0s autopkgtest [16:04:49]: starting date and time: 2025-11-04 16:04:49+0000 0s autopkgtest [16:04:49]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [16:04:49]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.hgvz2e_f/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:systemd --apt-upgrade knot-resolver --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=systemd/258.1-2ubuntu1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos03-arm64-12.secgroup --name adt-resolute-arm64-knot-resolver-20251104-160449-juju-7f2275-prod-proposed-migration-environment-2-bb0195b8-2925-4571-9fa0-3687316582aa --image adt/ubuntu-resolute-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 3s Creating nova instance adt-resolute-arm64-knot-resolver-20251104-160449-juju-7f2275-prod-proposed-migration-environment-2-bb0195b8-2925-4571-9fa0-3687316582aa from image adt/ubuntu-resolute-arm64-server-20251104.img (UUID 2e2491ad-9a1f-4837-a9e6-434abe3bdc09)... 76s autopkgtest [16:06:05]: testbed dpkg architecture: arm64 77s autopkgtest [16:06:06]: testbed apt version: 3.1.11 77s autopkgtest [16:06:06]: @@@@@@@@@@@@@@@@@@@@ test bed setup 77s autopkgtest [16:06:06]: testbed release detected to be: None 79s autopkgtest [16:06:08]: updating testbed package index (apt update) 79s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [87.8 kB] 79s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 79s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 79s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 79s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1009 kB] 80s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [9848 B] 80s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [81.9 kB] 80s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [23.7 kB] 80s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 Packages [128 kB] 80s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 c-n-f Metadata [3092 B] 80s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 Packages [107 kB] 80s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 c-n-f Metadata [324 B] 80s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 Packages [622 kB] 80s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 c-n-f Metadata [14.7 kB] 80s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 Packages [14.0 kB] 80s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 c-n-f Metadata [560 B] 82s Fetched 2102 kB in 1s (1572 kB/s) 84s Reading package lists... 85s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 85s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 85s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 85s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 87s Reading package lists... 87s Reading package lists... 88s Building dependency tree... 88s Reading state information... 88s Calculating upgrade... 89s The following packages will be upgraded: 89s base-passwd bash-completion iputils-tracepath liblz4-1 libnss-systemd 89s libpam-systemd libsystemd-shared libsystemd0 libudev1 libxkbcommon0 systemd 89s systemd-cryptsetup systemd-resolved systemd-sysv udev 90s 15 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 90s Need to get 8949 kB of archives. 90s After this operation, 1389 kB of additional disk space will be used. 90s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 base-passwd arm64 3.6.8 [54.6 kB] 90s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libsystemd0 arm64 258.1-2ubuntu1 [529 kB] 90s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 systemd-sysv arm64 258.1-2ubuntu1 [9250 B] 90s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 systemd-resolved arm64 258.1-2ubuntu1 [336 kB] 90s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libnss-systemd arm64 258.1-2ubuntu1 [178 kB] 90s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libpam-systemd arm64 258.1-2ubuntu1 [265 kB] 90s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libsystemd-shared arm64 258.1-2ubuntu1 [2310 kB] 91s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 systemd arm64 258.1-2ubuntu1 [3024 kB] 91s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 systemd-cryptsetup arm64 258.1-2ubuntu1 [121 kB] 91s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 udev arm64 258.1-2ubuntu1 [1455 kB] 91s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libudev1 arm64 258.1-2ubuntu1 [208 kB] 91s Get:12 http://ftpmaster.internal/ubuntu resolute/main arm64 liblz4-1 arm64 1.10.0-6 [75.5 kB] 91s Get:13 http://ftpmaster.internal/ubuntu resolute/main arm64 bash-completion all 1:2.16.0-8 [214 kB] 91s Get:14 http://ftpmaster.internal/ubuntu resolute/main arm64 iputils-tracepath arm64 3:20250605-1ubuntu1 [14.7 kB] 91s Get:15 http://ftpmaster.internal/ubuntu resolute/main arm64 libxkbcommon0 arm64 1.12.3-1 [155 kB] 92s dpkg-preconfigure: unable to re-open stdin: No such file or directory 93s Fetched 8949 kB in 2s (4565 kB/s) 93s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83477 files and directories currently installed.) 93s Preparing to unpack .../base-passwd_3.6.8_arm64.deb ... 93s Unpacking base-passwd (3.6.8) over (3.6.7) ... 94s Setting up base-passwd (3.6.8) ... 95s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83477 files and directories currently installed.) 95s Preparing to unpack .../libsystemd0_258.1-2ubuntu1_arm64.deb ... 95s Unpacking libsystemd0:arm64 (258.1-2ubuntu1) over (257.9-0ubuntu2) ... 95s Setting up libsystemd0:arm64 (258.1-2ubuntu1) ... 96s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83477 files and directories currently installed.) 96s Preparing to unpack .../systemd-sysv_258.1-2ubuntu1_arm64.deb ... 96s Unpacking systemd-sysv (258.1-2ubuntu1) over (257.9-0ubuntu2) ... 96s Preparing to unpack .../systemd-resolved_258.1-2ubuntu1_arm64.deb ... 96s Unpacking systemd-resolved (258.1-2ubuntu1) over (257.9-0ubuntu2) ... 98s Preparing to unpack .../libnss-systemd_258.1-2ubuntu1_arm64.deb ... 98s Unpacking libnss-systemd:arm64 (258.1-2ubuntu1) over (257.9-0ubuntu2) ... 99s Preparing to unpack .../libpam-systemd_258.1-2ubuntu1_arm64.deb ... 99s Unpacking libpam-systemd:arm64 (258.1-2ubuntu1) over (257.9-0ubuntu2) ... 99s Preparing to unpack .../libsystemd-shared_258.1-2ubuntu1_arm64.deb ... 100s Unpacking libsystemd-shared:arm64 (258.1-2ubuntu1) over (257.9-0ubuntu2) ... 100s Setting up libsystemd-shared:arm64 (258.1-2ubuntu1) ... 100s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83476 files and directories currently installed.) 100s Preparing to unpack .../systemd_258.1-2ubuntu1_arm64.deb ... 100s Unpacking systemd (258.1-2ubuntu1) over (257.9-0ubuntu2) ... 101s Preparing to unpack .../systemd-cryptsetup_258.1-2ubuntu1_arm64.deb ... 101s Unpacking systemd-cryptsetup (258.1-2ubuntu1) over (257.9-0ubuntu2) ... 101s Preparing to unpack .../udev_258.1-2ubuntu1_arm64.deb ... 102s Unpacking udev (258.1-2ubuntu1) over (257.9-0ubuntu2) ... 102s Preparing to unpack .../libudev1_258.1-2ubuntu1_arm64.deb ... 102s Unpacking libudev1:arm64 (258.1-2ubuntu1) over (257.9-0ubuntu2) ... 102s Setting up libudev1:arm64 (258.1-2ubuntu1) ... 102s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83534 files and directories currently installed.) 102s Preparing to unpack .../liblz4-1_1.10.0-6_arm64.deb ... 102s Unpacking liblz4-1:arm64 (1.10.0-6) over (1.10.0-4build1) ... 103s Preparing to unpack .../bash-completion_1%3a2.16.0-8_all.deb ... 103s Unpacking bash-completion (1:2.16.0-8) over (1:2.16.0-7) ... 103s Preparing to unpack .../iputils-tracepath_3%3a20250605-1ubuntu1_arm64.deb ... 103s Unpacking iputils-tracepath (3:20250605-1ubuntu1) over (3:20240905-3ubuntu3) ... 104s Preparing to unpack .../libxkbcommon0_1.12.3-1_arm64.deb ... 104s Unpacking libxkbcommon0:arm64 (1.12.3-1) over (1.7.0-2.1) ... 104s Setting up liblz4-1:arm64 (1.10.0-6) ... 104s Setting up systemd (258.1-2ubuntu1) ... 104s Installing new version of config file /etc/systemd/logind.conf ... 104s Installing new version of config file /etc/systemd/networkd.conf ... 104s Installing new version of config file /etc/systemd/system.conf ... 104s Installing new version of config file /etc/systemd/user.conf ... 104s /usr/lib/tmpfiles.d/legacy.conf:14: Duplicate line for path "/run/lock", ignoring. 104s /usr/lib/tmpfiles.d/legacy.conf:14: Duplicate line for path "/run/lock", ignoring. 105s Setting up systemd-cryptsetup (258.1-2ubuntu1) ... 105s Setting up bash-completion (1:2.16.0-8) ... 105s Setting up udev (258.1-2ubuntu1) ... 107s Setting up iputils-tracepath (3:20250605-1ubuntu1) ... 107s Setting up systemd-resolved (258.1-2ubuntu1) ... 107s Installing new version of config file /etc/systemd/resolved.conf ... 108s Created symlink '/etc/systemd/system/sockets.target.wants/systemd-resolved-monitor.socket' → '/usr/lib/systemd/system/systemd-resolved-monitor.socket'. 108s Created symlink '/etc/systemd/system/sockets.target.wants/systemd-resolved-varlink.socket' → '/usr/lib/systemd/system/systemd-resolved-varlink.socket'. 109s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 109s Setting up libxkbcommon0:arm64 (1.12.3-1) ... 109s Setting up systemd-sysv (258.1-2ubuntu1) ... 109s Setting up libnss-systemd:arm64 (258.1-2ubuntu1) ... 109s Setting up libpam-systemd:arm64 (258.1-2ubuntu1) ... 110s Processing triggers for libc-bin (2.42-0ubuntu3) ... 110s Processing triggers for man-db (2.13.1-1) ... 113s Processing triggers for dbus (1.16.2-2ubuntu2) ... 113s Processing triggers for shared-mime-info (2.4-5build2) ... 118s Processing triggers for procps (2:4.0.4-8ubuntu3) ... 118s Processing triggers for initramfs-tools (0.150ubuntu4) ... 118s update-initramfs: Generating /boot/initrd.img-6.17.0-5-generic 156s System running in EFI mode, skipping. 156s autopkgtest [16:07:25]: upgrading testbed (apt dist-upgrade and autopurge) 156s Reading package lists... 156s Building dependency tree... 156s Reading state information... 157s Calculating upgrade... 157s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 157s Reading package lists... 158s Building dependency tree... 158s Reading state information... 158s Solving dependencies... 158s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 159s autopkgtest [16:07:28]: rebooting testbed after setup commands that affected boot 199s autopkgtest [16:08:08]: testbed running kernel: Linux 6.17.0-5-generic #5-Ubuntu SMP PREEMPT_DYNAMIC Mon Sep 22 09:50:31 UTC 2025 202s autopkgtest [16:08:11]: @@@@@@@@@@@@@@@@@@@@ apt-source knot-resolver 208s Get:1 http://ftpmaster.internal/ubuntu resolute/universe knot-resolver 5.7.5-1 (dsc) [3178 B] 208s Get:2 http://ftpmaster.internal/ubuntu resolute/universe knot-resolver 5.7.5-1 (tar) [1925 kB] 208s Get:3 http://ftpmaster.internal/ubuntu resolute/universe knot-resolver 5.7.5-1 (asc) [833 B] 208s Get:4 http://ftpmaster.internal/ubuntu resolute/universe knot-resolver 5.7.5-1 (diff) [402 kB] 208s gpgv: Signature made Thu Apr 24 17:32:48 2025 UTC 208s gpgv: using RSA key 23EBCF7E8FC47556787100DFA4254072E373042C 208s gpgv: Can't check signature: No public key 208s dpkg-source: warning: cannot verify inline signature for ./knot-resolver_5.7.5-1.dsc: no acceptable signature found 209s autopkgtest [16:08:18]: testing package knot-resolver version 5.7.5-1 210s autopkgtest [16:08:19]: build not needed 211s autopkgtest [16:08:20]: test roundtrip: preparing testbed 211s Reading package lists... 212s Building dependency tree... 212s Reading state information... 212s Solving dependencies... 212s The following NEW packages will be installed: 212s dns-root-data gnutls-bin knot-dnsutils knot-resolver libdnssec10 212s libdnssec9t64 libevent-2.1-7t64 libfstrm0 libgnutls-dane0t64 libknot15 212s libknot16 libluajit-5.1-2 libluajit-5.1-common libngtcp2-16 212s libngtcp2-crypto-gnutls8 libprotobuf-c1 libunbound8 libxdp1 libzscanner4t64 212s libzscanner5 lua-sec lua-socket socat 213s 0 upgraded, 23 newly installed, 0 to remove and 0 not upgraded. 213s Need to get 3036 kB of archives. 213s After this operation, 12.6 MB of additional disk space will be used. 213s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 dns-root-data all 2025080400 [5908 B] 213s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10build1 [152 kB] 213s Get:3 http://ftpmaster.internal/ubuntu resolute/main arm64 libunbound8 arm64 1.22.0-2ubuntu2 [448 kB] 213s Get:4 http://ftpmaster.internal/ubuntu resolute/main arm64 libgnutls-dane0t64 arm64 3.8.9-3ubuntu2 [25.0 kB] 213s Get:5 http://ftpmaster.internal/ubuntu resolute/universe arm64 gnutls-bin arm64 3.8.9-3ubuntu2 [273 kB] 213s Get:6 http://ftpmaster.internal/ubuntu resolute/universe arm64 libdnssec10 arm64 3.5.1-1 [32.0 kB] 213s Get:7 http://ftpmaster.internal/ubuntu resolute/universe arm64 libngtcp2-16 arm64 1.16.0-1 [133 kB] 213s Get:8 http://ftpmaster.internal/ubuntu resolute/universe arm64 libngtcp2-crypto-gnutls8 arm64 1.16.0-1 [16.9 kB] 213s Get:9 http://ftpmaster.internal/ubuntu resolute/main arm64 libxdp1 arm64 1.5.6-1 [63.7 kB] 213s Get:10 http://ftpmaster.internal/ubuntu resolute/universe arm64 libknot16 arm64 3.5.1-1 [115 kB] 213s Get:11 http://ftpmaster.internal/ubuntu resolute/universe arm64 libzscanner5 arm64 3.5.1-1 [136 kB] 213s Get:12 http://ftpmaster.internal/ubuntu resolute/universe arm64 libfstrm0 arm64 0.6.1-1build4 [20.6 kB] 213s Get:13 http://ftpmaster.internal/ubuntu resolute/main arm64 libprotobuf-c1 arm64 1.5.1-1ubuntu1 [21.1 kB] 213s Get:14 http://ftpmaster.internal/ubuntu resolute/universe arm64 knot-dnsutils arm64 3.5.1-1 [121 kB] 213s Get:15 http://ftpmaster.internal/ubuntu resolute/universe arm64 lua-socket arm64 3.1.0-2 [77.5 kB] 213s Get:16 http://ftpmaster.internal/ubuntu resolute/universe arm64 lua-sec arm64 1.3.2-3 [38.0 kB] 214s Get:17 http://ftpmaster.internal/ubuntu resolute/universe arm64 libdnssec9t64 arm64 3.4.6-2 [31.3 kB] 214s Get:18 http://ftpmaster.internal/ubuntu resolute/universe arm64 libknot15 arm64 3.4.6-2 [113 kB] 214s Get:19 http://ftpmaster.internal/ubuntu resolute/universe arm64 libluajit-5.1-common all 2.1.0+openresty20250117-2ubuntu1 [54.6 kB] 214s Get:20 http://ftpmaster.internal/ubuntu resolute/universe arm64 libluajit-5.1-2 arm64 2.1.0+openresty20250117-2ubuntu1 [295 kB] 214s Get:21 http://ftpmaster.internal/ubuntu resolute/universe arm64 libzscanner4t64 arm64 3.4.6-2 [137 kB] 214s Get:22 http://ftpmaster.internal/ubuntu resolute/universe arm64 knot-resolver arm64 5.7.5-1 [333 kB] 214s Get:23 http://ftpmaster.internal/ubuntu resolute/main arm64 socat arm64 1.8.0.3-1build1 [394 kB] 214s Preconfiguring packages ... 214s Fetched 3036 kB in 1s (2226 kB/s) 215s Selecting previously unselected package dns-root-data. 215s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83534 files and directories currently installed.) 215s Preparing to unpack .../00-dns-root-data_2025080400_all.deb ... 215s Unpacking dns-root-data (2025080400) ... 215s Selecting previously unselected package libevent-2.1-7t64:arm64. 215s Preparing to unpack .../01-libevent-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 215s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 215s Selecting previously unselected package libunbound8:arm64. 215s Preparing to unpack .../02-libunbound8_1.22.0-2ubuntu2_arm64.deb ... 215s Unpacking libunbound8:arm64 (1.22.0-2ubuntu2) ... 215s Selecting previously unselected package libgnutls-dane0t64:arm64. 215s Preparing to unpack .../03-libgnutls-dane0t64_3.8.9-3ubuntu2_arm64.deb ... 215s Unpacking libgnutls-dane0t64:arm64 (3.8.9-3ubuntu2) ... 215s Selecting previously unselected package gnutls-bin. 215s Preparing to unpack .../04-gnutls-bin_3.8.9-3ubuntu2_arm64.deb ... 215s Unpacking gnutls-bin (3.8.9-3ubuntu2) ... 215s Selecting previously unselected package libdnssec10. 215s Preparing to unpack .../05-libdnssec10_3.5.1-1_arm64.deb ... 215s Unpacking libdnssec10 (3.5.1-1) ... 215s Selecting previously unselected package libngtcp2-16:arm64. 215s Preparing to unpack .../06-libngtcp2-16_1.16.0-1_arm64.deb ... 215s Unpacking libngtcp2-16:arm64 (1.16.0-1) ... 215s Selecting previously unselected package libngtcp2-crypto-gnutls8:arm64. 215s Preparing to unpack .../07-libngtcp2-crypto-gnutls8_1.16.0-1_arm64.deb ... 215s Unpacking libngtcp2-crypto-gnutls8:arm64 (1.16.0-1) ... 215s Selecting previously unselected package libxdp1:arm64. 216s Preparing to unpack .../08-libxdp1_1.5.6-1_arm64.deb ... 216s Unpacking libxdp1:arm64 (1.5.6-1) ... 216s Selecting previously unselected package libknot16. 216s Preparing to unpack .../09-libknot16_3.5.1-1_arm64.deb ... 216s Unpacking libknot16 (3.5.1-1) ... 216s Selecting previously unselected package libzscanner5. 216s Preparing to unpack .../10-libzscanner5_3.5.1-1_arm64.deb ... 216s Unpacking libzscanner5 (3.5.1-1) ... 216s Selecting previously unselected package libfstrm0:arm64. 216s Preparing to unpack .../11-libfstrm0_0.6.1-1build4_arm64.deb ... 216s Unpacking libfstrm0:arm64 (0.6.1-1build4) ... 216s Selecting previously unselected package libprotobuf-c1:arm64. 216s Preparing to unpack .../12-libprotobuf-c1_1.5.1-1ubuntu1_arm64.deb ... 216s Unpacking libprotobuf-c1:arm64 (1.5.1-1ubuntu1) ... 216s Selecting previously unselected package knot-dnsutils. 216s Preparing to unpack .../13-knot-dnsutils_3.5.1-1_arm64.deb ... 216s Unpacking knot-dnsutils (3.5.1-1) ... 216s Selecting previously unselected package lua-socket:arm64. 216s Preparing to unpack .../14-lua-socket_3.1.0-2_arm64.deb ... 216s Unpacking lua-socket:arm64 (3.1.0-2) ... 216s Selecting previously unselected package lua-sec:arm64. 216s Preparing to unpack .../15-lua-sec_1.3.2-3_arm64.deb ... 216s Unpacking lua-sec:arm64 (1.3.2-3) ... 216s Selecting previously unselected package libdnssec9t64. 216s Preparing to unpack .../16-libdnssec9t64_3.4.6-2_arm64.deb ... 216s Unpacking libdnssec9t64 (3.4.6-2) ... 216s Selecting previously unselected package libknot15. 216s Preparing to unpack .../17-libknot15_3.4.6-2_arm64.deb ... 216s Unpacking libknot15 (3.4.6-2) ... 216s Selecting previously unselected package libluajit-5.1-common. 216s Preparing to unpack .../18-libluajit-5.1-common_2.1.0+openresty20250117-2ubuntu1_all.deb ... 216s Unpacking libluajit-5.1-common (2.1.0+openresty20250117-2ubuntu1) ... 216s Selecting previously unselected package libluajit-5.1-2:arm64. 216s Preparing to unpack .../19-libluajit-5.1-2_2.1.0+openresty20250117-2ubuntu1_arm64.deb ... 216s Unpacking libluajit-5.1-2:arm64 (2.1.0+openresty20250117-2ubuntu1) ... 216s Selecting previously unselected package libzscanner4t64. 216s Preparing to unpack .../20-libzscanner4t64_3.4.6-2_arm64.deb ... 216s Unpacking libzscanner4t64 (3.4.6-2) ... 216s Selecting previously unselected package knot-resolver. 216s Preparing to unpack .../21-knot-resolver_5.7.5-1_arm64.deb ... 216s Unpacking knot-resolver (5.7.5-1) ... 216s Selecting previously unselected package socat. 216s Preparing to unpack .../22-socat_1.8.0.3-1build1_arm64.deb ... 216s Unpacking socat (1.8.0.3-1build1) ... 216s Setting up libzscanner4t64 (3.4.6-2) ... 216s Setting up libfstrm0:arm64 (0.6.1-1build4) ... 216s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 216s Setting up lua-socket:arm64 (3.1.0-2) ... 216s Setting up libprotobuf-c1:arm64 (1.5.1-1ubuntu1) ... 216s Setting up libdnssec10 (3.5.1-1) ... 216s Setting up dns-root-data (2025080400) ... 216s Setting up libxdp1:arm64 (1.5.6-1) ... 216s Setting up libunbound8:arm64 (1.22.0-2ubuntu2) ... 217s Setting up libgnutls-dane0t64:arm64 (3.8.9-3ubuntu2) ... 217s Setting up socat (1.8.0.3-1build1) ... 217s Setting up libdnssec9t64 (3.4.6-2) ... 217s Setting up libluajit-5.1-common (2.1.0+openresty20250117-2ubuntu1) ... 217s Setting up libzscanner5 (3.5.1-1) ... 217s Setting up libngtcp2-16:arm64 (1.16.0-1) ... 217s Setting up libngtcp2-crypto-gnutls8:arm64 (1.16.0-1) ... 217s Setting up gnutls-bin (3.8.9-3ubuntu2) ... 217s Setting up lua-sec:arm64 (1.3.2-3) ... 217s Setting up libknot15 (3.4.6-2) ... 217s Setting up libluajit-5.1-2:arm64 (2.1.0+openresty20250117-2ubuntu1) ... 217s Setting up libknot16 (3.5.1-1) ... 217s Setting up knot-resolver (5.7.5-1) ... 217s Created symlink '/etc/systemd/system/kresd.target.wants/kres-cache-gc.service' → '/usr/lib/systemd/system/kres-cache-gc.service'. 218s Created symlink '/etc/systemd/system/multi-user.target.wants/kresd.target' → '/usr/lib/systemd/system/kresd.target'. 218s Setting up knot-dnsutils (3.5.1-1) ... 218s Processing triggers for man-db (2.13.1-1) ... 220s Processing triggers for libc-bin (2.42-0ubuntu3) ... 221s autopkgtest [16:08:30]: test roundtrip: [----------------------- 221s /usr/sbin/kresd + /usr/bin/kdig roundtrip tests 221s ------------ 221s workdir: /tmp/autopkgtest.QqprbV/roundtrip-artifacts 221s IP addr: 127.164.181.65 221s kresd args: --addr=127.164.181.65@8053 --tls=127.164.181.65@8853 --noninteractive --config=/tmp/autopkgtest.QqprbV/roundtrip-artifacts/kresd.conf --verbose --verbose --verbose 221s 221s make Certificate Authority key and certificate 221s ---------------------------------------------- 222s Generating a 3072 bit RSA private key... 222s Generating a self signed certificate... 222s X.509 Certificate Information: 222s Version: 3 222s Serial Number (hex): 7ed56cb68ca7bf5a8d2859865b1503485183cd77 222s Validity: 222s Not Before: Tue Nov 04 16:08:31 UTC 2025 222s Not After: Sun Nov 16 16:08:31 UTC 2025 222s Subject: CN=testing certificate authority (NOT FOR PRODUCTION) 222s Subject Public Key Algorithm: RSA 222s Algorithm Security Level: High (3072 bits) 222s Modulus (bits 3072): 222s 00:c4:f6:c2:03:a8:84:b8:06:c7:78:15:76:a5:79:18 222s bd:8d:70:41:65:e0:5b:41:2b:59:85:f0:20:4f:c8:54 222s cb:90:8c:8c:70:52:cd:0e:ba:f0:b5:0e:d9:20:26:61 222s f1:e5:c5:1c:37:2a:dc:42:37:e8:a9:e5:63:ad:45:c8 222s 62:a5:72:3d:bf:c3:a2:d7:7b:28:6b:09:04:35:da:6c 222s c9:90:85:e9:fc:48:f4:ef:e3:a0:a0:a7:63:d0:e8:bb 222s 14:13:6f:bb:44:a5:69:72:aa:e9:a2:37:13:0d:95:61 222s dd:aa:ed:fe:9b:eb:f5:b4:eb:2e:2a:d3:4f:85:cf:c7 222s 28:1c:ae:f7:26:44:d9:04:60:3a:32:7b:25:f3:66:bd 222s ef:46:8b:09:35:4c:6f:05:02:9d:7e:2f:f2:a8:93:be 222s 62:7a:10:16:47:92:c2:03:3a:d7:36:da:09:93:18:46 222s 4f:c5:9b:b2:60:b9:7f:d3:3a:a9:96:1d:24:44:98:5c 222s 1b:fd:65:80:95:06:0b:5a:1d:f7:62:75:24:05:05:6b 222s d8:1d:1c:6c:51:7c:c2:57:35:f8:99:29:ac:30:d9:b0 222s f3:cc:06:8b:c5:33:b5:b4:d4:dc:37:12:b5:5f:ca:65 222s 80:e3:62:57:38:cf:e2:48:90:9b:d3:ec:a9:0d:3e:9d 222s 9f:22:18:72:10:3d:fd:58:65:ac:3b:96:5f:4d:44:7a 222s 4e:47:64:a4:68:db:2a:5d:47:0d:9e:42:bd:f4:9b:84 222s b6:dc:a2:36:8d:90:51:c3:3f:3f:6f:1a:9b:57:eb:5a 222s 97:2a:13:bf:d3:5a:3b:ef:5e:f7:4a:85:c7:bc:d4:94 222s 18:16:74:3f:2f:52:be:9c:3e:22:a4:b0:36:59:82:82 222s 95:86:da:c5:33:5a:a7:54:8f:b9:a7:f8:11:c5:ce:a6 222s bd:d4:fb:70:24:a2:c1:80:17:5c:bd:1f:e2:b5:56:9c 222s 46:de:89:0d:8c:01:a1:c8:92:87:71:18:a5:4a:e6:9a 222s 5b 222s Exponent (bits 24): 222s 01:00:01 222s Extensions: 222s Basic Constraints (critical): 222s Certificate Authority (CA): TRUE 222s Path Length Constraint: 1 222s Name Constraints (critical): 222s Permitted: 222s DNSname: example 222s Key Usage (critical): 222s Certificate signing. 222s Subject Key Identifier (not critical): 222s 42df10e72d30d87a6ac384e9b1ada5c9f44e91b7 222s Other Information: 222s Public Key ID: 222s sha1:42df10e72d30d87a6ac384e9b1ada5c9f44e91b7 222s sha256:a1f73feffc0a1a5e042ccfcf4a6cded2f4d006b566b1a1d363333243d9d62638 222s Public Key PIN: 222s pin-sha256:ofc/7/wKGl4ELM/PSmze0vTQBrVmsaHTYzMyQ9nWJjg= 222s 222s 222s 222s Signing certificate... 222s 222s make Bogus Certificate Authority key and certificate 222s ---------------------------------------------------- 223s Generating a 3072 bit RSA private key... 223s Generating a self signed certificate... 223s X.509 Certificate Information: 223s Version: 3 223s Serial Number (hex): 4efdd7e2c40e4f15b80d84a6362f79df65ed4fd8 223s Validity: 223s Not Before: Tue Nov 04 16:08:32 UTC 2025 223s Not After: Sun Nov 16 16:08:32 UTC 2025 223s Subject: CN=testing certificate authority (NOT FOR PRODUCTION) 223s Subject Public Key Algorithm: RSA 223s Algorithm Security Level: High (3072 bits) 223s Modulus (bits 3072): 223s 00:a1:6d:33:3e:15:78:56:f9:81:48:1b:02:dd:7c:9d 223s 6b:c8:f5:c4:42:46:58:1d:b7:6e:5f:91:83:25:f5:da 223s b6:b4:4e:22:37:54:1d:dd:bb:cc:23:1e:7e:05:2e:c8 223s dc:a9:c7:2e:04:49:9c:a4:e5:28:05:ab:65:54:ea:03 223s 87:43:2c:23:f5:11:c9:4b:9c:af:48:f7:26:ba:60:d1 223s a9:e1:29:97:96:92:a4:2f:f4:46:2c:df:3d:cf:70:7e 223s ed:9c:3d:26:d4:39:70:79:2c:62:45:0f:00:3d:ab:3f 223s ce:e8:8c:32:90:2f:6d:94:7d:3c:88:51:5f:38:1f:15 223s fd:18:ba:bd:04:f3:a5:57:73:2a:63:ae:59:4c:89:f4 223s d4:c8:52:14:f7:59:d8:e4:e8:73:44:62:6b:7c:4f:f8 223s d4:13:9b:c0:c3:a0:35:ae:55:52:23:db:2a:d9:99:87 223s 2b:db:e5:70:70:87:3b:8b:f0:8a:2f:4e:38:5f:67:2f 223s 0b:ca:34:6b:53:0f:ef:c2:d3:51:b5:64:7d:5c:fd:54 223s ce:50:bc:60:81:a5:38:0b:e6:dd:ef:e8:30:f0:1c:e3 223s 9b:47:db:fc:12:c5:d9:09:f0:d6:11:d1:8a:c8:3e:61 223s 1e:fe:ce:86:9a:c3:ca:14:0c:30:a3:fd:b3:54:59:60 223s ce:16:ce:3c:03:6f:38:f4:c4:e4:2d:c8:2b:8d:b6:86 223s b0:0f:b2:6f:8a:b7:88:4b:39:24:ee:99:11:63:2b:b8 223s 0b:f5:4e:e1:c5:71:24:0a:57:cb:fc:03:07:a9:79:43 223s c4:89:62:55:25:2b:fa:3c:87:9f:61:44:da:89:95:fd 223s 69:9a:8f:b4:d1:17:d0:d3:3a:3d:df:df:28:68:25:8c 223s 61:0b:31:ef:28:b4:07:2f:7f:44:f1:b2:e2:0f:41:8d 223s d3:77:16:56:7e:60:3d:c1:8a:bd:30:37:fe:aa:f6:1f 223s c0:72:39:39:4c:b3:5c:1f:4d:58:f5:96:5c:fa:f0:5c 223s 1f 223s Exponent (bits 24): 223s 01:00:01 223s Extensions: 223s Basic Constraints (critical): 223s Certificate Authority (CA): TRUE 223s Path Length Constraint: 1 223s Name Constraints (critical): 223s Permitted: 223s DNSname: example 223s Key Usage (critical): 223s Certificate signing. 223s Subject Key Identifier (not critical): 223s 8616a1100cfd4dc3d989eaf9e6cbe0020296c9b8 223s Other Information: 223s Public Key ID: 223s sha1:8616a1100cfd4dc3d989eaf9e6cbe0020296c9b8 223s sha256:13247cfcb013a3799dfc866c83b7bcaaafc7d55d11784b5cd23152f5e16cdaad 223s Public Key PIN: 223s pin-sha256:EyR8/LATo3md/IZsg7e8qq/H1V0ReEtc0jFS9eFs2q0= 223s 223s 223s 223s Signing certificate... 223s 223s make End Entity key and certificate 223s ----------------------------------- 223s Generating a 3072 bit RSA private key... 223s Generating a signed certificate... 223s X.509 Certificate Information: 223s Version: 3 223s Serial Number (hex): 0a12cf72c45fc5cf13e1d05ce036f8b4b1d15a6b 223s Validity: 223s Not Before: Tue Nov 04 16:08:32 UTC 2025 223s Not After: Fri Nov 14 16:08:32 UTC 2025 223s Subject: CN=test.example 223s Subject Public Key Algorithm: RSA 223s Algorithm Security Level: High (3072 bits) 223s Modulus (bits 3072): 223s 00:9b:74:3e:1c:b2:5a:0e:ca:e0:45:d1:ae:6a:a2:56 223s 9b:ec:6f:84:22:f2:7d:fa:7e:cb:6f:70:bb:65:43:0d 223s b4:49:74:1d:1b:44:7e:c6:00:fd:c6:c6:21:76:03:de 223s a5:cf:43:7e:09:12:1f:ce:55:3b:36:57:67:de:7e:67 223s 21:c2:16:3f:ff:22:e1:65:bf:de:3f:a2:6b:8a:b5:0a 223s 37:d0:c2:58:48:30:c6:1c:84:0e:7c:8c:ea:38:c3:ff 223s a2:54:70:5d:4f:86:48:b5:47:cf:a5:54:46:4b:48:75 223s 24:74:fc:73:a0:32:a7:df:1e:ea:20:22:07:b4:06:93 223s aa:ba:60:9f:81:f2:0a:84:b4:cb:f8:bc:60:af:35:23 223s bf:c7:db:6e:90:34:c6:07:4b:85:16:7c:d4:67:6e:15 223s e6:7f:56:99:8a:b9:13:b6:8e:d2:bb:36:63:d4:20:8d 223s 85:4a:82:3c:a1:cd:0d:a0:cf:0e:d5:08:81:0a:26:d4 223s 75:38:ca:fd:f1:a8:cf:01:5a:c9:9c:33:4f:3d:da:14 223s 08:58:4b:5d:f1:e8:e7:61:fa:2b:80:25:fb:38:fb:dd 223s 95:72:10:a3:da:eb:4a:b4:e2:8f:35:e8:b4:9b:d0:83 223s 49:15:93:7b:74:f3:d4:62:e7:be:d1:79:16:b9:f4:e8 223s 1d:2f:0f:17:36:a4:5e:f9:99:21:be:ce:39:71:99:17 223s a8:1c:5f:77:0b:48:ab:9e:de:76:1a:2a:6a:25:aa:be 223s 6f:a1:a5:9d:1f:84:78:6b:08:bd:f9:82:8f:3c:6c:ed 223s fc:0a:4f:a6:b8:b3:63:76:8a:25:75:ca:65:26:86:4d 223s 2f:9e:23:f0:9b:28:ad:32:45:bb:05:74:9d:30:35:5b 223s 6b:8a:5e:1e:c3:6b:e0:96:3f:48:6b:74:59:6f:f0:b0 223s 4a:7a:29:58:04:93:a6:0f:44:bd:fd:a9:74:b9:de:af 223s b2:b7:39:e6:33:ee:df:3a:b3:6c:e5:ee:89:d9:18:ac 223s e3 223s Exponent (bits 24): 223s 01:00:01 223s Extensions: 223s Basic Constraints (critical): 223s Certificate Authority (CA): FALSE 223s Subject Alternative Name (not critical): 223s DNSname: test.example 223s Key Purpose (not critical): 223s TLS WWW Server. 223s Key Usage (critical): 223s Digital signature. 223s Subject Key Identifier (not critical): 223s 5fbfed59166f18f9cde38d45bd191b58694bd44c 223s Authority Key Identifier (not critical): 223s 42df10e72d30d87a6ac384e9b1ada5c9f44e91b7 223s Other Information: 223s Public Key ID: 223s sha1:5fbfed59166f18f9cde38d45bd191b58694bd44c 223s sha256:83a6e60bf54e2de8da977dce7f8903c2b3a093690cbcd587118cb86caa3fcc82 223s Public Key PIN: 223s pin-sha256:g6bmC/VOLejal33Of4kDwrOgk2kMvNWHEYy4bKo/zII= 223s 223s 223s 223s Signing certificate... 223s 223s set up kresd daemon on 127.164.181.65 on ports 8053 (UDP, TCP) and 8853 (TLS) 223s ----------------------------------------------------------------------------- 224s 224s test UDP with kdig 224s ------------------ 224s successful UDP request to 127.164.181.65 on port 8053 224s 224s test TCP with kdig 224s ------------------ 224s successful TCP request to 127.164.181.65 on port 8053 224s 224s test opportunistic DNS-over-TLS with kdig 224s ----------------------------------------- 224s successful opportunistic DNS-over-TLS request to 127.164.181.65 on port 8853 224s 224s test strict DNS-over-TLS with kdig 224s ---------------------------------- 224s successful strict DNS-over-TLS request to 127.164.181.65 on port 8853 224s 224s test invalid name with strict DNS-over-TLS with kdig 224s ---------------------------------------------------- 224s successful strict DNS-over-TLS request failure when name mismatch to 127.164.181.65 on port 8853 224s 224s test bad authority with strict DNS-over-TLS with kdig 224s ----------------------------------------------------- 224s successful strict DNS-over-TLS request failure to 127.164.181.65 on port 8853 224s 224s cleaning up 224s ----------- 224s 266525 4 drwxr-xr-x 2 root root 4096 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts 224s 266538 8 -rw------- 1 root root 8180 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/ee-key.pem 224s 266539 4 -rw-r--r-- 1 root root 2218 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/ee-pubkey.pem 224s 266535 8 -rw------- 1 root root 8167 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/bogus-key.pem 224s 266902 4 -rw-r--r-- 1 root root 120 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/badname.err 224s 266534 4 -rw-r--r-- 1 root root 1590 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/ca-cert.pem 224s 266533 8 -rw------- 1 root root 8177 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/ca-key.pem 224s 266540 4 -rw-r--r-- 1 root root 1602 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/ee-cert.pem 224s 266802 102400 -rw-r----- 1 root root 104857600 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/data.mdb 224s 266541 4 -rw-r--r-- 1 root root 387 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/kresd.conf 224s 266536 4 -rw-r--r-- 1 root root 1590 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/bogus-cert.pem 224s 266537 4 -rw-r--r-- 1 root root 92 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/ee.template 224s 266903 4 -rw-r--r-- 1 root root 120 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/badca.err 224s 266542 68 -rw-r--r-- 1 root root 69559 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/kresd.err 224s 266543 4 -rw-r----- 1 root root 8256 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/lock.mdb 224s 266532 4 -rw-r--r-- 1 root root 136 Nov 4 16:08 /tmp/autopkgtest.QqprbV/roundtrip-artifacts/ca.template 224s ==> /tmp/autopkgtest.QqprbV/roundtrip-artifacts/badca.err <== 224s ;; WARNING: TLS, handshake failed (Error in the certificate.) 224s ;; ERROR: failed to query server 127.164.181.65@8853(TCP) 224s 224s ==> /tmp/autopkgtest.QqprbV/roundtrip-artifacts/badname.err <== 224s ;; WARNING: TLS, handshake failed (Error in the certificate.) 224s ;; ERROR: failed to query server 127.164.181.65@8853(TCP) 224s 224s ==> /tmp/autopkgtest.QqprbV/roundtrip-artifacts/kresd.err <== 224s [system] increasing file-descriptor limit: 1024 -> 524288 224s [tls ] session ticket: epoch 430242, scheduling rotation check in 2815612 ms 224s [wtchdg] disabled in systemd (WatchdogSec= not specified) 224s [ta ] installed trust anchors for domain . are: 224s . 3600 DNSKEY 257 3 8 AwEAAaz/tAm8yTn4Mfeh5eyI96WSVexTBAvkMgJzkKTOiW1vkIbzxeF3+/4RgWOq7HrxRixHlFlExOLAJr5emLvN7SWXgnLh4+B5xQlNVz8Og8kvArMtNROxVQuCaSnIDdD5LKyWbRd2n9WGe2R8PzgCmr3EgVLrjyBxWezF0jLHwVN8efS3rCj/EWgvIWgb9tarpVUDK/b58Da+sqqls3eNbuv7pr+eoZG+SrDK6nWeL3c6H5Apxz7LjVc1uTIdsIXxuOLYA4/ilBmSVIzuDWfdRUfhHdY6+cn8HFRm+2hM8AnXGXws9555KrUB5qihylGa8subX2Nn6UwNR1AkUTV74bU= ; Valid: ; KeyTag:20326 224s . 3600 DNSKEY 257 3 8 AwEAAa96jeuknZlaeSrvyAJj6ZHv28hhOKkx3rLGXVaC6rXTsDc449/cidltpkyGwCJNnOAlFNKF2jBosZBU5eeHspaQWOmOElZsjICMQMC3aeHbGiShvZsx4wMYSjH8e7Vrhbu6irwCzVBApESjbUdpWWmEnhathWu1jo+siFUiRAAxm9qyJNg/wOZqqzL/dL/q8PkcRU5oUKEpUge71M3ej2/7CPqpdVwuMoTvoB+ZOT4YeGyxMvHmbrxlFzGOHOijtzN+u1TQNatX2XBuzZNQ1K+s2CXkPIZo7s6JgZyvaBevYtxPvYLw4z9mR7K2vaF18UYH9Z9GNUUeayffKC73PYc= ; Valid: ; KeyTag:38696 224s 224s [system] loading config '/tmp/autopkgtest.QqprbV/roundtrip-artifacts/kresd.conf' (workdir '/tmp/autopkgtest.QqprbV/roundtrip-artifacts') 224s [system] deprecation WARNING: use log_level() instead of verbose() 224s [gnutls] (3) ASSERT: ../../../lib/x509/x509_ext.c[gnutls_subject_alt_names_get]:107 224s [gnutls] (3) ASSERT: ../../../lib/x509/x509.c[get_alt_name]:2012 224s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 224s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 224s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 224s [tls ] RFC 7858 OOB key-pin (0): pin-sha256="" 224s [gnutls] (3) ASSERT: ../../lib/cert-cred-x509.c[gnutls_certificate_get_x509_crt]:872 224s [system] loading config '/usr/lib/aarch64-linux-gnu/knot-resolver/postconfig.lua' (workdir '/tmp/autopkgtest.QqprbV/roundtrip-artifacts') 224s [plan ][00000.00] plan '.' type 'NS' uid [65536.00] 224s [iterat][65536.00] '.' type 'NS' new uid was assigned .01, parent uid .00 224s [resolv][65536.01] => using root hints 224s [iterat][65536.01] '.' type 'NS' new uid was assigned .02, parent uid .00 224s [resolv][65536.02] >< TA: '.' 224s [plan ][65536.02] plan '.' type 'DNSKEY' uid [65536.03] 224s [iterat][65536.03] '.' type 'DNSKEY' new uid was assigned .04, parent uid .02 224s [select][65536.04] => id: '52452' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 224s [select][65536.04] => id: '52452' choosing: 'E.ROOT-SERVERS.NET.'@'192.203.230.10#00053' with timeout 400 ms zone cut: '.' 224s [resolv][65536.04] => id: '52452' querying: 'E.ROOT-SERVERS.NET.'@'192.203.230.10#00053' zone cut: '.' qname: '.' qtype: 'DNSKEY' proto: 'udp' 224s [plan ][00000.00] plan '.' type 'NS' uid [65537.00] 224s [iterat][65537.00] '.' type 'NS' new uid was assigned .01, parent uid .00 224s [resolv][65537.01] => using root hints 224s [iterat][65537.01] '.' type 'NS' new uid was assigned .02, parent uid .00 224s [select][65537.02] => id: '03050' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 224s [select][65537.02] => id: '03050' choosing: 'H.ROOT-SERVERS.NET.'@'2001:500:1::53#00053' with timeout 400 ms zone cut: '.' 224s [resolv][65537.02] => id: '03050' querying: 'H.ROOT-SERVERS.NET.'@'2001:500:1::53#00053' zone cut: '.' qname: '.' qtype: 'NS' proto: 'udp' 224s [taupd ] refreshing TA for . 224s [plan ][00000.00] plan '.' type 'DNSKEY' uid [65538.00] 224s [iterat][65538.00] '.' type 'DNSKEY' new uid was assigned .01, parent uid .00 224s [resolv][65538.01] => using root hints 224s [iterat][65538.01] '.' type 'DNSKEY' new uid was assigned .02, parent uid .00 224s [resolv][65538.02] >< TA: '.' 224s [select][65538.02] => id: '41647' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 224s [select][65538.02] => id: '41647' choosing: 'B.ROOT-SERVERS.NET.'@'170.247.170.2#00053' with timeout 400 ms zone cut: '.' 224s [select][65536.04] => id: '52452' noting selection error: 'E.ROOT-SERVERS.NET.'@'192.203.230.10#00053' zone cut: '.' error: 1 QUERY_TIMEOUT 224s [iterat][65538.02] '.' type 'DNSKEY' new uid was assigned .03, parent uid .00 224s [select][65538.03] => id: '60986' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 224s [select][65538.03] => id: '60986' choosing: 'C.ROOT-SERVERS.NET.'@'192.33.4.12#00053' with timeout 400 ms zone cut: '.' 224s [resolv][65538.03] => id: '60986' querying: 'C.ROOT-SERVERS.NET.'@'192.33.4.12#00053' zone cut: '.' qname: '.' qtype: 'DNSKEY' proto: 'udp' 224s [iterat][65536.04] '.' type 'DNSKEY' new uid was assigned .05, parent uid .02 224s [select][65536.05] => id: '33265' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 224s [select][65536.05] => id: '33265' choosing: 'D.ROOT-SERVERS.NET.'@'2001:500:2d::d#00053' with timeout 800 ms zone cut: '.' 224s [select][65537.02] NO6: timed out, appended, timeouts 1/6 224s [select][65537.02] => id: '03050' noting selection error: 'H.ROOT-SERVERS.NET.'@'2001:500:1::53#00053' zone cut: '.' error: 1 QUERY_TIMEOUT 224s [iterat][65537.02] '.' type 'NS' new uid was assigned .03, parent uid .00 224s [select][65537.03] => id: '01418' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 224s [select][65537.03] => id: '01418' choosing: 'D.ROOT-SERVERS.NET.'@'199.7.91.13#00053' with timeout 800 ms zone cut: '.' 224s [resolv][65537.03] => id: '01418' querying: 'D.ROOT-SERVERS.NET.'@'199.7.91.13#00053' zone cut: '.' qname: '.' qtype: 'NS' proto: 'udp' 224s [select][65538.03] => id: '60986' noting selection error: 'C.ROOT-SERVERS.NET.'@'192.33.4.12#00053' zone cut: '.' error: 1 QUERY_TIMEOUT 224s [iterat][65536.05] '.' type 'DNSKEY' new uid was assigned .06, parent uid .02 224s [select][65536.06] => id: '05747' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 224s [select][65536.06] => id: '05747' choosing: 'M.ROOT-SERVERS.NET.'@'2001:dc3::35#00053' with timeout 800 ms zone cut: '.' 224s [resolv][65536.06] => id: '05747' querying: 'M.ROOT-SERVERS.NET.'@'2001:dc3::35#00053' zone cut: '.' qname: '.' qtype: 'DNSKEY' proto: 'udp' 224s [iterat][65538.03] '.' type 'DNSKEY' new uid was assigned .04, parent uid .00 224s [select][65538.04] => id: '41810' choosing from addresses: 13 v4 + 13 v6; names to resolve: 0 v4 + 0 v6; force_resolve: 0; NO6: IPv6 is OK 224s [select][65538.04] => id: '41810' choosing: 'I.ROOT-SERVERS.NET.'@'2001:7fe::53#00053' with timeout 800 ms zone cut: '.' 224s [plan ][00000.00] plan 'monkeys.example.' type 'A' uid [38414.00] 224s [iterat][38414.00] 'monkeys.example.' type 'A' new uid was assigned .01, parent uid .00 224s [hint ][38414.01] <= answered from hints 224s [iterat][38414.01] <= rcode: NOERROR 224s [resolv][38414.01] AD: request NOT classified as SECURE 224s [resolv][38414.01] finished in state: 4, queries: 1, mempool: 16400 B 224s [plan ][00000.00] plan 'monkeys.example.' type 'A' uid [25107.00] 224s [iterat][25107.00] 'monkeys.example.' type 'A' new uid was assigned .01, parent uid .00 224s [hint ][25107.01] <= answered from hints 224s [iterat][25107.01] <= rcode: NOERROR 224s [resolv][25107.01] AD: request NOT classified as SECURE 224s [resolv][25107.01] finished in state: 4, queries: 1, mempool: 81952 B 224s [io ] => connection to '127.0.0.1#35083' closed by peer (end of file) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Allocating epoch #0 224s [gnutls] (2) added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 224s [gnutls] (5) REC[0xf59ebfdf0000]: Allocating epoch #1 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 224s [gnutls] (5) REC[0xf59ebfdf0000]: SSL 3.3 Handshake packet received. Epoch 0, length: 330 224s [gnutls] (5) REC[0xf59ebfdf0000]: Expected Packet Handshake(22) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Received Packet Handshake(22) with length: 330 224s [gnutls] (5) REC[0xf59ebfdf0000]: Decrypted Packet[0] Handshake(22) with length: 330 224s [gnutls] (4) HSK[0xf59ebfdf0000]: CLIENT HELLO (1) was received. Length 326[326], frag offset 0, frag length: 326, sequence: 0 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Client's version: 3.3 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Supported Versions/43' (5 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Found version: 3.4 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Found version: 3.3 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Negotiated version: 3.4 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'ALPN/16' (6 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Extended Master Secret/23' (0 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Record Size Limit/28' (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: record_size_limit 16385 negotiated 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Supported Groups/10' (10 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group X25519 (0x1d) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group SECP256R1 (0x17) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group SECP384R1 (0x18) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group SECP521R1 (0x19) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Selected group X25519 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: PSK KE mode 01 received 224s [gnutls] (4) EXT[0xf59ebfdf0000]: PSK KE mode 00 received 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Session Ticket/35' (0 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Signature Algorithms/13' (34 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (4.1) RSA-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.9) RSA-PSS-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.7) EdDSA-Ed25519 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (5.1) RSA-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.10) RSA-PSS-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.8) EdDSA-Ed448 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (6.1) RSA-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.11) RSA-PSS-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (2.1) RSA-SHA1 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (2.3) ECDSA-SHA1 224s [gnutls] (2) checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 224s [gnutls] (3) ASSERT: ../../../lib/ext/server_name.c[gnutls_server_name_get]:234 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Requested server name: '' 224s [gnutls] (4) HSK[0xf59ebfdf0000]: checking compat of GNUTLS_AES_256_GCM_SHA384 with certificate[0] (RSA/X.509) 224s [gnutls] (4) checking cert compat with RSA-SHA256 224s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 224s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 224s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 224s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 224s [gnutls] (4) Selected signature algorithm: RSA-PSS-RSAE-SHA256 224s [gnutls] (2) Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Selected version TLS1.3 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'OCSP Status Request/5' (5 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: OCSP status was requested 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Key Share/51' (107 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received key share for X25519 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Selected group X25519 (6) 224s [gnutls] (2) EXT[0xf59ebfdf0000]: server generated X25519 shared key 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Safe renegotiation succeeded 224s [gnutls] (4) HSK[0xf59ebfdf0000]: SessionID: 00 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: sending key share for X25519 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension Key Share/51 (36 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension Supported Versions/43 (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 224s [gnutls] (4) HSK[0xf59ebfdf0000]: SERVER HELLO was queued [90 bytes] 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 90 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[1] Handshake(22) in epoch 0 and length: 95 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 224s [gnutls] (4) REC[0xf59ebfdf0000]: Sent ChangeCipherSpec 224s [gnutls] (5) REC[0xf59ebfdf0000]: Initializing epoch #1 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #1 ready 224s [gnutls] (4) HSK[0xf59ebfdf0000]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (SRTP/14) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (ALPN/16) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension ALPN/16 (6 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Key Share/51) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Cookie/44) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Early Data/42) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension Record Size Limit/28 (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 224s [gnutls] (4) HSK[0xf59ebfdf0000]: ENCRYPTED EXTENSIONS was queued [22 bytes] 224s [gnutls] (4) HSK[0xf59ebfdf0000]: CERTIFICATE was queued [1155 bytes] 224s [gnutls] (4) checking cert compat with RSA-SHA256 224s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 224s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 224s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 224s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 224s [gnutls] (4) HSK[0xf59ebfdf0000]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 224s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 224s [gnutls] (4) HSK[0xf59ebfdf0000]: CERTIFICATE VERIFY was queued [392 bytes] 224s [gnutls] (4) HSK[0xf59ebfdf0000]: sending finished 224s [gnutls] (4) HSK[0xf59ebfdf0000]: FINISHED was queued [52 bytes] 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 22 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[1] Handshake(22) in epoch 1 and length: 44 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 1155 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[2] Handshake(22) in epoch 1 and length: 1177 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 392 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[3] Handshake(22) in epoch 1 and length: 414 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[4] Handshake(22) in epoch 1 and length: 74 224s [gnutls] (3) ASSERT: ../../lib/constate.c[_gnutls_epoch_get]:965 224s [gnutls] (5) REC[0xf59ebfdf0000]: Allocating epoch #2 224s [gnutls] (4) HSK[0xf59ebfdf0000]: unauthenticated session eligible for early start 224s [gnutls] (5) REC[0xf59ebfdf0000]: Initializing epoch #2 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #2 ready 224s [gnutls] (4) HSK[0xf59ebfdf0000]: TLS 1.3 set write key with cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) HSK[0xf59ebfdf0000]: switching early to application traffic keys 224s [gnutls] (4) HSK[0xf59ebfdf0000]: NEW SESSION TICKET was queued [251 bytes] 224s [gnutls] (4) HSK[0xf59ebfdf0000]: NEW SESSION TICKET was queued [251 bytes] 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[1] Handshake(22) in epoch 2 and length: 273 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[2] Handshake(22) in epoch 2 and length: 273 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 224s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 224s [gnutls] (5) REC[0xf59ebfdf0000]: SSL 3.3 Application Data packet received. Epoch 1, length: 69 224s [gnutls] (5) REC[0xf59ebfdf0000]: Expected Packet Handshake(22) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Received Packet Application Data(23) with length: 69 224s [gnutls] (5) REC[0xf59ebfdf0000]: Decrypted Packet[0] Handshake(22) with length: 52 224s [gnutls] (4) HSK[0xf59ebfdf0000]: FINISHED (20) was received. Length 48[48], frag offset 0, frag length: 48, sequence: 0 224s [gnutls] (4) HSK[0xf59ebfdf0000]: parsing finished 224s [gnutls] (4) HSK[0xf59ebfdf0000]: TLS 1.3 set read key with cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (5) REC[0xf59ebfdf0000]: Start of epoch cleanup 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #0 freed 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #1 freed 224s [gnutls] (5) REC[0xf59ebfdf0000]: End of epoch cleanup 224s [tls ] TLS handshake with 127.0.0.1#42903 has completed 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 224s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_int]:1759 224s [gnutls] (5) REC[0xf59ebfdf0000]: SSL 3.3 Application Data packet received. Epoch 2, length: 147 224s [gnutls] (5) REC[0xf59ebfdf0000]: Expected Packet Application Data(23) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Received Packet Application Data(23) with length: 147 224s [gnutls] (5) REC[0xf59ebfdf0000]: Decrypted Packet[0] Application Data(23) with length: 130 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 224s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_int]:1759 224s [plan ][00000.00] plan 'monkeys.example.' type 'A' uid [39363.00] 224s [iterat][39363.00] 'monkeys.example.' type 'A' new uid was assigned .01, parent uid .00 224s [hint ][39363.01] <= answered from hints 224s [iterat][39363.01] <= rcode: NOERROR 224s [resolv][39363.01] AD: request NOT classified as SECURE 224s [resolv][39363.01] finished in state: 4, queries: 1, mempool: 81952 B 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Application Data(23) with length: 470 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[3] Application Data(23) in epoch 2 and length: 492 224s [gnutls] (5) REC[0xf59ebfdf0000]: SSL 3.3 Application Data packet received. Epoch 2, length: 19 224s [gnutls] (5) REC[0xf59ebfdf0000]: Expected Packet Application Data(23) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Received Packet Application Data(23) with length: 19 224s [gnutls] (5) REC[0xf59ebfdf0000]: Decrypted Packet[1] Alert(21) with length: 2 224s [gnutls] (5) REC[0xf59ebfdf0000]: Alert[1|0] - Close notify - was received 224s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_in_buffers]:1565 224s [io ] => connection to '127.0.0.1#42903' closed by peer (end of file) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Start of epoch cleanup 224s [gnutls] (5) REC[0xf59ebfdf0000]: End of epoch cleanup 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #2 freed 224s [gnutls] (5) REC[0xf59ebfdf0000]: Allocating epoch #0 224s [gnutls] (2) added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 224s [gnutls] (5) REC[0xf59ebfdf0000]: Allocating epoch #1 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 224s [gnutls] (5) REC[0xf59ebfdf0000]: SSL 3.3 Handshake packet received. Epoch 0, length: 351 224s [gnutls] (5) REC[0xf59ebfdf0000]: Expected Packet Handshake(22) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Received Packet Handshake(22) with length: 351 224s [gnutls] (5) REC[0xf59ebfdf0000]: Decrypted Packet[0] Handshake(22) with length: 351 224s [gnutls] (4) HSK[0xf59ebfdf0000]: CLIENT HELLO (1) was received. Length 347[347], frag offset 0, frag length: 347, sequence: 0 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Client's version: 3.3 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Supported Versions/43' (5 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Found version: 3.4 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Found version: 3.3 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Negotiated version: 3.4 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Server Name Indication/0' (17 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Extended Master Secret/23' (0 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Record Size Limit/28' (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: record_size_limit 16385 negotiated 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'ALPN/16' (6 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: PSK KE mode 01 received 224s [gnutls] (4) EXT[0xf59ebfdf0000]: PSK KE mode 00 received 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Supported Groups/10' (10 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group X25519 (0x1d) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group SECP256R1 (0x17) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group SECP384R1 (0x18) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group SECP521R1 (0x19) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Selected group X25519 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Signature Algorithms/13' (34 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (4.1) RSA-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.9) RSA-PSS-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.7) EdDSA-Ed25519 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (5.1) RSA-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.10) RSA-PSS-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.8) EdDSA-Ed448 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (6.1) RSA-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.11) RSA-PSS-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (2.1) RSA-SHA1 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (2.3) ECDSA-SHA1 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Session Ticket/35' (0 bytes) 224s [gnutls] (2) checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Requested server name: 'test.example' 224s [gnutls] (4) checking cert compat with RSA-SHA256 224s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 224s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 224s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 224s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 224s [gnutls] (4) Selected signature algorithm: RSA-PSS-RSAE-SHA256 224s [gnutls] (2) Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Selected version TLS1.3 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'OCSP Status Request/5' (5 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: OCSP status was requested 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Key Share/51' (107 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received key share for X25519 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Selected group X25519 (6) 224s [gnutls] (2) EXT[0xf59ebfdf0000]: server generated X25519 shared key 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Safe renegotiation succeeded 224s [gnutls] (4) HSK[0xf59ebfdf0000]: SessionID: 00 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: sending key share for X25519 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension Key Share/51 (36 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension Supported Versions/43 (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 224s [gnutls] (4) HSK[0xf59ebfdf0000]: SERVER HELLO was queued [90 bytes] 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 90 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[1] Handshake(22) in epoch 0 and length: 95 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 224s [gnutls] (4) REC[0xf59ebfdf0000]: Sent ChangeCipherSpec 224s [gnutls] (5) REC[0xf59ebfdf0000]: Initializing epoch #1 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #1 ready 224s [gnutls] (4) HSK[0xf59ebfdf0000]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (SRTP/14) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (ALPN/16) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension ALPN/16 (6 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Key Share/51) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Cookie/44) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Early Data/42) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension Record Size Limit/28 (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 224s [gnutls] (4) HSK[0xf59ebfdf0000]: ENCRYPTED EXTENSIONS was queued [22 bytes] 224s [gnutls] (4) HSK[0xf59ebfdf0000]: CERTIFICATE was queued [1155 bytes] 224s [gnutls] (4) checking cert compat with RSA-SHA256 224s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 224s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 224s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 224s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 224s [gnutls] (4) HSK[0xf59ebfdf0000]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 224s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 224s [gnutls] (4) HSK[0xf59ebfdf0000]: CERTIFICATE VERIFY was queued [392 bytes] 224s [gnutls] (4) HSK[0xf59ebfdf0000]: sending finished 224s [gnutls] (4) HSK[0xf59ebfdf0000]: FINISHED was queued [52 bytes] 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 22 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[1] Handshake(22) in epoch 1 and length: 44 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 1155 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[2] Handshake(22) in epoch 1 and length: 1177 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 392 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[3] Handshake(22) in epoch 1 and length: 414 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[4] Handshake(22) in epoch 1 and length: 74 224s [gnutls] (3) ASSERT: ../../lib/constate.c[_gnutls_epoch_get]:965 224s [gnutls] (5) REC[0xf59ebfdf0000]: Allocating epoch #2 224s [gnutls] (4) HSK[0xf59ebfdf0000]: unauthenticated session eligible for early start 224s [gnutls] (5) REC[0xf59ebfdf0000]: Initializing epoch #2 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #2 ready 224s [gnutls] (4) HSK[0xf59ebfdf0000]: TLS 1.3 set write key with cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) HSK[0xf59ebfdf0000]: switching early to application traffic keys 224s [gnutls] (4) HSK[0xf59ebfdf0000]: NEW SESSION TICKET was queued [251 bytes] 224s [gnutls] (4) HSK[0xf59ebfdf0000]: NEW SESSION TICKET was queued [251 bytes] 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[1] Handshake(22) in epoch 2 and length: 273 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[2] Handshake(22) in epoch 2 and length: 273 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 224s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 224s [gnutls] (5) REC[0xf59ebfdf0000]: SSL 3.3 Application Data packet received. Epoch 1, length: 69 224s [gnutls] (5) REC[0xf59ebfdf0000]: Expected Packet Handshake(22) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Received Packet Application Data(23) with length: 69 224s [gnutls] (5) REC[0xf59ebfdf0000]: Decrypted Packet[0] Handshake(22) with length: 52 224s [gnutls] (4) HSK[0xf59ebfdf0000]: FINISHED (20) was received. Length 48[48], frag offset 0, frag length: 48, sequence: 0 224s [gnutls] (4) HSK[0xf59ebfdf0000]: parsing finished 224s [gnutls] (4) HSK[0xf59ebfdf0000]: TLS 1.3 set read key with cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (5) REC[0xf59ebfdf0000]: Start of epoch cleanup 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #0 freed 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #1 freed 224s [gnutls] (5) REC[0xf59ebfdf0000]: End of epoch cleanup 224s [tls ] TLS handshake with 127.0.0.1#58457 has completed 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 224s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_int]:1759 224s [gnutls] (5) REC[0xf59ebfdf0000]: SSL 3.3 Application Data packet received. Epoch 2, length: 147 224s [gnutls] (5) REC[0xf59ebfdf0000]: Expected Packet Application Data(23) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Received Packet Application Data(23) with length: 147 224s [gnutls] (5) REC[0xf59ebfdf0000]: Decrypted Packet[0] Application Data(23) with length: 130 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 224s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_int]:1759 224s [plan ][00000.00] plan 'monkeys.example.' type 'A' uid [48331.00] 224s [iterat][48331.00] 'monkeys.example.' type 'A' new uid was assigned .01, parent uid .00 224s [hint ][48331.01] <= answered from hints 224s [iterat][48331.01] <= rcode: NOERROR 224s [resolv][48331.01] AD: request NOT classified as SECURE 224s [resolv][48331.01] finished in state: 4, queries: 1, mempool: 81952 B 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Application Data(23) with length: 470 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[3] Application Data(23) in epoch 2 and length: 492 224s [gnutls] (5) REC[0xf59ebfdf0000]: SSL 3.3 Application Data packet received. Epoch 2, length: 19 224s [gnutls] (5) REC[0xf59ebfdf0000]: Expected Packet Application Data(23) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Received Packet Application Data(23) with length: 19 224s [gnutls] (5) REC[0xf59ebfdf0000]: Decrypted Packet[1] Alert(21) with length: 2 224s [gnutls] (5) REC[0xf59ebfdf0000]: Alert[1|0] - Close notify - was received 224s [gnutls] (3) ASSERT: ../../lib/record.c[_gnutls_recv_in_buffers]:1565 224s [io ] => connection to '127.0.0.1#58457' closed by peer (end of file) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Start of epoch cleanup 224s [gnutls] (5) REC[0xf59ebfdf0000]: End of epoch cleanup 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #2 freed 224s [gnutls] (5) REC[0xf59ebfdf0000]: Allocating epoch #0 224s [gnutls] (2) added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 224s [gnutls] (5) REC[0xf59ebfdf0000]: Allocating epoch #1 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 224s [gnutls] (5) REC[0xf59ebfdf0000]: SSL 3.3 Handshake packet received. Epoch 0, length: 355 224s [gnutls] (5) REC[0xf59ebfdf0000]: Expected Packet Handshake(22) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Received Packet Handshake(22) with length: 355 224s [gnutls] (5) REC[0xf59ebfdf0000]: Decrypted Packet[0] Handshake(22) with length: 355 224s [gnutls] (4) HSK[0xf59ebfdf0000]: CLIENT HELLO (1) was received. Length 351[351], frag offset 0, frag length: 351, sequence: 0 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Client's version: 3.3 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Supported Versions/43' (5 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Found version: 3.4 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Found version: 3.3 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Negotiated version: 3.4 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Server Name Indication/0' (21 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Extended Master Secret/23' (0 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Record Size Limit/28' (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: record_size_limit 16385 negotiated 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'ALPN/16' (6 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: PSK KE mode 01 received 224s [gnutls] (4) EXT[0xf59ebfdf0000]: PSK KE mode 00 received 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Supported Groups/10' (10 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group X25519 (0x1d) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group SECP256R1 (0x17) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group SECP384R1 (0x18) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group SECP521R1 (0x19) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Selected group X25519 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Session Ticket/35' (0 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Signature Algorithms/13' (34 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (4.1) RSA-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.9) RSA-PSS-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.7) EdDSA-Ed25519 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (5.1) RSA-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.10) RSA-PSS-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.8) EdDSA-Ed448 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (6.1) RSA-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.11) RSA-PSS-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (2.1) RSA-SHA1 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (2.3) ECDSA-SHA1 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 224s [gnutls] (2) checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Requested server name: 'notright.example' 224s [gnutls] (4) HSK[0xf59ebfdf0000]: checking compat of GNUTLS_AES_256_GCM_SHA384 with certificate[0] (RSA/X.509) 224s [gnutls] (4) checking cert compat with RSA-SHA256 224s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 224s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 224s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 224s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 224s [gnutls] (4) Selected signature algorithm: RSA-PSS-RSAE-SHA256 224s [gnutls] (2) Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Selected version TLS1.3 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'OCSP Status Request/5' (5 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: OCSP status was requested 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Key Share/51' (107 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received key share for X25519 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Selected group X25519 (6) 224s [gnutls] (2) EXT[0xf59ebfdf0000]: server generated X25519 shared key 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Safe renegotiation succeeded 224s [gnutls] (4) HSK[0xf59ebfdf0000]: SessionID: 00 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: sending key share for X25519 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension Key Share/51 (36 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension Supported Versions/43 (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 224s [gnutls] (4) HSK[0xf59ebfdf0000]: SERVER HELLO was queued [90 bytes] 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 90 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[1] Handshake(22) in epoch 0 and length: 95 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 224s [gnutls] (4) REC[0xf59ebfdf0000]: Sent ChangeCipherSpec 224s [gnutls] (5) REC[0xf59ebfdf0000]: Initializing epoch #1 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #1 ready 224s [gnutls] (4) HSK[0xf59ebfdf0000]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (SRTP/14) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (ALPN/16) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension ALPN/16 (6 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Key Share/51) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Cookie/44) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Early Data/42) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension Record Size Limit/28 (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 224s [gnutls] (4) HSK[0xf59ebfdf0000]: ENCRYPTED EXTENSIONS was queued [22 bytes] 224s [gnutls] (4) HSK[0xf59ebfdf0000]: CERTIFICATE was queued [1155 bytes] 224s [gnutls] (4) checking cert compat with RSA-SHA256 224s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 224s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 224s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 224s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 224s [gnutls] (4) HSK[0xf59ebfdf0000]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 224s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 224s [gnutls] (4) HSK[0xf59ebfdf0000]: CERTIFICATE VERIFY was queued [392 bytes] 224s [gnutls] (4) HSK[0xf59ebfdf0000]: sending finished 224s [gnutls] (4) HSK[0xf59ebfdf0000]: FINISHED was queued [52 bytes] 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 22 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[1] Handshake(22) in epoch 1 and length: 44 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 1155 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[2] Handshake(22) in epoch 1 and length: 1177 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 392 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[3] Handshake(22) in epoch 1 and length: 414 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[4] Handshake(22) in epoch 1 and length: 74 224s [gnutls] (3) ASSERT: ../../lib/constate.c[_gnutls_epoch_get]:965 224s [gnutls] (5) REC[0xf59ebfdf0000]: Allocating epoch #2 224s [gnutls] (4) HSK[0xf59ebfdf0000]: unauthenticated session eligible for early start 224s [gnutls] (5) REC[0xf59ebfdf0000]: Initializing epoch #2 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #2 ready 224s [gnutls] (4) HSK[0xf59ebfdf0000]: TLS 1.3 set write key with cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) HSK[0xf59ebfdf0000]: switching early to application traffic keys 224s [gnutls] (4) HSK[0xf59ebfdf0000]: NEW SESSION TICKET was queued [251 bytes] 224s [gnutls] (4) HSK[0xf59ebfdf0000]: NEW SESSION TICKET was queued [251 bytes] 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[1] Handshake(22) in epoch 2 and length: 273 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[2] Handshake(22) in epoch 2 and length: 273 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 224s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 224s [io ] => connection to '127.0.0.1#55935' closed by peer (connection reset by peer) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Start of epoch cleanup 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #0 freed 224s [gnutls] (5) REC[0xf59ebfdf0000]: End of epoch cleanup 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #1 freed 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #2 freed 224s [gnutls] (5) REC[0xf59ebfdf0000]: Allocating epoch #0 224s [gnutls] (2) added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 224s [gnutls] (5) REC[0xf59ebfdf0000]: Allocating epoch #1 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 224s [gnutls] (5) REC[0xf59ebfdf0000]: SSL 3.3 Handshake packet received. Epoch 0, length: 351 224s [gnutls] (5) REC[0xf59ebfdf0000]: Expected Packet Handshake(22) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Received Packet Handshake(22) with length: 351 224s [gnutls] (5) REC[0xf59ebfdf0000]: Decrypted Packet[0] Handshake(22) with length: 351 224s [gnutls] (4) HSK[0xf59ebfdf0000]: CLIENT HELLO (1) was received. Length 347[347], frag offset 0, frag length: 347, sequence: 0 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Client's version: 3.3 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Supported Versions/43' (5 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Found version: 3.4 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Found version: 3.3 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Negotiated version: 3.4 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Server Name Indication/0' (17 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Extended Master Secret/23' (0 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'ALPN/16' (6 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Record Size Limit/28' (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: record_size_limit 16385 negotiated 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Supported Groups/10' (10 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group X25519 (0x1d) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group SECP256R1 (0x17) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group SECP384R1 (0x18) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received group SECP521R1 (0x19) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Selected group X25519 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Session Ticket/35' (0 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: PSK KE mode 01 received 224s [gnutls] (4) EXT[0xf59ebfdf0000]: PSK KE mode 00 received 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Signature Algorithms/13' (34 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (4.1) RSA-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.9) RSA-PSS-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.7) EdDSA-Ed25519 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (5.1) RSA-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.10) RSA-PSS-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.8) EdDSA-Ed448 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (6.1) RSA-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.11) RSA-PSS-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (2.1) RSA-SHA1 224s [gnutls] (4) EXT[0xf59ebfdf0000]: rcvd signature algo (2.3) ECDSA-SHA1 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 224s [gnutls] (2) checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Requested server name: 'test.example' 224s [gnutls] (4) checking cert compat with RSA-SHA256 224s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 224s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 224s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 224s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 224s [gnutls] (4) Selected signature algorithm: RSA-PSS-RSAE-SHA256 224s [gnutls] (2) Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Selected version TLS1.3 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'Key Share/51' (107 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Received key share for X25519 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Selected group X25519 (6) 224s [gnutls] (2) EXT[0xf59ebfdf0000]: server generated X25519 shared key 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Parsing extension 'OCSP Status Request/5' (5 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: OCSP status was requested 224s [gnutls] (4) HSK[0xf59ebfdf0000]: Safe renegotiation succeeded 224s [gnutls] (4) HSK[0xf59ebfdf0000]: SessionID: 00 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: sending key share for X25519 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension Key Share/51 (36 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension Supported Versions/43 (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 224s [gnutls] (4) HSK[0xf59ebfdf0000]: SERVER HELLO was queued [90 bytes] 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 90 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[1] Handshake(22) in epoch 0 and length: 95 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 224s [gnutls] (4) REC[0xf59ebfdf0000]: Sent ChangeCipherSpec 224s [gnutls] (5) REC[0xf59ebfdf0000]: Initializing epoch #1 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #1 ready 224s [gnutls] (4) HSK[0xf59ebfdf0000]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (SRTP/14) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (ALPN/16) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension ALPN/16 (6 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Key Share/51) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Cookie/44) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Early Data/42) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Sending extension Record Size Limit/28 (2 bytes) 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 224s [gnutls] (4) EXT[0xf59ebfdf0000]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 224s [gnutls] (4) HSK[0xf59ebfdf0000]: ENCRYPTED EXTENSIONS was queued [22 bytes] 224s [gnutls] (4) HSK[0xf59ebfdf0000]: CERTIFICATE was queued [1155 bytes] 224s [gnutls] (4) checking cert compat with RSA-SHA256 224s [gnutls] (3) ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 224s [gnutls] (4) Signature algorithm RSA-SHA256 is not enabled 224s [gnutls] (4) checking cert compat with RSA-PSS-SHA256 224s [gnutls] (4) checking cert compat with RSA-PSS-RSAE-SHA256 224s [gnutls] (4) HSK[0xf59ebfdf0000]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 224s [gnutls] (3) ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 224s [gnutls] (4) HSK[0xf59ebfdf0000]: CERTIFICATE VERIFY was queued [392 bytes] 224s [gnutls] (4) HSK[0xf59ebfdf0000]: sending finished 224s [gnutls] (4) HSK[0xf59ebfdf0000]: FINISHED was queued [52 bytes] 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 22 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[1] Handshake(22) in epoch 1 and length: 44 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 1155 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[2] Handshake(22) in epoch 1 and length: 1177 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 392 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[3] Handshake(22) in epoch 1 and length: 414 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[4] Handshake(22) in epoch 1 and length: 74 224s [gnutls] (3) ASSERT: ../../lib/constate.c[_gnutls_epoch_get]:965 224s [gnutls] (5) REC[0xf59ebfdf0000]: Allocating epoch #2 224s [gnutls] (4) HSK[0xf59ebfdf0000]: unauthenticated session eligible for early start 224s [gnutls] (5) REC[0xf59ebfdf0000]: Initializing epoch #2 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #2 ready 224s [gnutls] (4) HSK[0xf59ebfdf0000]: TLS 1.3 set write key with cipher suite: GNUTLS_AES_256_GCM_SHA384 224s [gnutls] (4) HSK[0xf59ebfdf0000]: switching early to application traffic keys 224s [gnutls] (4) HSK[0xf59ebfdf0000]: NEW SESSION TICKET was queued [251 bytes] 224s [gnutls] (4) HSK[0xf59ebfdf0000]: NEW SESSION TICKET was queued [251 bytes] 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[1] Handshake(22) in epoch 2 and length: 273 224s [gnutls] (5) REC[0xf59ebfdf0000]: Preparing Packet Handshake(22) with length: 251 and min pad: 0 224s [gnutls] (5) REC[0xf59ebfdf0000]: Sent Packet[2] Handshake(22) in epoch 2 and length: 273 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[get_last_packet]:1138 224s [gnutls] (3) ASSERT: ../../lib/buffers.c[_gnutls_io_read_buffered]:568 224s [gnutls] (3) ASSERT: ../../lib/tls13/finished.c[_gnutls13_recv_finished]:91 224s [io ] => connection to '127.0.0.1#47701' closed by peer (connection reset by peer) 224s [gnutls] (5) REC[0xf59ebfdf0000]: Start of epoch cleanup 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #0 freed 224s [gnutls] (5) REC[0xf59ebfdf0000]: End of epoch cleanup 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #1 freed 224s [gnutls] (5) REC[0xf59ebfdf0000]: Epoch #2 freed 224s > 225s > autopkgtest [16:08:34]: test roundtrip: -----------------------] 225s roundtrip PASS 225s autopkgtest [16:08:34]: test roundtrip: - - - - - - - - - - results - - - - - - - - - - 231s autopkgtest [16:08:40]: @@@@@@@@@@@@@@@@@@@@ summary 231s roundtrip PASS