => id: '23047' choosing: 'H.ROOT-SERVERS.NET.'@'198.97.190.53#00053' with timeout 800 ms zone cut: '.' 227s [resolv][65537.03] => id: '23047' querying: 'H.ROOT-SERVERS.NET.'@'198.97.190.53#00053' zone cut: '.' qname: '.' qtype: 'NS' proto: 'udp' 227s [plan ][00000.00] plan 'monkeys.example.' type 'A' uid [37697.00] 227s [iterat][37697.00] 'monkeys.example.' type 'A' new uid was assigned .01, parent uid .00 227s [hint ][37697.01] <= answered from hints 227s [iterat][37697.01] <= rcode: NOERROR 227s [resolv][37697.01] AD: request NOT classified as SECURE 227s [resolv][37697.01] finished in state: 4, queries: 1, mempool: 16392 B 227s [plan ][00000.00] plan 'monkeys.example.' type 'A' uid [58400.00] 227s [iterat][58400.00] 'monkeys.example.' type 'A' new uid was assigned .01, parent uid .00 227s [hint ][58400.01] <= answered from hints 227s [iterat][58400.01] <= rcode: NOERROR 227s [resolv][58400.01] AD: request NOT classified as SECURE 227s [resolv][58400.01] finished in state: 4, queries: 1, mempool: 81936 B 227s [io ] => connection to '127.0.0.1#49291' closed by peer (end of file) 227s [gnutls] (5) REC[0xe9230000]: Allocating epoch #0 227s [gnutls] (2) added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 227s [gnutls] (5) REC[0xe9230000]: Allocating epoch #1 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 Handshake packet received. Epoch 0, length: 374 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Handshake(22) 227s [gnutls] (5) REC[0xe9230000]: Received Packet Handshake(22) with length: 374 227s [gnutls] (5) REC[0xe9230000]: Decrypted Packet[0] Handshake(22) with length: 374 227s [gnutls] (4) HSK[0xe9230000]: CLIENT HELLO (1) was received. Length 370[370], frag offset 0, frag length: 370, sequence: 0 227s [gnutls] (4) HSK[0xe9230000]: Client's version: 3.3 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Supported Versions/43' (5 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Found version: 3.4 227s [gnutls] (4) EXT[0xe9230000]: Found version: 3.3 227s [gnutls] (4) EXT[0xe9230000]: Negotiated version: 3.4 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Extended Master Secret/23' (0 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'ALPN/16' (6 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Record Size Limit/28' (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: record_size_limit 16385 negotiated 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Session Ticket/35' (0 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Signature Algorithms/13' (34 bytes) 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (4.1) RSA-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.9) RSA-PSS-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.7) EdDSA-Ed25519 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (5.1) RSA-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.10) RSA-PSS-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.8) EdDSA-Ed448 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (6.1) RSA-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.11) RSA-PSS-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (2.1) RSA-SHA1 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (2.3) ECDSA-SHA1 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 227s [gnutls] (4) EXT[0xe9230000]: PSK KE mode 01 received 227s [gnutls] (4) EXT[0xe9230000]: PSK KE mode 00 received 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Supported Groups/10' (22 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Received group SECP256R1 (0x17) 227s [gnutls] (4) EXT[0xe9230000]: Received group SECP384R1 (0x18) 227s [gnutls] (4) EXT[0xe9230000]: Received group SECP521R1 (0x19) 227s [gnutls] (4) EXT[0xe9230000]: Received group X25519 (0x1d) 227s [gnutls] (4) EXT[0xe9230000]: Received group X448 (0x1e) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE2048 (0x100) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE3072 (0x101) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE4096 (0x102) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE6144 (0x103) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE8192 (0x104) 227s [gnutls] (4) EXT[0xe9230000]: Selected group SECP256R1 227s [gnutls] (2) checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 227s [gnutls] (3) ASSERT: ../../../lib/ext/server_name.c[gnutls_server_name_get]:234 227s [gnutls] (4) HSK[0xe9230000]: Requested server name: '' 227s [gnutls] (4) HSK[0xe9230000]: checking compat of GNUTLS_AES_256_GCM_SHA384 with certificate[0] (RSA/X.509) 227s [gnutls] (4) checking cert compat with RSA-SHA256 227s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 227s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 227s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 227s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 227s [gnutls] (4) Selected signature algorithm: RSA-PSS-RSAE-SHA256 227s [gnutls] (2) Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) HSK[0xe9230000]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) HSK[0xe9230000]: Selected version TLS1.3 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'OCSP Status Request/5' (5 bytes) 227s [gnutls] (4) EXT[0xe9230000]: OCSP status was requested 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Key Share/51' (107 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Received key share for SECP256R1 227s [gnutls] (4) HSK[0xe9230000]: Selected group SECP256R1 (2) 227s [gnutls] (2) EXT[0xe9230000]: server generated SECP256R1 shared key 227s [gnutls] (4) HSK[0xe9230000]: Safe renegotiation succeeded 227s [gnutls] (4) HSK[0xe9230000]: SessionID: 2fd6415476d11dc659a4c3fcd801fc23cda388586fef58072c93d5d582bdca29 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: sending key share for SECP256R1 227s [gnutls] (4) EXT[0xe9230000]: Sending extension Key Share/51 (69 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Sending extension Supported Versions/43 (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 227s [gnutls] (4) HSK[0xe9230000]: SERVER HELLO was queued [155 bytes] 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 155 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[1] Handshake(22) in epoch 0 and length: 160 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 227s [gnutls] (4) REC[0xe9230000]: Sent ChangeCipherSpec 227s [gnutls] (5) REC[0xe9230000]: Initializing epoch #1 227s [gnutls] (5) REC[0xe9230000]: Epoch #1 ready 227s [gnutls] (4) HSK[0xe9230000]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (SRTP/14) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (ALPN/16) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Sending extension ALPN/16 (6 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Sending extension Record Size Limit/28 (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Key Share/51) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Early Data/42) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Cookie/44) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 227s [gnutls] (4) HSK[0xe9230000]: ENCRYPTED EXTENSIONS was queued [22 bytes] 227s [gnutls] (4) HSK[0xe9230000]: CERTIFICATE was queued [1155 bytes] 227s [gnutls] (4) checking cert compat with RSA-SHA256 227s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 227s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 227s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 227s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 227s [gnutls] (4) HSK[0xe9230000]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 227s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 227s [gnutls] (4) HSK[0xe9230000]: CERTIFICATE VERIFY was queued [392 bytes] 227s [gnutls] (4) HSK[0xe9230000]: sending finished 227s [gnutls] (4) HSK[0xe9230000]: FINISHED was queued [52 bytes] 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 22 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[1] Handshake(22) in epoch 1 and length: 44 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 1155 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[2] Handshake(22) in epoch 1 and length: 1177 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 392 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[3] Handshake(22) in epoch 1 and length: 414 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[4] Handshake(22) in epoch 1 and length: 74 227s [gnutls] (3) ASSERT: ../../lib/constate.c[_gnutls_epoch_get]:965 227s [gnutls] (5) REC[0xe9230000]: Allocating epoch #2 227s [gnutls] (4) HSK[0xe9230000]: unauthenticated session eligible for early start 227s [gnutls] (5) REC[0xe9230000]: Initializing epoch #2 227s [gnutls] (5) REC[0xe9230000]: Epoch #2 ready 227s [gnutls] (4) HSK[0xe9230000]: TLS 1.3 set write key with cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) HSK[0xe9230000]: switching early to application traffic keys 227s [gnutls] (4) HSK[0xe9230000]: NEW SESSION TICKET was queued [251 bytes] 227s [gnutls] (4) HSK[0xe9230000]: NEW SESSION TICKET was queued [251 bytes] 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[1] Handshake(22) in epoch 2 and length: 273 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[2] Handshake(22) in epoch 2 and length: 273 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 227s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 ChangeCipherSpec packet received. Epoch 1, length: 1 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Handshake(22) 227s [gnutls] (5) REC[0xe9230000]: Received Packet ChangeCipherSpec(20) with length: 1 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 227s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 Application Data packet received. Epoch 1, length: 69 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Handshake(22) 227s [gnutls] (5) REC[0xe9230000]: Received Packet Application Data(23) with length: 69 227s [gnutls] (5) REC[0xe9230000]: Decrypted Packet[0] Handshake(22) with length: 52 227s [gnutls] (4) HSK[0xe9230000]: FINISHED (20) was received. Length 48[48], frag offset 0, frag length: 48, sequence: 0 227s [gnutls] (4) HSK[0xe9230000]: parsing finished 227s [gnutls] (4) HSK[0xe9230000]: TLS 1.3 set read key with cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (5) REC[0xe9230000]: Start of epoch cleanup 227s [gnutls] (5) REC[0xe9230000]: Epoch #0 freed 227s [gnutls] (5) REC[0xe9230000]: Epoch #1 freed 227s [gnutls] (5) REC[0xe9230000]: End of epoch cleanup 227s [tls ] TLS handshake with 127.0.0.1#53265 has completed 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 227s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_int]:1759 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 Application Data packet received. Epoch 2, length: 147 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Application Data(23) 227s [gnutls] (5) REC[0xe9230000]: Received Packet Application Data(23) with length: 147 227s [gnutls] (5) REC[0xe9230000]: Decrypted Packet[0] Application Data(23) with length: 130 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 227s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_int]:1759 227s [plan ][00000.00] plan 'monkeys.example.' type 'A' uid [17132.00] 227s [iterat][17132.00] 'monkeys.example.' type 'A' new uid was assigned .01, parent uid .00 227s [hint ][17132.01] <= answered from hints 227s [iterat][17132.01] <= rcode: NOERROR 227s [resolv][17132.01] AD: request NOT classified as SECURE 227s [resolv][17132.01] finished in state: 4, queries: 1, mempool: 81936 B 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Application Data(23) with length: 470 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[3] Application Data(23) in epoch 2 and length: 492 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 Application Data packet received. Epoch 2, length: 19 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Application Data(23) 227s [gnutls] (5) REC[0xe9230000]: Received Packet Application Data(23) with length: 19 227s [gnutls] (5) REC[0xe9230000]: Decrypted Packet[1] Alert(21) with length: 2 227s [gnutls] (5) REC[0xe9230000]: Alert[1|0] - Close notify - was received 227s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_in_buffers]:1565 227s [io ] => connection to '127.0.0.1#53265' closed by peer (end of file) 227s [gnutls] (5) REC[0xe9230000]: Start of epoch cleanup 227s [gnutls] (5) REC[0xe9230000]: End of epoch cleanup 227s [gnutls] (5) REC[0xe9230000]: Epoch #2 freed 227s [gnutls] (5) REC[0xe9230000]: Allocating epoch #0 227s [gnutls] (2) added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 227s [gnutls] (5) REC[0xe9230000]: Allocating epoch #1 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 Handshake packet received. Epoch 0, length: 395 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Handshake(22) 227s [gnutls] (5) REC[0xe9230000]: Received Packet Handshake(22) with length: 395 227s [gnutls] (5) REC[0xe9230000]: Decrypted Packet[0] Handshake(22) with length: 395 227s [gnutls] (4) HSK[0xe9230000]: CLIENT HELLO (1) was received. Length 391[391], frag offset 0, frag length: 391, sequence: 0 227s [gnutls] (4) HSK[0xe9230000]: Client's version: 3.3 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Supported Versions/43' (5 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Found version: 3.4 227s [gnutls] (4) EXT[0xe9230000]: Found version: 3.3 227s [gnutls] (4) EXT[0xe9230000]: Negotiated version: 3.4 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'ALPN/16' (6 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Record Size Limit/28' (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: record_size_limit 16385 negotiated 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Extended Master Secret/23' (0 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Server Name Indication/0' (17 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 227s [gnutls] (4) EXT[0xe9230000]: PSK KE mode 01 received 227s [gnutls] (4) EXT[0xe9230000]: PSK KE mode 00 received 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Session Ticket/35' (0 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Supported Groups/10' (22 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Received group SECP256R1 (0x17) 227s [gnutls] (4) EXT[0xe9230000]: Received group SECP384R1 (0x18) 227s [gnutls] (4) EXT[0xe9230000]: Received group SECP521R1 (0x19) 227s [gnutls] (4) EXT[0xe9230000]: Received group X25519 (0x1d) 227s [gnutls] (4) EXT[0xe9230000]: Received group X448 (0x1e) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE2048 (0x100) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE3072 (0x101) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE4096 (0x102) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE6144 (0x103) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE8192 (0x104) 227s [gnutls] (4) EXT[0xe9230000]: Selected group SECP256R1 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Signature Algorithms/13' (34 bytes) 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (4.1) RSA-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.9) RSA-PSS-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.7) EdDSA-Ed25519 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (5.1) RSA-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.10) RSA-PSS-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.8) EdDSA-Ed448 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (6.1) RSA-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.11) RSA-PSS-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (2.1) RSA-SHA1 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (2.3) ECDSA-SHA1 227s [gnutls] (2) checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 227s [gnutls] (4) HSK[0xe9230000]: Requested server name: 'test.example' 227s [gnutls] (4) checking cert compat with RSA-SHA256 227s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 227s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 227s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 227s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 227s [gnutls] (4) Selected signature algorithm: RSA-PSS-RSAE-SHA256 227s [gnutls] (2) Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) HSK[0xe9230000]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) HSK[0xe9230000]: Selected version TLS1.3 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Key Share/51' (107 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Received key share for SECP256R1 227s [gnutls] (4) HSK[0xe9230000]: Selected group SECP256R1 (2) 227s [gnutls] (2) EXT[0xe9230000]: server generated SECP256R1 shared key 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'OCSP Status Request/5' (5 bytes) 227s [gnutls] (4) EXT[0xe9230000]: OCSP status was requested 227s [gnutls] (4) HSK[0xe9230000]: Safe renegotiation succeeded 227s [gnutls] (4) HSK[0xe9230000]: SessionID: 5bcd16f49a930532a9f465c7999d9ee34498dc383588404eb273ce1ca2e45c35 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: sending key share for SECP256R1 227s [gnutls] (4) EXT[0xe9230000]: Sending extension Key Share/51 (69 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Sending extension Supported Versions/43 (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 227s [gnutls] (4) HSK[0xe9230000]: SERVER HELLO was queued [155 bytes] 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 155 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[1] Handshake(22) in epoch 0 and length: 160 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 227s [gnutls] (4) REC[0xe9230000]: Sent ChangeCipherSpec 227s [gnutls] (5) REC[0xe9230000]: Initializing epoch #1 227s [gnutls] (5) REC[0xe9230000]: Epoch #1 ready 227s [gnutls] (4) HSK[0xe9230000]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Early Data/42) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Cookie/44) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (ALPN/16) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Sending extension ALPN/16 (6 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (SRTP/14) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Sending extension Record Size Limit/28 (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Key Share/51) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 227s [gnutls] (4) HSK[0xe9230000]: ENCRYPTED EXTENSIONS was queued [22 bytes] 227s [gnutls] (4) HSK[0xe9230000]: CERTIFICATE was queued [1155 bytes] 227s [gnutls] (4) checking cert compat with RSA-SHA256 227s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 227s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 227s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 227s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 227s [gnutls] (4) HSK[0xe9230000]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 227s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 227s [gnutls] (4) HSK[0xe9230000]: CERTIFICATE VERIFY was queued [392 bytes] 227s [gnutls] (4) HSK[0xe9230000]: sending finished 227s [gnutls] (4) HSK[0xe9230000]: FINISHED was queued [52 bytes] 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 22 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[1] Handshake(22) in epoch 1 and length: 44 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 1155 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[2] Handshake(22) in epoch 1 and length: 1177 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 392 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[3] Handshake(22) in epoch 1 and length: 414 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[4] Handshake(22) in epoch 1 and length: 74 227s [gnutls] (3) ASSERT: ../../lib/constate.c[_gnutls_epoch_get]:965 227s [gnutls] (5) REC[0xe9230000]: Allocating epoch #2 227s [gnutls] (4) HSK[0xe9230000]: unauthenticated session eligible for early start 227s [gnutls] (5) REC[0xe9230000]: Initializing epoch #2 227s [gnutls] (5) REC[0xe9230000]: Epoch #2 ready 227s [gnutls] (4) HSK[0xe9230000]: TLS 1.3 set write key with cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) HSK[0xe9230000]: switching early to application traffic keys 227s [gnutls] (4) HSK[0xe9230000]: NEW SESSION TICKET was queued [251 bytes] 227s [gnutls] (4) HSK[0xe9230000]: NEW SESSION TICKET was queued [251 bytes] 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[1] Handshake(22) in epoch 2 and length: 273 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[2] Handshake(22) in epoch 2 and length: 273 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 227s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 ChangeCipherSpec packet received. Epoch 1, length: 1 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Handshake(22) 227s [gnutls] (5) REC[0xe9230000]: Received Packet ChangeCipherSpec(20) with length: 1 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 227s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 Application Data packet received. Epoch 1, length: 69 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Handshake(22) 227s [gnutls] (5) REC[0xe9230000]: Received Packet Application Data(23) with length: 69 227s [gnutls] (5) REC[0xe9230000]: Decrypted Packet[0] Handshake(22) with length: 52 227s [gnutls] (4) HSK[0xe9230000]: FINISHED (20) was received. Length 48[48], frag offset 0, frag length: 48, sequence: 0 227s [gnutls] (4) HSK[0xe9230000]: parsing finished 227s [gnutls] (4) HSK[0xe9230000]: TLS 1.3 set read key with cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (5) REC[0xe9230000]: Start of epoch cleanup 227s [gnutls] (5) REC[0xe9230000]: Epoch #0 freed 227s [gnutls] (5) REC[0xe9230000]: Epoch #1 freed 227s [gnutls] (5) REC[0xe9230000]: End of epoch cleanup 227s [tls ] TLS handshake with 127.0.0.1#45353 has completed 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 227s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_int]:1759 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 Application Data packet received. Epoch 2, length: 147 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Application Data(23) 227s [gnutls] (5) REC[0xe9230000]: Received Packet Application Data(23) with length: 147 227s [gnutls] (5) REC[0xe9230000]: Decrypted Packet[0] Application Data(23) with length: 130 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 227s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_int]:1759 227s [plan ][00000.00] plan 'monkeys.example.' type 'A' uid [17506.00] 227s [iterat][17506.00] 'monkeys.example.' type 'A' new uid was assigned .01, parent uid .00 227s [hint ][17506.01] <= answered from hints 227s [iterat][17506.01] <= rcode: NOERROR 227s [resolv][17506.01] AD: request NOT classified as SECURE 227s [resolv][17506.01] finished in state: 4, queries: 1, mempool: 81936 B 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Application Data(23) with length: 470 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[3] Application Data(23) in epoch 2 and length: 492 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 Application Data packet received. Epoch 2, length: 19 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Application Data(23) 227s [gnutls] (5) REC[0xe9230000]: Received Packet Application Data(23) with length: 19 227s [gnutls] (5) REC[0xe9230000]: Decrypted Packet[1] Alert(21) with length: 2 227s [gnutls] (5) REC[0xe9230000]: Alert[1|0] - Close notify - was received 227s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_in_buffers]:1565 227s [io ] => connection to '127.0.0.1#45353' closed by peer (end of file) 227s [gnutls] (5) REC[0xe9230000]: Start of epoch cleanup 227s [gnutls] (5) REC[0xe9230000]: End of epoch cleanup 227s [gnutls] (5) REC[0xe9230000]: Epoch #2 freed 227s [gnutls] (5) REC[0xe9230000]: Allocating epoch #0 227s [gnutls] (2) added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 227s [gnutls] (5) REC[0xe9230000]: Allocating epoch #1 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 Handshake packet received. Epoch 0, length: 399 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Handshake(22) 227s [gnutls] (5) REC[0xe9230000]: Received Packet Handshake(22) with length: 399 227s [gnutls] (5) REC[0xe9230000]: Decrypted Packet[0] Handshake(22) with length: 399 227s [gnutls] (4) HSK[0xe9230000]: CLIENT HELLO (1) was received. Length 395[395], frag offset 0, frag length: 395, sequence: 0 227s [gnutls] (4) HSK[0xe9230000]: Client's version: 3.3 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Supported Versions/43' (5 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Found version: 3.4 227s [gnutls] (4) EXT[0xe9230000]: Found version: 3.3 227s [gnutls] (4) EXT[0xe9230000]: Negotiated version: 3.4 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Record Size Limit/28' (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: record_size_limit 16385 negotiated 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Extended Master Secret/23' (0 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Server Name Indication/0' (21 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'ALPN/16' (6 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 227s [gnutls] (4) EXT[0xe9230000]: PSK KE mode 01 received 227s [gnutls] (4) EXT[0xe9230000]: PSK KE mode 00 received 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Signature Algorithms/13' (34 bytes) 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (4.1) RSA-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.9) RSA-PSS-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.7) EdDSA-Ed25519 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (5.1) RSA-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.10) RSA-PSS-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.8) EdDSA-Ed448 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (6.1) RSA-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.11) RSA-PSS-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (2.1) RSA-SHA1 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (2.3) ECDSA-SHA1 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Supported Groups/10' (22 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Received group SECP256R1 (0x17) 227s [gnutls] (4) EXT[0xe9230000]: Received group SECP384R1 (0x18) 227s [gnutls] (4) EXT[0xe9230000]: Received group SECP521R1 (0x19) 227s [gnutls] (4) EXT[0xe9230000]: Received group X25519 (0x1d) 227s [gnutls] (4) EXT[0xe9230000]: Received group X448 (0x1e) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE2048 (0x100) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE3072 (0x101) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE4096 (0x102) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE6144 (0x103) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE8192 (0x104) 227s [gnutls] (4) EXT[0xe9230000]: Selected group SECP256R1 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Session Ticket/35' (0 bytes) 227s [gnutls] (2) checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 227s [gnutls] (4) HSK[0xe9230000]: Requested server name: 'notright.example' 227s [gnutls] (4) HSK[0xe9230000]: checking compat of GNUTLS_AES_256_GCM_SHA384 with certificate[0] (RSA/X.509) 227s [gnutls] (4) checking cert compat with RSA-SHA256 227s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 227s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 227s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 227s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 227s [gnutls] (4) Selected signature algorithm: RSA-PSS-RSAE-SHA256 227s [gnutls] (2) Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) HSK[0xe9230000]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) HSK[0xe9230000]: Selected version TLS1.3 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Key Share/51' (107 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Received key share for SECP256R1 227s [gnutls] (4) HSK[0xe9230000]: Selected group SECP256R1 (2) 227s [gnutls] (2) EXT[0xe9230000]: server generated SECP256R1 shared key 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'OCSP Status Request/5' (5 bytes) 227s [gnutls] (4) EXT[0xe9230000]: OCSP status was requested 227s [gnutls] (4) HSK[0xe9230000]: Safe renegotiation succeeded 227s [gnutls] (4) HSK[0xe9230000]: SessionID: 402c2484edb78113794c8e7c0ed901f72721141c2046db3fc7d459a4053ae03e 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: sending key share for SECP256R1 227s [gnutls] (4) EXT[0xe9230000]: Sending extension Key Share/51 (69 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Sending extension Supported Versions/43 (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 227s [gnutls] (4) HSK[0xe9230000]: SERVER HELLO was queued [155 bytes] 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 155 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[1] Handshake(22) in epoch 0 and length: 160 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 227s [gnutls] (4) REC[0xe9230000]: Sent ChangeCipherSpec 227s [gnutls] (5) REC[0xe9230000]: Initializing epoch #1 227s [gnutls] (5) REC[0xe9230000]: Epoch #1 ready 227s [gnutls] (4) HSK[0xe9230000]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Cookie/44) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (ALPN/16) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Sending extension ALPN/16 (6 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Sending extension Record Size Limit/28 (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (SRTP/14) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Key Share/51) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Early Data/42) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 227s [gnutls] (4) HSK[0xe9230000]: ENCRYPTED EXTENSIONS was queued [22 bytes] 227s [gnutls] (4) HSK[0xe9230000]: CERTIFICATE was queued [1155 bytes] 227s [gnutls] (4) checking cert compat with RSA-SHA256 227s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 227s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 227s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 227s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 227s [gnutls] (4) HSK[0xe9230000]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 227s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 227s [gnutls] (4) HSK[0xe9230000]: CERTIFICATE VERIFY was queued [392 bytes] 227s [gnutls] (4) HSK[0xe9230000]: sending finished 227s [gnutls] (4) HSK[0xe9230000]: FINISHED was queued [52 bytes] 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 22 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[1] Handshake(22) in epoch 1 and length: 44 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 1155 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[2] Handshake(22) in epoch 1 and length: 1177 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 392 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[3] Handshake(22) in epoch 1 and length: 414 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[4] Handshake(22) in epoch 1 and length: 74 227s [gnutls] (3) ASSERT: ../../lib/constate.c[_gnutls_epoch_get]:965 227s [gnutls] (5) REC[0xe9230000]: Allocating epoch #2 227s [gnutls] (4) HSK[0xe9230000]: unauthenticated session eligible for early start 227s [gnutls] (5) REC[0xe9230000]: Initializing epoch #2 227s [gnutls] (5) REC[0xe9230000]: Epoch #2 ready 227s [gnutls] (4) HSK[0xe9230000]: TLS 1.3 set write key with cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) HSK[0xe9230000]: switching early to application traffic keys 227s [gnutls] (4) HSK[0xe9230000]: NEW SESSION TICKET was queued [251 bytes] 227s [gnutls] (4) HSK[0xe9230000]: NEW SESSION TICKET was queued [251 bytes] 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[1] Handshake(22) in epoch 2 and length: 273 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[2] Handshake(22) in epoch 2 and length: 273 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 227s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 ChangeCipherSpec packet received. Epoch 1, length: 1 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Handshake(22) 227s [gnutls] (5) REC[0xe9230000]: Received Packet ChangeCipherSpec(20) with length: 1 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 227s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 227s [io ] => connection to '127.0.0.1#34521' closed by peer (connection reset by peer) 227s [gnutls] (5) REC[0xe9230000]: Start of epoch cleanup 227s [gnutls] (5) REC[0xe9230000]: Epoch #0 freed 227s [gnutls] (5) REC[0xe9230000]: End of epoch cleanup 227s [gnutls] (5) REC[0xe9230000]: Epoch #1 freed 227s [gnutls] (5) REC[0xe9230000]: Epoch #2 freed 227s [gnutls] (5) REC[0xe9230000]: Allocating epoch #0 227s [gnutls] (2) added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 227s [gnutls] (5) REC[0xe9230000]: Allocating epoch #1 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 Handshake packet received. Epoch 0, length: 395 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Handshake(22) 227s [gnutls] (5) REC[0xe9230000]: Received Packet Handshake(22) with length: 395 227s [gnutls] (5) REC[0xe9230000]: Decrypted Packet[0] Handshake(22) with length: 395 227s [gnutls] (4) HSK[0xe9230000]: CLIENT HELLO (1) was received. Length 391[391], frag offset 0, frag length: 391, sequence: 0 227s [gnutls] (4) HSK[0xe9230000]: Client's version: 3.3 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Supported Versions/43' (5 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Found version: 3.4 227s [gnutls] (4) EXT[0xe9230000]: Found version: 3.3 227s [gnutls] (4) EXT[0xe9230000]: Negotiated version: 3.4 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Server Name Indication/0' (17 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Record Size Limit/28' (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: record_size_limit 16385 negotiated 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Extended Master Secret/23' (0 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'ALPN/16' (6 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Supported Groups/10' (22 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Received group SECP256R1 (0x17) 227s [gnutls] (4) EXT[0xe9230000]: Received group SECP384R1 (0x18) 227s [gnutls] (4) EXT[0xe9230000]: Received group SECP521R1 (0x19) 227s [gnutls] (4) EXT[0xe9230000]: Received group X25519 (0x1d) 227s [gnutls] (4) EXT[0xe9230000]: Received group X448 (0x1e) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE2048 (0x100) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE3072 (0x101) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE4096 (0x102) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE6144 (0x103) 227s [gnutls] (4) EXT[0xe9230000]: Received group FFDHE8192 (0x104) 227s [gnutls] (4) EXT[0xe9230000]: Selected group SECP256R1 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 227s [gnutls] (4) EXT[0xe9230000]: PSK KE mode 01 received 227s [gnutls] (4) EXT[0xe9230000]: PSK KE mode 00 received 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Session Ticket/35' (0 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Signature Algorithms/13' (34 bytes) 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (4.1) RSA-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.9) RSA-PSS-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.7) EdDSA-Ed25519 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (5.1) RSA-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.10) RSA-PSS-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.8) EdDSA-Ed448 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (6.1) RSA-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.11) RSA-PSS-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (2.1) RSA-SHA1 227s [gnutls] (4) EXT[0xe9230000]: rcvd signature algo (2.3) ECDSA-SHA1 227s [gnutls] (2) checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 227s [gnutls] (4) HSK[0xe9230000]: Requested server name: 'test.example' 227s [gnutls] (4) checking cert compat with RSA-SHA256 227s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 227s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 227s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 227s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 227s [gnutls] (4) Selected signature algorithm: RSA-PSS-RSAE-SHA256 227s [gnutls] (2) Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) HSK[0xe9230000]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) HSK[0xe9230000]: Selected version TLS1.3 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'OCSP Status Request/5' (5 bytes) 227s [gnutls] (4) EXT[0xe9230000]: OCSP status was requested 227s [gnutls] (4) EXT[0xe9230000]: Parsing extension 'Key Share/51' (107 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Received key share for SECP256R1 227s [gnutls] (4) HSK[0xe9230000]: Selected group SECP256R1 (2) 227s [gnutls] (2) EXT[0xe9230000]: server generated SECP256R1 shared key 227s [gnutls] (4) HSK[0xe9230000]: Safe renegotiation succeeded 227s [gnutls] (4) HSK[0xe9230000]: SessionID: 62ba6c260931f9eabba10dd811b7b1790c58ef76405c4490cdf7ece07ebc722a 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Sending extension Supported Versions/43 (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: sending key share for SECP256R1 227s [gnutls] (4) EXT[0xe9230000]: Sending extension Key Share/51 (69 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 227s [gnutls] (4) HSK[0xe9230000]: SERVER HELLO was queued [155 bytes] 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 155 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[1] Handshake(22) in epoch 0 and length: 160 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 227s [gnutls] (4) REC[0xe9230000]: Sent ChangeCipherSpec 227s [gnutls] (5) REC[0xe9230000]: Initializing epoch #1 227s [gnutls] (5) REC[0xe9230000]: Epoch #1 ready 227s [gnutls] (4) HSK[0xe9230000]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Sending extension Record Size Limit/28 (2 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Key Share/51) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (SRTP/14) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (ALPN/16) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Sending extension ALPN/16 (6 bytes) 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Cookie/44) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Early Data/42) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 227s [gnutls] (4) EXT[0xe9230000]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 227s [gnutls] (4) HSK[0xe9230000]: ENCRYPTED EXTENSIONS was queued [22 bytes] 227s [gnutls] (4) HSK[0xe9230000]: CERTIFICATE was queued [1155 bytes] 227s [gnutls] (4) checking cert compat with RSA-SHA256 227s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 227s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 227s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 227s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 227s [gnutls] (4) HSK[0xe9230000]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 227s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 227s [gnutls] (4) HSK[0xe9230000]: CERTIFICATE VERIFY was queued [392 bytes] 227s [gnutls] (4) HSK[0xe9230000]: sending finished 227s [gnutls] (4) HSK[0xe9230000]: FINISHED was queued [52 bytes] 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 22 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[1] Handshake(22) in epoch 1 and length: 44 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 1155 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[2] Handshake(22) in epoch 1 and length: 1177 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 392 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[3] Handshake(22) in epoch 1 and length: 414 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[4] Handshake(22) in epoch 1 and length: 74 227s [gnutls] (3) ASSERT: ../../lib/constate.c[_gnutls_epoch_get]:965 227s [gnutls] (5) REC[0xe9230000]: Allocating epoch #2 227s [gnutls] (4) HSK[0xe9230000]: unauthenticated session eligible for early start 227s [gnutls] (5) REC[0xe9230000]: Initializing epoch #2 227s [gnutls] (5) REC[0xe9230000]: Epoch #2 ready 227s [gnutls] (4) HSK[0xe9230000]: TLS 1.3 set write key with cipher suite: GNUTLS_AES_256_GCM_SHA384 227s [gnutls] (4) HSK[0xe9230000]: switching early to application traffic keys 227s [gnutls] (4) HSK[0xe9230000]: NEW SESSION TICKET was queued [251 bytes] 227s [gnutls] (4) HSK[0xe9230000]: NEW SESSION TICKET was queued [251 bytes] 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[1] Handshake(22) in epoch 2 and length: 273 227s [gnutls] (5) REC[0xe9230000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 227s [gnutls] (5) REC[0xe9230000]: Sent Packet[2] Handshake(22) in epoch 2 and length: 273 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 227s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 227s [select][65538.03] => id: '22567' noting selection error: 'G.ROOT-SERVERS.NET.'@'192.112.36.4#00053' zone cut: '.' error: 1 QUERY_TIMEOUT 227s [iterat][65536.05] '.' type 'DNSKEY' new uid was assigned .06, parent uid .02 227s [select][65536.06] => id: '24391' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 227s [select][65536.06] => id: '24391' choosing: 'F.ROOT-SERVERS.NET.'@'2001:500:2f::f#00053' with timeout 800 ms zone cut: '.' 227s [resolv][65536.06] => id: '24391' querying: 'F.ROOT-SERVERS.NET.'@'2001:500:2f::f#00053' zone cut: '.' qname: '.' qtype: 'DNSKEY' proto: 'udp' 227s [iterat][65538.03] '.' type 'DNSKEY' new uid was assigned .04, parent uid .00 227s [select][65538.04] => id: '09555' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 227s [select][65538.04] => id: '09555' choosing: 'H.ROOT-SERVERS.NET.'@'2001:500:1::53#00053' with timeout 800 ms zone cut: '.' 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 227s [gnutls] (5) REC[0xe9230000]: SSL 3.3 ChangeCipherSpec packet received. Epoch 1, length: 1 227s [gnutls] (5) REC[0xe9230000]: Expected Packet Handshake(22) 227s [gnutls] (5) REC[0xe9230000]: Received Packet ChangeCipherSpec(20) with length: 1 227s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 227s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 227s [io ] => connection to '127.0.0.1#39021' closed by peer (connection reset by peer) 227s [gnutls] (5) REC[0xe9230000]: Start of epoch cleanup 227s [gnutls] (5) REC[0xe9230000]: Epoch #0 freed 227s [gnutls] (5) REC[0xe9230000]: End of epoch cleanup 227s [gnutls] (5) REC[0xe9230000]: Epoch #1 freed 227s [gnutls] (5) REC[0xe9230000]: Epoch #2 freed 227s > 228s > autopkgtest [19:21:26]: test roundtrip: -----------------------] 232s autopkgtest [19:21:30]: test roundtrip: - - - - - - - - - - results - - - - - - - - - - 232s roundtrip PASS 242s autopkgtest [19:21:40]: @@@@@@@@@@@@@@@@@@@@ summary 242s roundtrip PASS