0s autopkgtest [18:24:44]: starting date and time: 2025-05-02 18:24:44+0000 0s autopkgtest [18:24:44]: git checkout: 9986aa8c Merge branch 'skia/fix_network_interface' into 'ubuntu/production' 0s autopkgtest [18:24:44]: host juju-7f2275-prod-proposed-migration-environment-15; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.e3_gfl3a/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:socat --apt-upgrade knot-resolver --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=socat/1.8.0.3-1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-arm64 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-15@sto01-arm64-9.secgroup --name adt-questing-arm64-knot-resolver-20250502-182444-juju-7f2275-prod-proposed-migration-environment-15-65995fb4-0891-460a-be3b-24b197ffd29e --image adt/ubuntu-questing-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-15 --net-id=net_prod-autopkgtest-workers-arm64 -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 91s autopkgtest [18:26:15]: testbed dpkg architecture: arm64 91s autopkgtest [18:26:15]: testbed apt version: 3.0.0 91s autopkgtest [18:26:15]: @@@@@@@@@@@@@@@@@@@@ test bed setup 91s autopkgtest [18:26:15]: testbed release detected to be: None 92s autopkgtest [18:26:16]: updating testbed package index (apt update) 92s Get:1 http://ftpmaster.internal/ubuntu questing-proposed InRelease [110 kB] 92s Hit:2 http://ftpmaster.internal/ubuntu questing InRelease 92s Hit:3 http://ftpmaster.internal/ubuntu questing-updates InRelease 92s Hit:4 http://ftpmaster.internal/ubuntu questing-security InRelease 92s Get:5 http://ftpmaster.internal/ubuntu questing-proposed/main Sources [170 kB] 92s Get:6 http://ftpmaster.internal/ubuntu questing-proposed/universe Sources [2005 kB] 93s Get:7 http://ftpmaster.internal/ubuntu questing-proposed/multiverse Sources [43.1 kB] 93s Get:8 http://ftpmaster.internal/ubuntu questing-proposed/main arm64 Packages [221 kB] 93s Get:9 http://ftpmaster.internal/ubuntu questing-proposed/universe arm64 Packages [1507 kB] 93s Get:10 http://ftpmaster.internal/ubuntu questing-proposed/multiverse arm64 Packages [14.3 kB] 93s Fetched 4071 kB in 1s (6823 kB/s) 94s Reading package lists... 94s autopkgtest [18:26:18]: upgrading testbed (apt dist-upgrade and autopurge) 94s Reading package lists... 95s Building dependency tree... 95s Reading state information... 95s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 95s Starting 2 pkgProblemResolver with broken count: 0 95s Done 96s Entering ResolveByKeep 96s 96s Calculating upgrade... 97s The following packages will be upgraded: 97s libperl5.40 perl perl-base perl-modules-5.40 97s 4 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 97s Need to get 10.0 MB of archives. 97s After this operation, 0 B of additional disk space will be used. 97s Get:1 http://ftpmaster.internal/ubuntu questing-proposed/main arm64 libperl5.40 arm64 5.40.1-3 [4780 kB] 97s Get:2 http://ftpmaster.internal/ubuntu questing-proposed/main arm64 perl arm64 5.40.1-3 [262 kB] 97s Get:3 http://ftpmaster.internal/ubuntu questing-proposed/main arm64 perl-base arm64 5.40.1-3 [1786 kB] 97s Get:4 http://ftpmaster.internal/ubuntu questing-proposed/main arm64 perl-modules-5.40 all 5.40.1-3 [3217 kB] 97s Fetched 10.0 MB in 0s (43.2 MB/s) 98s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 85225 files and directories currently installed.) 98s Preparing to unpack .../libperl5.40_5.40.1-3_arm64.deb ... 98s Unpacking libperl5.40:arm64 (5.40.1-3) over (5.40.1-2ubuntu0.1) ... 98s Preparing to unpack .../perl_5.40.1-3_arm64.deb ... 98s Unpacking perl (5.40.1-3) over (5.40.1-2ubuntu0.1) ... 98s Preparing to unpack .../perl-base_5.40.1-3_arm64.deb ... 98s Unpacking perl-base (5.40.1-3) over (5.40.1-2ubuntu0.1) ... 98s Setting up perl-base (5.40.1-3) ... 98s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 85225 files and directories currently installed.) 98s Preparing to unpack .../perl-modules-5.40_5.40.1-3_all.deb ... 98s Unpacking perl-modules-5.40 (5.40.1-3) over (5.40.1-2ubuntu0.1) ... 98s Setting up perl-modules-5.40 (5.40.1-3) ... 98s Setting up libperl5.40:arm64 (5.40.1-3) ... 98s Setting up perl (5.40.1-3) ... 98s Processing triggers for man-db (2.13.0-1) ... 99s Processing triggers for libc-bin (2.41-6ubuntu1) ... 99s Reading package lists... 100s Building dependency tree... 100s Reading state information... 100s Starting pkgProblemResolver with broken count: 0 100s Starting 2 pkgProblemResolver with broken count: 0 100s Done 100s Solving dependencies... 101s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 103s autopkgtest [18:26:27]: testbed running kernel: Linux 6.14.0-15-generic #15-Ubuntu SMP PREEMPT_DYNAMIC Sun Apr 6 14:37:51 UTC 2025 103s autopkgtest [18:26:27]: @@@@@@@@@@@@@@@@@@@@ apt-source knot-resolver 105s Get:1 http://ftpmaster.internal/ubuntu questing/universe knot-resolver 5.7.4-2build1 (dsc) [3202 B] 105s Get:2 http://ftpmaster.internal/ubuntu questing/universe knot-resolver 5.7.4-2build1 (tar) [1931 kB] 105s Get:3 http://ftpmaster.internal/ubuntu questing/universe knot-resolver 5.7.4-2build1 (asc) [833 B] 105s Get:4 http://ftpmaster.internal/ubuntu questing/universe knot-resolver 5.7.4-2build1 (diff) [402 kB] 105s gpgv: Signature made Tue Nov 12 20:24:39 2024 UTC 105s gpgv: using RSA key B8340990283D8D9BC1949AC74799A35146D12B35 105s gpgv: Can't check signature: No public key 105s dpkg-source: warning: cannot verify inline signature for ./knot-resolver_5.7.4-2build1.dsc: no acceptable signature found 106s autopkgtest [18:26:30]: testing package knot-resolver version 5.7.4-2build1 106s autopkgtest [18:26:30]: build not needed 107s autopkgtest [18:26:31]: test roundtrip: preparing testbed 107s Reading package lists... 107s Building dependency tree... 107s Reading state information... 108s Starting pkgProblemResolver with broken count: 0 108s Starting 2 pkgProblemResolver with broken count: 0 108s Done 109s The following NEW packages will be installed: 109s dns-root-data gnutls-bin knot-dnsutils knot-resolver libdnssec9t64 109s libevent-2.1-7t64 libfstrm0 libgnutls-dane0t64 libknot15 libluajit-5.1-2 109s libluajit-5.1-common libngtcp2-16 libngtcp2-crypto-gnutls8 libunbound8 109s libxdp1 libzscanner4t64 lua-sec lua-socket socat 109s 0 upgraded, 19 newly installed, 0 to remove and 0 not upgraded. 109s Need to get 2689 kB of archives. 109s After this operation, 11.6 MB of additional disk space will be used. 109s Get:1 http://ftpmaster.internal/ubuntu questing/main arm64 dns-root-data all 2024071801 [5802 B] 109s Get:2 http://ftpmaster.internal/ubuntu questing/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10 [140 kB] 109s Get:3 http://ftpmaster.internal/ubuntu questing/main arm64 libunbound8 arm64 1.22.0-1ubuntu1 [437 kB] 109s Get:4 http://ftpmaster.internal/ubuntu questing/main arm64 libgnutls-dane0t64 arm64 3.8.9-2ubuntu3 [24.4 kB] 109s Get:5 http://ftpmaster.internal/ubuntu questing/universe arm64 gnutls-bin arm64 3.8.9-2ubuntu3 [271 kB] 109s Get:6 http://ftpmaster.internal/ubuntu questing/universe arm64 libdnssec9t64 arm64 3.4.4-1 [31.1 kB] 109s Get:7 http://ftpmaster.internal/ubuntu questing/universe arm64 libngtcp2-16 arm64 1.11.0-1 [123 kB] 109s Get:8 http://ftpmaster.internal/ubuntu questing/universe arm64 libngtcp2-crypto-gnutls8 arm64 1.11.0-1 [16.8 kB] 109s Get:9 http://ftpmaster.internal/ubuntu questing/main arm64 libxdp1 arm64 1.5.1-1ubuntu2 [61.1 kB] 109s Get:10 http://ftpmaster.internal/ubuntu questing/universe arm64 libknot15 arm64 3.4.4-1 [114 kB] 109s Get:11 http://ftpmaster.internal/ubuntu questing/universe arm64 libzscanner4t64 arm64 3.4.4-1 [137 kB] 109s Get:12 http://ftpmaster.internal/ubuntu questing/universe arm64 libfstrm0 arm64 0.6.1-1build4 [20.6 kB] 109s Get:13 http://ftpmaster.internal/ubuntu questing/universe arm64 knot-dnsutils arm64 3.4.4-1 [123 kB] 109s Get:14 http://ftpmaster.internal/ubuntu questing/universe arm64 lua-socket arm64 3.1.0-1 [88.9 kB] 109s Get:15 http://ftpmaster.internal/ubuntu questing/universe arm64 lua-sec arm64 1.3.2-2 [43.5 kB] 109s Get:16 http://ftpmaster.internal/ubuntu questing/universe arm64 libluajit-5.1-common all 2.1.0+openresty20250117-2 [54.4 kB] 109s Get:17 http://ftpmaster.internal/ubuntu questing/universe arm64 libluajit-5.1-2 arm64 2.1.0+openresty20250117-2 [278 kB] 109s Get:18 http://ftpmaster.internal/ubuntu questing/universe arm64 knot-resolver arm64 5.7.4-2build1 [332 kB] 109s Get:19 http://ftpmaster.internal/ubuntu questing-proposed/main arm64 socat arm64 1.8.0.3-1 [388 kB] 109s Preconfiguring packages ... 109s Fetched 2689 kB in 0s (38.4 MB/s) 109s Selecting previously unselected package dns-root-data. 109s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 85225 files and directories currently installed.) 109s Preparing to unpack .../00-dns-root-data_2024071801_all.deb ... 109s Unpacking dns-root-data (2024071801) ... 109s Selecting previously unselected package libevent-2.1-7t64:arm64. 109s Preparing to unpack .../01-libevent-2.1-7t64_2.1.12-stable-10_arm64.deb ... 109s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 109s Selecting previously unselected package libunbound8:arm64. 109s Preparing to unpack .../02-libunbound8_1.22.0-1ubuntu1_arm64.deb ... 109s Unpacking libunbound8:arm64 (1.22.0-1ubuntu1) ... 109s Selecting previously unselected package libgnutls-dane0t64:arm64. 109s Preparing to unpack .../03-libgnutls-dane0t64_3.8.9-2ubuntu3_arm64.deb ... 109s Unpacking libgnutls-dane0t64:arm64 (3.8.9-2ubuntu3) ... 109s Selecting previously unselected package gnutls-bin. 109s Preparing to unpack .../04-gnutls-bin_3.8.9-2ubuntu3_arm64.deb ... 109s Unpacking gnutls-bin (3.8.9-2ubuntu3) ... 109s Selecting previously unselected package libdnssec9t64. 109s Preparing to unpack .../05-libdnssec9t64_3.4.4-1_arm64.deb ... 109s Unpacking libdnssec9t64 (3.4.4-1) ... 109s Selecting previously unselected package libngtcp2-16:arm64. 109s Preparing to unpack .../06-libngtcp2-16_1.11.0-1_arm64.deb ... 109s Unpacking libngtcp2-16:arm64 (1.11.0-1) ... 109s Selecting previously unselected package libngtcp2-crypto-gnutls8:arm64. 109s Preparing to unpack .../07-libngtcp2-crypto-gnutls8_1.11.0-1_arm64.deb ... 109s Unpacking libngtcp2-crypto-gnutls8:arm64 (1.11.0-1) ... 109s Selecting previously unselected package libxdp1:arm64. 109s Preparing to unpack .../08-libxdp1_1.5.1-1ubuntu2_arm64.deb ... 109s Unpacking libxdp1:arm64 (1.5.1-1ubuntu2) ... 109s Selecting previously unselected package libknot15. 109s Preparing to unpack .../09-libknot15_3.4.4-1_arm64.deb ... 109s Unpacking libknot15 (3.4.4-1) ... 109s Selecting previously unselected package libzscanner4t64. 109s Preparing to unpack .../10-libzscanner4t64_3.4.4-1_arm64.deb ... 109s Unpacking libzscanner4t64 (3.4.4-1) ... 109s Selecting previously unselected package libfstrm0:arm64. 109s Preparing to unpack .../11-libfstrm0_0.6.1-1build4_arm64.deb ... 109s Unpacking libfstrm0:arm64 (0.6.1-1build4) ... 109s Selecting previously unselected package knot-dnsutils. 109s Preparing to unpack .../12-knot-dnsutils_3.4.4-1_arm64.deb ... 109s Unpacking knot-dnsutils (3.4.4-1) ... 109s Selecting previously unselected package lua-socket:arm64. 109s Preparing to unpack .../13-lua-socket_3.1.0-1_arm64.deb ... 109s Unpacking lua-socket:arm64 (3.1.0-1) ... 110s Selecting previously unselected package lua-sec:arm64. 110s Preparing to unpack .../14-lua-sec_1.3.2-2_arm64.deb ... 110s Unpacking lua-sec:arm64 (1.3.2-2) ... 110s Selecting previously unselected package libluajit-5.1-common. 110s Preparing to unpack .../15-libluajit-5.1-common_2.1.0+openresty20250117-2_all.deb ... 110s Unpacking libluajit-5.1-common (2.1.0+openresty20250117-2) ... 110s Selecting previously unselected package libluajit-5.1-2:arm64. 110s Preparing to unpack .../16-libluajit-5.1-2_2.1.0+openresty20250117-2_arm64.deb ... 110s Unpacking libluajit-5.1-2:arm64 (2.1.0+openresty20250117-2) ... 110s Selecting previously unselected package knot-resolver. 110s Preparing to unpack .../17-knot-resolver_5.7.4-2build1_arm64.deb ... 110s Unpacking knot-resolver (5.7.4-2build1) ... 110s Selecting previously unselected package socat. 110s Preparing to unpack .../18-socat_1.8.0.3-1_arm64.deb ... 110s Unpacking socat (1.8.0.3-1) ... 110s Setting up libzscanner4t64 (3.4.4-1) ... 110s Setting up libfstrm0:arm64 (0.6.1-1build4) ... 110s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 110s Setting up lua-socket:arm64 (3.1.0-1) ... 110s Setting up dns-root-data (2024071801) ... 110s Setting up libxdp1:arm64 (1.5.1-1ubuntu2) ... 110s Setting up libunbound8:arm64 (1.22.0-1ubuntu1) ... 110s Setting up libgnutls-dane0t64:arm64 (3.8.9-2ubuntu3) ... 110s Setting up socat (1.8.0.3-1) ... 110s Setting up libdnssec9t64 (3.4.4-1) ... 110s Setting up libluajit-5.1-common (2.1.0+openresty20250117-2) ... 110s Setting up libngtcp2-16:arm64 (1.11.0-1) ... 110s Setting up libngtcp2-crypto-gnutls8:arm64 (1.11.0-1) ... 110s Setting up gnutls-bin (3.8.9-2ubuntu3) ... 110s Setting up lua-sec:arm64 (1.3.2-2) ... 110s Setting up libknot15 (3.4.4-1) ... 110s Setting up libluajit-5.1-2:arm64 (2.1.0+openresty20250117-2) ... 110s Setting up knot-resolver (5.7.4-2build1) ... 110s Created symlink '/etc/systemd/system/kresd.target.wants/kres-cache-gc.service' → '/usr/lib/systemd/system/kres-cache-gc.service'. 110s Created symlink '/etc/systemd/system/multi-user.target.wants/kresd.target' → '/usr/lib/systemd/system/kresd.target'. 111s Setting up knot-dnsutils (3.4.4-1) ... 111s Processing triggers for man-db (2.13.0-1) ... 111s Processing triggers for libc-bin (2.41-6ubuntu1) ... 112s autopkgtest [18:26:36]: test roundtrip: [----------------------- 112s /usr/sbin/kresd + /usr/bin/kdig roundtrip tests 112s ------------ 112s workdir: /tmp/autopkgtest.H2Kocq/roundtrip-artifacts 112s IP addr: 127.178.174.191 112s kresd args: --addr=127.178.174.191@8053 --tls=127.178.174.191@8853 --noninteractive --config=/tmp/autopkgtest.H2Kocq/roundtrip-artifacts/kresd.conf --verbose --verbose --verbose 112s 112s make Certificate Authority key and certificate 112s ---------------------------------------------- 113s Generating a 3072 bit RSA private key... 113s Generating a self signed certificate... 113s X.509 Certificate Information: 113s Version: 3 113s Serial Number (hex): 53693a8f891a1af9978a00e72145d2d638d647c8 113s Validity: 113s Not Before: Fri May 02 18:26:36 UTC 2025 113s Not After: Wed May 14 18:26:36 UTC 2025 113s Subject: CN=testing certificate authority (NOT FOR PRODUCTION) 113s Subject Public Key Algorithm: RSA 113s Algorithm Security Level: High (3072 bits) 113s Modulus (bits 3072): 113s 00:c9:31:d2:a2:63:a1:5e:3e:cb:8f:fb:23:4b:8a:fa 113s ed:42:15:83:c1:91:a2:e8:6d:c3:43:e3:00:82:e7:08 113s 44:c6:9a:7f:89:27:89:0a:df:21:a1:a5:09:2a:92:74 113s 95:57:6c:17:53:0e:0d:f4:c4:a5:44:8a:c3:cd:3e:64 113s b6:d4:02:36:45:14:4f:f4:99:42:ad:62:7c:14:70:a2 113s fe:31:29:b7:0b:09:8d:05:0f:90:01:c1:cd:d0:52:18 113s 29:a3:f8:84:49:9c:63:17:5d:eb:3f:05:19:5b:b6:4b 113s 00:a6:69:0c:fc:38:fc:89:a6:5f:da:20:06:57:ed:2a 113s 3a:d4:9d:dc:1c:c3:e5:1c:9c:cb:1d:a4:79:7c:dc:b7 113s ad:2f:ec:64:5a:ff:db:37:70:b4:20:06:aa:43:06:63 113s 36:ff:31:2a:0f:3b:9a:4f:34:f8:49:29:31:7d:da:49 113s 4c:70:8e:08:12:a5:f5:47:db:d9:49:cb:33:f7:5e:37 113s a2:33:a3:d2:23:cb:65:20:0a:dc:3b:d7:7c:5d:50:73 113s 93:7f:01:5d:c0:6b:1a:1b:e4:73:fb:6a:74:65:b0:b1 113s 8f:55:7f:c7:49:f9:6f:36:23:f0:e2:13:07:5f:a4:63 113s 59:e8:f7:75:5b:51:21:81:3a:3d:5a:9a:89:17:d4:49 113s 82:f0:a8:46:2d:c9:39:fb:0e:14:74:e5:0e:23:58:14 113s 71:ff:e3:3c:6e:69:13:38:7d:2f:90:ea:47:49:b2:e7 113s 1e:e4:9a:c3:59:62:e5:10:1f:80:07:2a:cd:21:65:01 113s 11:bb:d2:97:3c:79:af:32:c1:f3:dc:ed:db:63:87:93 113s a2:6f:89:b8:ab:96:c3:c7:3b:fd:c6:4d:f1:77:4a:82 113s 25:bf:77:7f:36:56:4f:2a:49:8b:70:c9:1b:3a:41:f4 113s 0e:b9:d0:09:ed:a9:c3:97:16:01:07:d7:11:09:44:64 113s 3c:43:2b:a7:6e:ae:8e:9d:ac:7f:1b:b4:06:ee:9d:9e 113s 9f 113s Exponent (bits 24): 113s 01:00:01 113s Extensions: 113s Basic Constraints (critical): 113s Certificate Authority (CA): TRUE 113s Path Length Constraint: 1 113s Name Constraints (critical): 113s Permitted: 113s DNSname: example 113s Key Usage (critical): 113s Certificate signing. 113s Subject Key Identifier (not critical): 113s fc9b2cf6a82d6dce4fa648be12412703e6f1a8f2 113s Other Information: 113s Public Key ID: 113s sha1:fc9b2cf6a82d6dce4fa648be12412703e6f1a8f2 113s sha256:8dbace7bb34c5a37147388b9cfd43e950e712df71276166f4b245cb1cf602e5f 113s Public Key PIN: 113s pin-sha256:jbrOe7NMWjcUc4i5z9Q+lQ5xLfcSdhZvSyRcsc9gLl8= 113s 113s 113s 113s Signing certificate... 113s 113s make Bogus Certificate Authority key and certificate 113s ---------------------------------------------------- 114s Generating a 3072 bit RSA private key... 114s Generating a self signed certificate... 114s X.509 Certificate Information: 114s Version: 3 114s Serial Number (hex): 7b66c7b91b51cff44906bd0168df339903c3c200 114s Validity: 114s Not Before: Fri May 02 18:26:38 UTC 2025 114s Not After: Wed May 14 18:26:38 UTC 2025 114s Subject: CN=testing certificate authority (NOT FOR PRODUCTION) 114s Subject Public Key Algorithm: RSA 114s Algorithm Security Level: High (3072 bits) 114s Modulus (bits 3072): 114s 00:ce:20:f2:0a:68:0e:c6:79:62:54:61:cd:fe:68:86 114s c3:f3:4e:c4:21:22:ef:62:1e:75:36:d9:7b:35:30:49 114s e1:44:0a:1f:d5:88:73:02:2f:17:95:de:3a:ea:2e:06 114s 43:f8:f6:7f:b9:4f:ab:ea:15:94:ee:53:e0:5b:89:0e 114s ad:b1:d9:2a:a8:3e:4f:d1:40:12:8f:65:11:ee:4f:86 114s f0:53:1e:cc:68:1f:5d:f0:14:84:f5:ba:e5:5c:49:b6 114s 95:8b:e3:d6:18:06:cf:8b:f2:a7:a2:bf:c5:a0:d9:ba 114s 80:ce:43:de:d8:0d:5b:b8:aa:74:bb:15:9f:a5:66:fc 114s 7a:6c:b6:40:8b:88:43:f3:39:55:c6:ee:fc:30:13:a7 114s f3:4a:2a:12:f3:32:0c:94:45:32:3a:da:c9:00:9d:2d 114s b8:1f:68:1b:13:ec:41:c7:51:55:42:6d:12:8e:37:67 114s 76:4c:27:b2:1d:7e:dc:7d:06:29:89:68:8b:8a:3a:75 114s 6d:c2:61:e9:72:24:24:ed:49:07:5b:74:20:13:fd:5a 114s 03:d8:8d:d8:74:a7:23:91:8e:40:99:9d:95:59:4e:a1 114s 12:2c:3d:2f:ff:78:3f:ac:29:f1:0f:17:e6:ae:0d:7b 114s 9d:25:a7:e2:ca:d9:32:2b:73:37:c2:df:6a:04:b3:4c 114s ca:39:95:93:fd:5b:25:cc:5f:b5:09:0e:f2:a8:6d:14 114s 00:a9:2b:02:99:a9:5c:90:97:f5:e5:2d:7f:a2:31:49 114s cb:9f:8e:d4:8f:c3:35:b2:7a:5a:9c:14:ad:3f:b9:80 114s 6f:9e:c8:cc:88:4f:96:e7:cc:93:63:ec:8e:b3:74:61 114s 6f:5d:31:4f:1f:c4:fb:bd:67:94:e7:c0:2d:8b:fd:7d 114s 94:08:52:05:05:c0:e2:57:22:00:7a:8b:8a:08:09:2a 114s 4e:26:03:c2:d3:19:8b:ad:28:be:de:28:61:25:44:15 114s 47:3c:ab:dd:47:df:48:da:ae:fb:28:28:26:78:9c:06 114s 79 114s Exponent (bits 24): 114s 01:00:01 114s Extensions: 114s Basic Constraints (critical): 114s Certificate Authority (CA): TRUE 114s Path Length Constraint: 1 114s Name Constraints (critical): 114s Permitted: 114s DNSname: example 114s Key Usage (critical): 114s Certificate signing. 114s Subject Key Identifier (not critical): 114s 9c1a9503966fd587bab564878e7926eb58bb7d00 114s Other Information: 114s Public Key ID: 114s sha1:9c1a9503966fd587bab564878e7926eb58bb7d00 114s sha256:a5e85e76bd96c7d78ec701dbbb0c5d02e9eaa09006929ac198edc17d8b54d691 114s Public Key PIN: 114s pin-sha256:pehedr2Wx9eOxwHbuwxdAunqoJAGkprBmO3BfYtU1pE= 114s 114s 114s 114s Signing certificate... 114s 114s make End Entity key and certificate 114s ----------------------------------- 115s Generating a 3072 bit RSA private key... 115s Generating a signed certificate... 115s X.509 Certificate Information: 115s Version: 3 115s Serial Number (hex): 04af8bc0c5a1fb03b20a1d83f03f2412074cb150 115s Validity: 115s Not Before: Fri May 02 18:26:38 UTC 2025 115s Not After: Mon May 12 18:26:38 UTC 2025 115s Subject: CN=test.example 115s Subject Public Key Algorithm: RSA 115s Algorithm Security Level: High (3072 bits) 115s Modulus (bits 3072): 115s 00:b1:33:b4:10:79:3e:62:a1:22:68:1e:c6:b9:17:e0 115s 77:3f:28:ae:c0:5f:cf:4b:ec:5f:41:bb:c1:75:e1:80 115s de:3a:dc:9b:6b:2e:4f:25:68:ca:11:d8:04:4d:67:75 115s d8:7f:f1:1d:81:6c:94:f2:12:f2:b3:c5:bf:d9:5f:c0 115s 00:32:31:24:9a:8b:0d:b9:52:b1:bd:c8:d7:2d:95:2b 115s b2:2d:db:62:c1:71:26:4f:5c:b0:9f:36:38:d7:b3:33 115s 72:71:13:8c:ca:8c:0f:13:01:97:48:e9:6d:6c:9c:c1 115s b0:8b:a7:65:b9:6f:4a:31:07:e4:76:94:6b:49:da:68 115s 0e:76:a8:e2:f1:ab:1d:94:06:69:3e:e1:b5:ef:c1:a2 115s 4b:e4:1c:1a:82:a9:eb:45:ba:55:f4:6d:75:df:6c:eb 115s d6:c7:61:64:05:10:6e:d4:51:08:cf:8c:92:71:c1:1f 115s 43:d3:87:9a:46:e6:38:34:1f:f6:49:b6:27:34:8a:ef 115s 01:23:8e:0f:a5:f9:d4:ed:7c:d9:96:55:6e:8e:6b:87 115s ab:36:da:d0:0a:fd:f8:79:d8:f9:1b:85:f2:be:b2:45 115s 9a:a9:80:2e:13:66:7e:dc:ec:8b:5e:f3:69:ad:ad:62 115s 2c:4b:91:ab:ea:a7:99:53:40:92:85:57:ce:7b:ad:68 115s 29:4b:43:42:5c:ae:bf:ba:9d:ae:b5:76:67:36:7d:7e 115s c1:fd:e1:cf:8c:7a:39:57:8e:14:74:5b:d1:b3:d1:48 115s 60:b5:20:63:54:00:16:f6:49:c6:d3:c2:8d:4e:ec:47 115s 4f:8f:9d:35:24:13:a1:41:84:42:35:da:5d:db:6a:cd 115s 5c:ed:44:38:91:0d:d8:e8:b3:8e:23:86:2f:0c:0e:2d 115s 48:58:c8:e6:f9:d9:d0:a9:42:64:d6:a9:1b:1b:5d:37 115s 07:b3:4b:ae:38:33:07:b6:d2:b3:ae:2f:c9:5a:1c:f0 115s c2:f7:4a:cd:aa:cf:12:52:e4:1b:b5:32:ec:c2:07:8a 115s 57 115s Exponent (bits 24): 115s 01:00:01 115s Extensions: 115s Basic Constraints (critical): 115s Certificate Authority (CA): FALSE 115s Subject Alternative Name (not critical): 115s DNSname: test.example 115s Key Purpose (not critical): 115s TLS WWW Server. 115s Key Usage (critical): 115s Digital signature. 115s Subject Key Identifier (not critical): 115s ccc4b549797a7f6374a1fc6ec10621971d52e9e0 115s Authority Key Identifier (not critical): 115s fc9b2cf6a82d6dce4fa648be12412703e6f1a8f2 115s Other Information: 115s Public Key ID: 115s sha1:ccc4b549797a7f6374a1fc6ec10621971d52e9e0 115s sha256:7cf65c19de91399c72f4e436c00c8448d72c399fce9c8852678c6d4874428d8a 115s Public Key PIN: 115s pin-sha256:fPZcGd6ROZxy9OQ2wAyESNcsOZ/OnIhSZ4xtSHRCjYo= 115s 115s 115s 115s Signing certificate... 115s 115s set up kresd daemon on 127.178.174.191 on ports 8053 (UDP, TCP) and 8853 (TLS) 115s ------------------------------------------------------------------------------ 116s 116s test UDP with kdig 116s ------------------ 116s successful UDP request to 127.178.174.191 on port 8053 116s 116s test TCP with kdig 116s ------------------ 116s successful TCP request to 127.178.174.191 on port 8053 116s 116s test opportunistic DNS-over-TLS with kdig 116s ----------------------------------------- 116s successful opportunistic DNS-over-TLS request to 127.178.174.191 on port 8853 116s 116s test strict DNS-over-TLS with kdig 116s ---------------------------------- 116s successful strict DNS-over-TLS request to 127.178.174.191 on port 8853 116s 116s test invalid name with strict DNS-over-TLS with kdig 116s ---------------------------------------------------- 116s successful strict DNS-over-TLS request failure when name mismatch to 127.178.174.191 on port 8853 116s 116s test bad authority with strict DNS-over-TLS with kdig 116s ----------------------------------------------------- 116s successful strict DNS-over-TLS request failure to 127.178.174.191 on port 8853 116s 116s cleaning up 116s ----------- 116s 276067 4 drwxrwxrwt 2 root root 4096 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts 116s 276078 4 -rw-r--r-- 1 root root 1590 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/bogus-cert.pem 116s 276435 72 -rw-r--r-- 1 root root 70955 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/kresd.err 116s 276079 4 -rw-r--r-- 1 root root 92 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/ee.template 116s 276080 8 -rw------- 1 root root 8183 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/ee-key.pem 116s 276334 4 -rw-r--r-- 1 root root 1602 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/ee-cert.pem 116s 276437 102400 -rw-r----- 1 root root 104857600 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/data.mdb 116s 276436 4 -rw-r----- 1 root root 8256 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/lock.mdb 116s 276439 4 -rw-r--r-- 1 root root 121 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/badca.err 116s 276081 4 -rw-r--r-- 1 root root 2218 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/ee-pubkey.pem 116s 276074 4 -rw-r--r-- 1 root root 136 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/ca.template 116s 276438 4 -rw-r--r-- 1 root root 121 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/badname.err 116s 276077 8 -rw------- 1 root root 8177 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/bogus-key.pem 116s 276434 4 -rw-r--r-- 1 root root 387 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/kresd.conf 116s 276075 8 -rw------- 1 root root 8180 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/ca-key.pem 116s 276076 4 -rw-r--r-- 1 root root 1590 May 2 18:26 /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/ca-cert.pem 116s ==> /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/badca.err <== 116s ;; WARNING: TLS, handshake failed (Error in the certificate.) 116s ;; ERROR: failed to query server 127.178.174.191@8853(TCP) 116s 116s ==> /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/badname.err <== 116s ;; WARNING: TLS, handshake failed (Error in the certificate.) 116s ;; ERROR: failed to query server 127.178.174.191@8853(TCP) 116s 116s ==> /tmp/autopkgtest.H2Kocq/roundtrip-artifacts/kresd.err <== 116s [system] increasing file-descriptor limit: 1024 -> 1073741816 116s [tls ] session ticket: epoch 426320, scheduling rotation check in 417050 ms 116s [wtchdg] disabled in systemd (WatchdogSec= not specified) 116s [ta ] installed trust anchors for domain . are: 116s . 3600 DNSKEY 257 3 8 AwEAAaz/tAm8yTn4Mfeh5eyI96WSVexTBAvkMgJzkKTOiW1vkIbzxeF3+/4RgWOq7HrxRixHlFlExOLAJr5emLvN7SWXgnLh4+B5xQlNVz8Og8kvArMtNROxVQuCaSnIDdD5LKyWbRd2n9WGe2R8PzgCmr3EgVLrjyBxWezF0jLHwVN8efS3rCj/EWgvIWgb9tarpVUDK/b58Da+sqqls3eNbuv7pr+eoZG+SrDK6nWeL3c6H5Apxz7LjVc1uTIdsIXxuOLYA4/ilBmSVIzuDWfdRUfhHdY6+cn8HFRm+2hM8AnXGXws9555KrUB5qihylGa8subX2Nn6UwNR1AkUTV74bU= ; Valid: ; KeyTag:20326 116s . 3600 DNSKEY 257 3 8 AwEAAa96jeuknZlaeSrvyAJj6ZHv28hhOKkx3rLGXVaC6rXTsDc449/cidltpkyGwCJNnOAlFNKF2jBosZBU5eeHspaQWOmOElZsjICMQMC3aeHbGiShvZsx4wMYSjH8e7Vrhbu6irwCzVBApESjbUdpWWmEnhathWu1jo+siFUiRAAxm9qyJNg/wOZqqzL/dL/q8PkcRU5oUKEpUge71M3ej2/7CPqpdVwuMoTvoB+ZOT4YeGyxMvHmbrxlFzGOHOijtzN+u1TQNatX2XBuzZNQ1K+s2CXkPIZo7s6JgZyvaBevYtxPvYLw4z9mR7K2vaF18UYH9Z9GNUUeayffKC73PYc= ; Valid: ; KeyTag:38696 116s 116s [system] loading config '/tmp/autopkgtest.H2Kocq/roundtrip-artifacts/kresd.conf' (workdir '/tmp/autopkgtest.H2Kocq/roundtrip-artifacts') 116s [system] deprecation WARNING: use log_level() instead of verbose() 116s [gnutls] (3) ASSERT: ../../../lib/x509/dn.c[_gnutls_x509_compare_raw_dn]:974 116s [gnutls] (3) ASSERT: ../../../lib/x509/dn.c[_gnutls_x509_compare_raw_dn]:974 116s [gnutls] (3) ASSERT: ../../../lib/x509/x509_ext.c[gnutls_subject_alt_names_get]:107 116s [gnutls] (3) ASSERT: ../../../lib/x509/x509.c[get_alt_name]:2012 116s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 116s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 116s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 116s [tls ] RFC 7858 OOB key-pin (0): pin-sha256="" 116s [gnutls] (3) ASSERT: ../../lib/cert-cred-x509.c[gnutls_certificate_get_x509_crt]:872 116s [system] loading config '/usr/lib/aarch64-linux-gnu/knot-resolver/postconfig.lua' (workdir '/tmp/autopkgtest.H2Kocq/roundtrip-artifacts') 116s [plan ][00000.00] plan '.' type 'NS' uid [65536.00] 116s [iterat][65536.00] '.' type 'NS' new uid was assigned .01, parent uid .00 116s [resolv][65536.01] => using root hints 116s [iterat][65536.01] '.' type 'NS' new uid was assigned .02, parent uid .00 116s [resolv][65536.02] >< TA: '.' 116s [plan ][65536.02] plan '.' type 'DNSKEY' uid [65536.03] 116s [iterat][65536.03] '.' type 'DNSKEY' new uid was assigned .04, parent uid .02 116s [select][65536.04] => id: '19552' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 116s [select][65536.04] => id: '19552' choosing: 'C.ROOT-SERVERS.NET.'@'192.33.4.12#00053' with timeout 400 ms zone cut: '.' 116s [resolv][65536.04] => id: '19552' querying: 'C.ROOT-SERVERS.NET.'@'192.33.4.12#00053' zone cut: '.' qname: '.' qtype: 'DNSKEY' proto: 'udp' 116s [plan ][00000.00] plan '.' type 'NS' uid [65537.00] 116s [iterat][65537.00] '.' type 'NS' new uid was assigned .01, parent uid .00 116s [resolv][65537.01] => using root hints 116s [iterat][65537.01] '.' type 'NS' new uid was assigned .02, parent uid .00 116s [select][65537.02] => id: '42618' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 116s [select][65537.02] => id: '42618' choosing: 'I.ROOT-SERVERS.NET.'@'2001:7fe::53#00053' with timeout 400 ms zone cut: '.' 116s [resolv][65537.02] => id: '42618' querying: 'I.ROOT-SERVERS.NET.'@'2001:7fe::53#00053' zone cut: '.' qname: '.' qtype: 'NS' proto: 'udp' 116s [taupd ] refreshing TA for . 116s [plan ][00000.00] plan '.' type 'DNSKEY' uid [65538.00] 116s [iterat][65538.00] '.' type 'DNSKEY' new uid was assigned .01, parent uid .00 116s [resolv][65538.01] => using root hints 116s [iterat][65538.01] '.' type 'DNSKEY' new uid was assigned .02, parent uid .00 116s [resolv][65538.02] >< TA: '.' 116s [select][65538.02] => id: '24904' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 116s [select][65538.02] => id: '24904' choosing: 'A.ROOT-SERVERS.NET.'@'198.41.0.4#00053' with timeout 400 ms zone cut: '.' 116s [select][65536.04] => id: '19552' noting selection error: 'C.ROOT-SERVERS.NET.'@'192.33.4.12#00053' zone cut: '.' error: 1 QUERY_TIMEOUT 116s [iterat][65538.02] '.' type 'DNSKEY' new uid was assigned .03, parent uid .00 116s [select][65538.03] => id: '15740' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 116s [select][65538.03] => id: '15740' choosing: 'H.ROOT-SERVERS.NET.'@'2001:500:1::53#00053' with timeout 400 ms zone cut: '.' 116s [resolv][65538.03] => id: '15740' querying: 'H.ROOT-SERVERS.NET.'@'2001:500:1::53#00053' zone cut: '.' qname: '.' qtype: 'DNSKEY' proto: 'udp' 116s [iterat][65536.04] '.' type 'DNSKEY' new uid was assigned .05, parent uid .02 116s [select][65536.05] => id: '39867' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 116s [select][65536.05] => id: '39867' choosing: 'B.ROOT-SERVERS.NET.'@'2801:1b8:10::b#00053' with timeout 800 ms zone cut: '.' 116s [select][65537.02] NO6: timed out, appended, timeouts 1/6 116s [select][65537.02] => id: '42618' noting selection error: 'I.ROOT-SERVERS.NET.'@'2001:7fe::53#00053' zone cut: '.' error: 1 QUERY_TIMEOUT 116s [iterat][65537.02] '.' type 'NS' new uid was assigned .03, parent uid .00 116s [select][65537.03] => id: '38504' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 116s [select][65537.03] => id: '38504' choosing: 'M.ROOT-SERVERS.NET.'@'2001:dc3::35#00053' with timeout 800 ms zone cut: '.' 116s [resolv][65537.03] => id: '38504' querying: 'M.ROOT-SERVERS.NET.'@'2001:dc3::35#00053' zone cut: '.' qname: '.' qtype: 'NS' proto: 'udp' 116s [select][65538.03] NO6: timed out, appended, timeouts 2/6 116s [select][65538.03] => id: '15740' noting selection error: 'H.ROOT-SERVERS.NET.'@'2001:500:1::53#00053' zone cut: '.' error: 1 QUERY_TIMEOUT 116s [iterat][65536.05] '.' type 'DNSKEY' new uid was assigned .06, parent uid .02 116s [select][65536.06] => id: '32437' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 116s [select][65536.06] => id: '32437' choosing: 'B.ROOT-SERVERS.NET.'@'2801:1b8:10::b#00053' with timeout 800 ms zone cut: '.' 116s [resolv][65536.06] => id: '32437' querying: 'B.ROOT-SERVERS.NET.'@'2801:1b8:10::b#00053' zone cut: '.' qname: '.' qtype: 'DNSKEY' proto: 'udp' 116s [iterat][65538.03] '.' type 'DNSKEY' new uid was assigned .04, parent uid .00 116s [select][65538.04] => id: '57075' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 116s [select][65538.04] => id: '57075' choosing: 'D.ROOT-SERVERS.NET.'@'2001:500:2d::d#00053' with timeout 800 ms zone cut: '.' 116s [plan ][00000.00] plan 'monkeys.example.' type 'A' uid [11026.00] 116s [iterat][11026.00] 'monkeys.example.' type 'A' new uid was assigned .01, parent uid .00 116s [hint ][11026.01] <= answered from hints 116s [iterat][11026.01] <= rcode: NOERROR 116s [resolv][11026.01] AD: request NOT classified as SECURE 116s [resolv][11026.01] finished in state: 4, queries: 1, mempool: 16400 B 116s [plan ][00000.00] plan 'monkeys.example.' type 'A' uid [17162.00] 116s [iterat][17162.00] 'monkeys.example.' type 'A' new uid was assigned .01, parent uid .00 116s [hint ][17162.01] <= answered from hints 116s [iterat][17162.01] <= rcode: NOERROR 116s [resolv][17162.01] AD: request NOT classified as SECURE 116s [resolv][17162.01] finished in state: 4, queries: 1, mempool: 81952 B 116s [io ] => connection to '127.0.0.1#43995' closed by peer (end of file) 116s [gnutls] (5) REC[0xf9567cfe0000]: Allocating epoch #0 116s [gnutls] (2) added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 116s [gnutls] (5) REC[0xf9567cfe0000]: Allocating epoch #1 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.1 Handshake packet received. Epoch 0, length: 310 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Handshake(22) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet Handshake(22) with length: 310 116s [gnutls] (5) REC[0xf9567cfe0000]: Decrypted Packet[0] Handshake(22) with length: 310 116s [gnutls] (4) HSK[0xf9567cfe0000]: CLIENT HELLO (1) was received. Length 306[306], frag offset 0, frag length: 306, sequence: 0 116s [gnutls] (4) HSK[0xf9567cfe0000]: Client's version: 3.3 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Supported Versions/43' (3 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Found version: 3.4 116s [gnutls] (4) EXT[0xf9567cfe0000]: Negotiated version: 3.4 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Record Size Limit/28' (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: record_size_limit 16385 negotiated 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'ALPN/16' (6 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Extended Master Secret/23' (0 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Session Ticket/35' (0 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Signature Algorithms/13' (34 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (4.1) RSA-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.9) RSA-PSS-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.7) EdDSA-Ed25519 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (5.1) RSA-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.10) RSA-PSS-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.8) EdDSA-Ed448 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (6.1) RSA-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.11) RSA-PSS-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (2.1) RSA-SHA1 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (2.3) ECDSA-SHA1 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Supported Groups/10' (10 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group X25519 (0x1d) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group SECP256R1 (0x17) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group SECP384R1 (0x18) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group SECP521R1 (0x19) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Selected group X25519 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: PSK KE mode 01 received 116s [gnutls] (4) EXT[0xf9567cfe0000]: PSK KE mode 00 received 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 116s [gnutls] (2) checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 116s [gnutls] (3) ASSERT: ../../../lib/ext/server_name.c[gnutls_server_name_get]:234 116s [gnutls] (4) HSK[0xf9567cfe0000]: Requested server name: '' 116s [gnutls] (4) HSK[0xf9567cfe0000]: checking compat of GNUTLS_AES_256_GCM_SHA384 with certificate[0] (RSA/X.509) 116s [gnutls] (4) checking cert compat with RSA-SHA256 116s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 116s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 116s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 116s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 116s [gnutls] (4) Selected signature algorithm: RSA-PSS-RSAE-SHA256 116s [gnutls] (2) Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) HSK[0xf9567cfe0000]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) HSK[0xf9567cfe0000]: Selected version TLS1.3 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'OCSP Status Request/5' (5 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: OCSP status was requested 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Key Share/51' (107 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received key share for X25519 116s [gnutls] (4) HSK[0xf9567cfe0000]: Selected group X25519 (6) 116s [gnutls] (2) EXT[0xf9567cfe0000]: server generated X25519 shared key 116s [gnutls] (4) HSK[0xf9567cfe0000]: Safe renegotiation succeeded 116s [gnutls] (4) HSK[0xf9567cfe0000]: SessionID: b939d63f1d6dffc90d1f5d7a7d4b93f9eb2af0363e043ec88c0682ca6792161f 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: sending key share for X25519 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension Key Share/51 (36 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension Supported Versions/43 (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 116s [gnutls] (4) HSK[0xf9567cfe0000]: SERVER HELLO was queued [122 bytes] 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 122 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[1] Handshake(22) in epoch 0 and length: 127 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 116s [gnutls] (4) REC[0xf9567cfe0000]: Sent ChangeCipherSpec 116s [gnutls] (5) REC[0xf9567cfe0000]: Initializing epoch #1 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #1 ready 116s [gnutls] (4) HSK[0xf9567cfe0000]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (SRTP/14) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (ALPN/16) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension ALPN/16 (6 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Key Share/51) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Cookie/44) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Early Data/42) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension Record Size Limit/28 (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 116s [gnutls] (4) HSK[0xf9567cfe0000]: ENCRYPTED EXTENSIONS was queued [22 bytes] 116s [gnutls] (4) HSK[0xf9567cfe0000]: CERTIFICATE was queued [1155 bytes] 116s [gnutls] (4) checking cert compat with RSA-SHA256 116s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 116s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 116s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 116s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 116s [gnutls] (4) HSK[0xf9567cfe0000]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 116s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 116s [gnutls] (4) HSK[0xf9567cfe0000]: CERTIFICATE VERIFY was queued [392 bytes] 116s [gnutls] (4) HSK[0xf9567cfe0000]: sending finished 116s [gnutls] (4) HSK[0xf9567cfe0000]: FINISHED was queued [52 bytes] 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 22 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[1] Handshake(22) in epoch 1 and length: 44 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 1155 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[2] Handshake(22) in epoch 1 and length: 1177 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 392 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[3] Handshake(22) in epoch 1 and length: 414 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[4] Handshake(22) in epoch 1 and length: 74 116s [gnutls] (3) ASSERT: ../../lib/constate.c[_gnutls_epoch_get]:965 116s [gnutls] (5) REC[0xf9567cfe0000]: Allocating epoch #2 116s [gnutls] (4) HSK[0xf9567cfe0000]: unauthenticated session eligible for early start 116s [gnutls] (5) REC[0xf9567cfe0000]: Initializing epoch #2 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #2 ready 116s [gnutls] (4) HSK[0xf9567cfe0000]: TLS 1.3 set write key with cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) HSK[0xf9567cfe0000]: switching early to application traffic keys 116s [gnutls] (4) HSK[0xf9567cfe0000]: NEW SESSION TICKET was queued [251 bytes] 116s [gnutls] (4) HSK[0xf9567cfe0000]: NEW SESSION TICKET was queued [251 bytes] 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[1] Handshake(22) in epoch 2 and length: 273 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[2] Handshake(22) in epoch 2 and length: 273 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 116s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.3 ChangeCipherSpec packet received. Epoch 1, length: 1 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Handshake(22) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet ChangeCipherSpec(20) with length: 1 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.3 Application Data packet received. Epoch 1, length: 69 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Handshake(22) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet Application Data(23) with length: 69 116s [gnutls] (5) REC[0xf9567cfe0000]: Decrypted Packet[0] Handshake(22) with length: 52 116s [gnutls] (4) HSK[0xf9567cfe0000]: FINISHED (20) was received. Length 48[48], frag offset 0, frag length: 48, sequence: 0 116s [gnutls] (4) HSK[0xf9567cfe0000]: parsing finished 116s [gnutls] (4) HSK[0xf9567cfe0000]: TLS 1.3 set read key with cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (5) REC[0xf9567cfe0000]: Start of epoch cleanup 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #0 freed 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #1 freed 116s [gnutls] (5) REC[0xf9567cfe0000]: End of epoch cleanup 116s [tls ] TLS handshake with 127.0.0.1#41999 has completed 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.3 Application Data packet received. Epoch 2, length: 147 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Application Data(23) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet Application Data(23) with length: 147 116s [gnutls] (5) REC[0xf9567cfe0000]: Decrypted Packet[0] Application Data(23) with length: 130 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 116s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_int]:1759 116s [plan ][00000.00] plan 'monkeys.example.' type 'A' uid [36520.00] 116s [iterat][36520.00] 'monkeys.example.' type 'A' new uid was assigned .01, parent uid .00 116s [hint ][36520.01] <= answered from hints 116s [iterat][36520.01] <= rcode: NOERROR 116s [resolv][36520.01] AD: request NOT classified as SECURE 116s [resolv][36520.01] finished in state: 4, queries: 1, mempool: 81952 B 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Application Data(23) with length: 470 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[3] Application Data(23) in epoch 2 and length: 492 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.3 Application Data packet received. Epoch 2, length: 19 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Application Data(23) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet Application Data(23) with length: 19 116s [gnutls] (5) REC[0xf9567cfe0000]: Decrypted Packet[1] Alert(21) with length: 2 116s [gnutls] (5) REC[0xf9567cfe0000]: Alert[1|0] - Close notify - was received 116s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_in_buffers]:1565 116s [io ] => connection to '127.0.0.1#41999' closed by peer (end of file) 116s [gnutls] (5) REC[0xf9567cfe0000]: Start of epoch cleanup 116s [gnutls] (5) REC[0xf9567cfe0000]: End of epoch cleanup 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #2 freed 116s [gnutls] (5) REC[0xf9567cfe0000]: Allocating epoch #0 116s [gnutls] (2) added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 116s [gnutls] (5) REC[0xf9567cfe0000]: Allocating epoch #1 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.1 Handshake packet received. Epoch 0, length: 331 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Handshake(22) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet Handshake(22) with length: 331 116s [gnutls] (5) REC[0xf9567cfe0000]: Decrypted Packet[0] Handshake(22) with length: 331 116s [gnutls] (4) HSK[0xf9567cfe0000]: CLIENT HELLO (1) was received. Length 327[327], frag offset 0, frag length: 327, sequence: 0 116s [gnutls] (4) HSK[0xf9567cfe0000]: Client's version: 3.3 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Supported Versions/43' (3 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Found version: 3.4 116s [gnutls] (4) EXT[0xf9567cfe0000]: Negotiated version: 3.4 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Server Name Indication/0' (17 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Record Size Limit/28' (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: record_size_limit 16385 negotiated 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Extended Master Secret/23' (0 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'ALPN/16' (6 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Session Ticket/35' (0 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Supported Groups/10' (10 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group X25519 (0x1d) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group SECP256R1 (0x17) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group SECP384R1 (0x18) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group SECP521R1 (0x19) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Selected group X25519 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: PSK KE mode 01 received 116s [gnutls] (4) EXT[0xf9567cfe0000]: PSK KE mode 00 received 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Signature Algorithms/13' (34 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (4.1) RSA-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.9) RSA-PSS-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.7) EdDSA-Ed25519 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (5.1) RSA-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.10) RSA-PSS-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.8) EdDSA-Ed448 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (6.1) RSA-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.11) RSA-PSS-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (2.1) RSA-SHA1 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (2.3) ECDSA-SHA1 116s [gnutls] (2) checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 116s [gnutls] (4) HSK[0xf9567cfe0000]: Requested server name: 'test.example' 116s [gnutls] (4) checking cert compat with RSA-SHA256 116s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 116s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 116s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 116s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 116s [gnutls] (4) Selected signature algorithm: RSA-PSS-RSAE-SHA256 116s [gnutls] (2) Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) HSK[0xf9567cfe0000]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) HSK[0xf9567cfe0000]: Selected version TLS1.3 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'OCSP Status Request/5' (5 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: OCSP status was requested 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Key Share/51' (107 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received key share for X25519 116s [gnutls] (4) HSK[0xf9567cfe0000]: Selected group X25519 (6) 116s [gnutls] (2) EXT[0xf9567cfe0000]: server generated X25519 shared key 116s [gnutls] (4) HSK[0xf9567cfe0000]: Safe renegotiation succeeded 116s [gnutls] (4) HSK[0xf9567cfe0000]: SessionID: 1ef36e46bfd2c64dc2a6c8dfebff1173a4a5a39a7326c63f30f66a29353af0a4 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: sending key share for X25519 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension Key Share/51 (36 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension Supported Versions/43 (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 116s [gnutls] (4) HSK[0xf9567cfe0000]: SERVER HELLO was queued [122 bytes] 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 122 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[1] Handshake(22) in epoch 0 and length: 127 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 116s [gnutls] (4) REC[0xf9567cfe0000]: Sent ChangeCipherSpec 116s [gnutls] (5) REC[0xf9567cfe0000]: Initializing epoch #1 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #1 ready 116s [gnutls] (4) HSK[0xf9567cfe0000]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (SRTP/14) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (ALPN/16) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension ALPN/16 (6 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Key Share/51) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Cookie/44) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Early Data/42) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension Record Size Limit/28 (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 116s [gnutls] (4) HSK[0xf9567cfe0000]: ENCRYPTED EXTENSIONS was queued [22 bytes] 116s [gnutls] (4) HSK[0xf9567cfe0000]: CERTIFICATE was queued [1155 bytes] 116s [gnutls] (4) checking cert compat with RSA-SHA256 116s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 116s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 116s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 116s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 116s [gnutls] (4) HSK[0xf9567cfe0000]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 116s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 116s [gnutls] (4) HSK[0xf9567cfe0000]: CERTIFICATE VERIFY was queued [392 bytes] 116s [gnutls] (4) HSK[0xf9567cfe0000]: sending finished 116s [gnutls] (4) HSK[0xf9567cfe0000]: FINISHED was queued [52 bytes] 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 22 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[1] Handshake(22) in epoch 1 and length: 44 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 1155 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[2] Handshake(22) in epoch 1 and length: 1177 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 392 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[3] Handshake(22) in epoch 1 and length: 414 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[4] Handshake(22) in epoch 1 and length: 74 116s [gnutls] (3) ASSERT: ../../lib/constate.c[_gnutls_epoch_get]:965 116s [gnutls] (5) REC[0xf9567cfe0000]: Allocating epoch #2 116s [gnutls] (4) HSK[0xf9567cfe0000]: unauthenticated session eligible for early start 116s [gnutls] (5) REC[0xf9567cfe0000]: Initializing epoch #2 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #2 ready 116s [gnutls] (4) HSK[0xf9567cfe0000]: TLS 1.3 set write key with cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) HSK[0xf9567cfe0000]: switching early to application traffic keys 116s [gnutls] (4) HSK[0xf9567cfe0000]: NEW SESSION TICKET was queued [251 bytes] 116s [gnutls] (4) HSK[0xf9567cfe0000]: NEW SESSION TICKET was queued [251 bytes] 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[1] Handshake(22) in epoch 2 and length: 273 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[2] Handshake(22) in epoch 2 and length: 273 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 116s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.3 ChangeCipherSpec packet received. Epoch 1, length: 1 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Handshake(22) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet ChangeCipherSpec(20) with length: 1 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.3 Application Data packet received. Epoch 1, length: 69 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Handshake(22) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet Application Data(23) with length: 69 116s [gnutls] (5) REC[0xf9567cfe0000]: Decrypted Packet[0] Handshake(22) with length: 52 116s [gnutls] (4) HSK[0xf9567cfe0000]: FINISHED (20) was received. Length 48[48], frag offset 0, frag length: 48, sequence: 0 116s [gnutls] (4) HSK[0xf9567cfe0000]: parsing finished 116s [gnutls] (4) HSK[0xf9567cfe0000]: TLS 1.3 set read key with cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (5) REC[0xf9567cfe0000]: Start of epoch cleanup 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #0 freed 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #1 freed 116s [gnutls] (5) REC[0xf9567cfe0000]: End of epoch cleanup 116s [tls ] TLS handshake with 127.0.0.1#43587 has completed 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.3 Application Data packet received. Epoch 2, length: 147 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Application Data(23) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet Application Data(23) with length: 147 116s [gnutls] (5) REC[0xf9567cfe0000]: Decrypted Packet[0] Application Data(23) with length: 130 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 116s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_int]:1759 116s [plan ][00000.00] plan 'monkeys.example.' type 'A' uid [25250.00] 116s [iterat][25250.00] 'monkeys.example.' type 'A' new uid was assigned .01, parent uid .00 116s [hint ][25250.01] <= answered from hints 116s [iterat][25250.01] <= rcode: NOERROR 116s [resolv][25250.01] AD: request NOT classified as SECURE 116s [resolv][25250.01] finished in state: 4, queries: 1, mempool: 81952 B 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Application Data(23) with length: 470 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[3] Application Data(23) in epoch 2 and length: 492 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.3 Application Data packet received. Epoch 2, length: 19 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Application Data(23) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet Application Data(23) with length: 19 116s [gnutls] (5) REC[0xf9567cfe0000]: Decrypted Packet[1] Alert(21) with length: 2 116s [gnutls] (5) REC[0xf9567cfe0000]: Alert[1|0] - Close notify - was received 116s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_in_buffers]:1565 116s [io ] => connection to '127.0.0.1#43587' closed by peer (end of file) 116s [gnutls] (5) REC[0xf9567cfe0000]: Start of epoch cleanup 116s [gnutls] (5) REC[0xf9567cfe0000]: End of epoch cleanup 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #2 freed 116s [gnutls] (5) REC[0xf9567cfe0000]: Allocating epoch #0 116s [gnutls] (2) added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 116s [gnutls] (5) REC[0xf9567cfe0000]: Allocating epoch #1 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.1 Handshake packet received. Epoch 0, length: 335 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Handshake(22) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet Handshake(22) with length: 335 116s [gnutls] (5) REC[0xf9567cfe0000]: Decrypted Packet[0] Handshake(22) with length: 335 116s [gnutls] (4) HSK[0xf9567cfe0000]: CLIENT HELLO (1) was received. Length 331[331], frag offset 0, frag length: 331, sequence: 0 116s [gnutls] (4) HSK[0xf9567cfe0000]: Client's version: 3.3 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Supported Versions/43' (3 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Found version: 3.4 116s [gnutls] (4) EXT[0xf9567cfe0000]: Negotiated version: 3.4 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Record Size Limit/28' (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: record_size_limit 16385 negotiated 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Extended Master Secret/23' (0 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'ALPN/16' (6 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Server Name Indication/0' (21 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Session Ticket/35' (0 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Signature Algorithms/13' (34 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (4.1) RSA-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.9) RSA-PSS-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.7) EdDSA-Ed25519 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (5.1) RSA-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.10) RSA-PSS-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.8) EdDSA-Ed448 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (6.1) RSA-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.11) RSA-PSS-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (2.1) RSA-SHA1 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (2.3) ECDSA-SHA1 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: PSK KE mode 01 received 116s [gnutls] (4) EXT[0xf9567cfe0000]: PSK KE mode 00 received 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Supported Groups/10' (10 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group X25519 (0x1d) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group SECP256R1 (0x17) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group SECP384R1 (0x18) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group SECP521R1 (0x19) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Selected group X25519 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 116s [gnutls] (2) checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 116s [gnutls] (4) HSK[0xf9567cfe0000]: Requested server name: 'notright.example' 116s [gnutls] (4) HSK[0xf9567cfe0000]: checking compat of GNUTLS_AES_256_GCM_SHA384 with certificate[0] (RSA/X.509) 116s [gnutls] (4) checking cert compat with RSA-SHA256 116s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 116s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 116s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 116s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 116s [gnutls] (4) Selected signature algorithm: RSA-PSS-RSAE-SHA256 116s [gnutls] (2) Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) HSK[0xf9567cfe0000]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) HSK[0xf9567cfe0000]: Selected version TLS1.3 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'OCSP Status Request/5' (5 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: OCSP status was requested 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Key Share/51' (107 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received key share for X25519 116s [gnutls] (4) HSK[0xf9567cfe0000]: Selected group X25519 (6) 116s [gnutls] (2) EXT[0xf9567cfe0000]: server generated X25519 shared key 116s [gnutls] (4) HSK[0xf9567cfe0000]: Safe renegotiation succeeded 116s [gnutls] (4) HSK[0xf9567cfe0000]: SessionID: 1135230d0ebfb9195acf687433d9cef93431c766b3601018276642e2a42f6a56 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: sending key share for X25519 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension Key Share/51 (36 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension Supported Versions/43 (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 116s [gnutls] (4) HSK[0xf9567cfe0000]: SERVER HELLO was queued [122 bytes] 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 122 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[1] Handshake(22) in epoch 0 and length: 127 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 116s [gnutls] (4) REC[0xf9567cfe0000]: Sent ChangeCipherSpec 116s [gnutls] (5) REC[0xf9567cfe0000]: Initializing epoch #1 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #1 ready 116s [gnutls] (4) HSK[0xf9567cfe0000]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (SRTP/14) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (ALPN/16) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension ALPN/16 (6 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Key Share/51) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Cookie/44) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Early Data/42) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension Record Size Limit/28 (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 116s [gnutls] (4) HSK[0xf9567cfe0000]: ENCRYPTED EXTENSIONS was queued [22 bytes] 116s [gnutls] (4) HSK[0xf9567cfe0000]: CERTIFICATE was queued [1155 bytes] 116s [gnutls] (4) checking cert compat with RSA-SHA256 116s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 116s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 116s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 116s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 116s [gnutls] (4) HSK[0xf9567cfe0000]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 116s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 116s [gnutls] (4) HSK[0xf9567cfe0000]: CERTIFICATE VERIFY was queued [392 bytes] 116s [gnutls] (4) HSK[0xf9567cfe0000]: sending finished 116s [gnutls] (4) HSK[0xf9567cfe0000]: FINISHED was queued [52 bytes] 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 22 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[1] Handshake(22) in epoch 1 and length: 44 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 1155 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[2] Handshake(22) in epoch 1 and length: 1177 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 392 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[3] Handshake(22) in epoch 1 and length: 414 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[4] Handshake(22) in epoch 1 and length: 74 116s [gnutls] (3) ASSERT: ../../lib/constate.c[_gnutls_epoch_get]:965 116s [gnutls] (5) REC[0xf9567cfe0000]: Allocating epoch #2 116s [gnutls] (4) HSK[0xf9567cfe0000]: unauthenticated session eligible for early start 116s [gnutls] (5) REC[0xf9567cfe0000]: Initializing epoch #2 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #2 ready 116s [gnutls] (4) HSK[0xf9567cfe0000]: TLS 1.3 set write key with cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) HSK[0xf9567cfe0000]: switching early to application traffic keys 116s [gnutls] (4) HSK[0xf9567cfe0000]: NEW SESSION TICKET was queued [251 bytes] 116s [gnutls] (4) HSK[0xf9567cfe0000]: NEW SESSION TICKET was queued [251 bytes] 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[1] Handshake(22) in epoch 2 and length: 273 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[2] Handshake(22) in epoch 2 and length: 273 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 116s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.3 ChangeCipherSpec packet received. Epoch 1, length: 1 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Handshake(22) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet ChangeCipherSpec(20) with length: 1 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 116s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 116s [io ] => connection to '127.0.0.1#48425' closed by peer (connection reset by peer) 116s [gnutls] (5) REC[0xf9567cfe0000]: Start of epoch cleanup 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #0 freed 116s [gnutls] (5) REC[0xf9567cfe0000]: End of epoch cleanup 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #1 freed 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #2 freed 116s [gnutls] (5) REC[0xf9567cfe0000]: Allocating epoch #0 116s [gnutls] (2) added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 116s [gnutls] (5) REC[0xf9567cfe0000]: Allocating epoch #1 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.1 Handshake packet received. Epoch 0, length: 331 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Handshake(22) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet Handshake(22) with length: 331 116s [gnutls] (5) REC[0xf9567cfe0000]: Decrypted Packet[0] Handshake(22) with length: 331 116s [gnutls] (4) HSK[0xf9567cfe0000]: CLIENT HELLO (1) was received. Length 327[327], frag offset 0, frag length: 327, sequence: 0 116s [gnutls] (4) HSK[0xf9567cfe0000]: Client's version: 3.3 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Supported Versions/43' (3 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Found version: 3.4 116s [gnutls] (4) EXT[0xf9567cfe0000]: Negotiated version: 3.4 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Server Name Indication/0' (17 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'ALPN/16' (6 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Extended Master Secret/23' (0 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Record Size Limit/28' (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: record_size_limit 16385 negotiated 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: PSK KE mode 01 received 116s [gnutls] (4) EXT[0xf9567cfe0000]: PSK KE mode 00 received 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Signature Algorithms/13' (34 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (4.1) RSA-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.9) RSA-PSS-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.7) EdDSA-Ed25519 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (5.1) RSA-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.10) RSA-PSS-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.8) EdDSA-Ed448 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (6.1) RSA-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.11) RSA-PSS-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (2.1) RSA-SHA1 116s [gnutls] (4) EXT[0xf9567cfe0000]: rcvd signature algo (2.3) ECDSA-SHA1 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Session Ticket/35' (0 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Supported Groups/10' (10 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group X25519 (0x1d) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group SECP256R1 (0x17) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group SECP384R1 (0x18) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received group SECP521R1 (0x19) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Selected group X25519 116s [gnutls] (2) checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 116s [gnutls] (4) HSK[0xf9567cfe0000]: Requested server name: 'test.example' 116s [gnutls] (4) checking cert compat with RSA-SHA256 116s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 116s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 116s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 116s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 116s [gnutls] (4) Selected signature algorithm: RSA-PSS-RSAE-SHA256 116s [gnutls] (2) Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) HSK[0xf9567cfe0000]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) HSK[0xf9567cfe0000]: Selected version TLS1.3 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'OCSP Status Request/5' (5 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: OCSP status was requested 116s [gnutls] (4) EXT[0xf9567cfe0000]: Parsing extension 'Key Share/51' (107 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Received key share for X25519 116s [gnutls] (4) HSK[0xf9567cfe0000]: Selected group X25519 (6) 116s [gnutls] (2) EXT[0xf9567cfe0000]: server generated X25519 shared key 116s [gnutls] (4) HSK[0xf9567cfe0000]: Safe renegotiation succeeded 116s [gnutls] (4) HSK[0xf9567cfe0000]: SessionID: ccac4b70d7b2215b927a9fe8840f8a78e5c503e07d1ae1339803a8b82bf819bf 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: sending key share for X25519 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension Key Share/51 (36 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension Supported Versions/43 (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 116s [gnutls] (4) HSK[0xf9567cfe0000]: SERVER HELLO was queued [122 bytes] 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 122 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[1] Handshake(22) in epoch 0 and length: 127 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 116s [gnutls] (4) REC[0xf9567cfe0000]: Sent ChangeCipherSpec 116s [gnutls] (5) REC[0xf9567cfe0000]: Initializing epoch #1 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #1 ready 116s [gnutls] (4) HSK[0xf9567cfe0000]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (SRTP/14) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (ALPN/16) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension ALPN/16 (6 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Key Share/51) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Cookie/44) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Early Data/42) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Sending extension Record Size Limit/28 (2 bytes) 116s [gnutls] (4) EXT[0xf9567cfe0000]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 116s [gnutls] (4) EXT[0xf9567cfe0000]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 116s [gnutls] (4) HSK[0xf9567cfe0000]: ENCRYPTED EXTENSIONS was queued [22 bytes] 116s [gnutls] (4) HSK[0xf9567cfe0000]: CERTIFICATE was queued [1155 bytes] 116s [gnutls] (4) checking cert compat with RSA-SHA256 116s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 116s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 116s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 116s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 116s [gnutls] (4) HSK[0xf9567cfe0000]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 116s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 116s [gnutls] (4) HSK[0xf9567cfe0000]: CERTIFICATE VERIFY was queued [392 bytes] 116s [gnutls] (4) HSK[0xf9567cfe0000]: sending finished 116s [gnutls] (4) HSK[0xf9567cfe0000]: FINISHED was queued [52 bytes] 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 22 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[1] Handshake(22) in epoch 1 and length: 44 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 1155 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[2] Handshake(22) in epoch 1 and length: 1177 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 392 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[3] Handshake(22) in epoch 1 and length: 414 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[4] Handshake(22) in epoch 1 and length: 74 116s [gnutls] (3) ASSERT: ../../lib/constate.c[_gnutls_epoch_get]:965 116s [gnutls] (5) REC[0xf9567cfe0000]: Allocating epoch #2 116s [gnutls] (4) HSK[0xf9567cfe0000]: unauthenticated session eligible for early start 116s [gnutls] (5) REC[0xf9567cfe0000]: Initializing epoch #2 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #2 ready 116s [gnutls] (4) HSK[0xf9567cfe0000]: TLS 1.3 set write key with cipher suite: GNUTLS_AES_256_GCM_SHA384 116s [gnutls] (4) HSK[0xf9567cfe0000]: switching early to application traffic keys 116s [gnutls] (4) HSK[0xf9567cfe0000]: NEW SESSION TICKET was queued [251 bytes] 116s [gnutls] (4) HSK[0xf9567cfe0000]: NEW SESSION TICKET was queued [251 bytes] 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[1] Handshake(22) in epoch 2 and length: 273 116s [gnutls] (5) REC[0xf9567cfe0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 116s [gnutls] (5) REC[0xf9567cfe0000]: Sent Packet[2] Handshake(22) in epoch 2 and length: 273 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 116s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 116s [gnutls] (5) REC[0xf9567cfe0000]: SSL 3.3 ChangeCipherSpec packet received. Epoch 1, length: 1 116s [gnutls] (5) REC[0xf9567cfe0000]: Expected Packet Handshake(22) 116s [gnutls] (5) REC[0xf9567cfe0000]: Received Packet ChangeCipherSpec(20) with length: 1 116s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 116s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 116s [io ] => connection to '127.0.0.1#32961' closed by peer (connection reset by peer) 116s [gnutls] (5) REC[0xf9567cfe0000]: Start of epoch cleanup 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #0 freed 116s [gnutls] (5) REC[0xf9567cfe0000]: End of epoch cleanup 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #1 freed 116s [gnutls] (5) REC[0xf9567cfe0000]: Epoch #2 freed 116s > 116s > autopkgtest [18:26:40]: test roundtrip: -----------------------] 116s autopkgtest [18:26:40]: test roundtrip: - - - - - - - - - - results - - - - - - - - - - 116s roundtrip PASS 121s autopkgtest [18:26:45]: @@@@@@@@@@@@@@@@@@@@ summary 121s roundtrip PASS 124s nova [W] Using flock in prodstack7-arm64 124s Creating nova instance adt-questing-arm64-knot-resolver-20250502-182444-juju-7f2275-prod-proposed-migration-environment-15-65995fb4-0891-460a-be3b-24b197ffd29e from image adt/ubuntu-questing-arm64-server-20250502.img (UUID 8e5d326b-32f5-49da-83ce-e406e786e537)... 124s nova [W] Timed out waiting for 3e0f9125-e724-4233-9ff5-9dd62308b9b5 to get deleted.