Created
June 1, 2016 16:50
-
-
Save Jun-Dai/c25868b4fe6740591f4a848aff865c4d to your computer and use it in GitHub Desktop.
Trying to force TLS v1.2
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
java -Ddeployment.security.SSLv2Hello=false -Ddeployment.security.SSLv3=false -Ddeployment.security.TLSv1=false -Ddeployment.security.TLSv1.1=false -Ddeployment.security.TLSv1.2=true -Djavax.net.debug=ssl jundai.app.App https://www.google.com/finance | |
trigger seeding of SecureRandom | |
done seeding SecureRandom | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 | |
Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 | |
Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 | |
Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 | |
Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 | |
Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 | |
Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | |
Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
%% No cached client session | |
*** ClientHello, TLSv1.1 | |
RandomCookie: GMT: 1464799477 bytes = { 108, 242, 198, 59, 116, 22, 86, 179, 106, 102, 240, 44, 225, 4, 213, 202, 26, 145, 100, 229, 208, 74, 243, 149, 184, 232, 249, 131 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Extension server_name, server_name: [type=host_name (0), value=www.google.com] | |
*** | |
main, WRITE: TLSv1.1 Handshake, length = 160 | |
main, READ: TLSv1.1 Handshake, length = 91 | |
*** ServerHello, TLSv1.1 | |
RandomCookie: GMT: 1464799477 bytes = { 48, 181, 218, 76, 58, 87, 84, 105, 131, 159, 156, 21, 13, 123, 169, 113, 162, 115, 49, 159, 124, 87, 133, 156, 104, 4, 216, 38 } | |
Session ID: {97, 185, 150, 167, 120, 111, 51, 202, 145, 34, 169, 38, 173, 77, 115, 221, 145, 13, 114, 42, 50, 140, 155, 198, 162, 10, 16, 28, 193, 87, 162, 90} | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA | |
Compression Method: 0 | |
Extension renegotiation_info, renegotiated_connection: <empty> | |
Extension server_name, server_name: | |
Extension ec_point_formats, formats: [uncompressed] | |
*** | |
%% Initialized: [Session-1, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA] | |
** TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA | |
main, READ: TLSv1.1 Handshake, length = 3081 | |
*** Certificate chain | |
chain [0] = [ | |
[ | |
Version: V3 | |
Subject: CN=www.google.com, O=Google Inc, L=Mountain View, ST=California, C=US | |
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 25091216501597266261601334607592658060481360619679847706034754713192593085681528725718698349631728000721429936581500993642594187200125154831030712656190855166634935234250891944414293954623294553555481018646074314822309941257382906864579655471597944454889581188246178991179168421971300052278040685489356352398699993432490914973668942793837392054329241321878882668806308959988605833808202954272584034009504907924889361003342503613650604400997085921075328929721547490435165994291702230943123772468409940399543061324950280333138377657648582321822351357518744736829262765823458255190117084312869558612186591540801140606787 | |
public exponent: 65537 | |
Validity: [From: Wed May 18 11:59:02 BST 2016, | |
To: Wed Aug 10 11:46:00 BST 2016] | |
Issuer: CN=Google Internet Authority G2, O=Google Inc, C=US | |
SerialNumber: [ 71d315c9 4a8b0095] | |
Certificate Extensions: 8 | |
[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false | |
AuthorityInfoAccess [ | |
[ | |
accessMethod: caIssuers | |
accessLocation: URIName: http://pki.google.com/GIAG2.crt | |
, | |
accessMethod: ocsp | |
accessLocation: URIName: http://clients1.google.com/ocsp | |
] | |
] | |
[2]: ObjectId: 2.5.29.35 Criticality=false | |
AuthorityKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 4A DD 06 16 1B BC F6 68 B5 76 F5 81 B6 BB 62 1A J......h.v....b. | |
0010: BA 5A 81 2F .Z./ | |
] | |
] | |
[3]: ObjectId: 2.5.29.19 Criticality=true | |
BasicConstraints:[ | |
CA:false | |
PathLen: undefined | |
] | |
[4]: ObjectId: 2.5.29.31 Criticality=false | |
CRLDistributionPoints [ | |
[DistributionPoint: | |
[URIName: http://pki.google.com/GIAG2.crl] | |
]] | |
[5]: ObjectId: 2.5.29.32 Criticality=false | |
CertificatePolicies [ | |
[CertificatePolicyId: [1.3.6.1.4.1.11129.2.5.1] | |
[] ] | |
[CertificatePolicyId: [2.23.140.1.2.2] | |
[] ] | |
] | |
[6]: ObjectId: 2.5.29.37 Criticality=false | |
ExtendedKeyUsages [ | |
serverAuth | |
clientAuth | |
] | |
[7]: ObjectId: 2.5.29.17 Criticality=false | |
SubjectAlternativeName [ | |
DNSName: www.google.com | |
] | |
[8]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: CA A5 9B 39 04 2C 2A 9E A3 29 B3 4D 92 6D D3 38 ...9.,*..).M.m.8 | |
0010: 00 B1 11 6E ...n | |
] | |
] | |
] | |
Algorithm: [SHA256withRSA] | |
Signature: | |
0000: 1B E4 6A 18 7A 64 0E 07 1F 86 DD 00 DE B2 E8 5B ..j.zd.........[ | |
0010: FF DD 26 EC 46 42 39 B4 69 48 A0 58 24 76 2A B1 ..&.FB9.iH.X$v*. | |
0020: 95 88 6E 4B D4 F3 EB EE 23 1C 89 44 D7 02 FF EB ..nK....#..D.... | |
0030: 7D A1 FE C7 FE 50 E5 46 92 AD 85 E5 D5 81 6E 49 .....P.F......nI | |
0040: 42 D0 73 E2 95 16 4C 64 26 D2 E1 6F 0E 8E 17 A0 B.s...Ld&..o.... | |
0050: 0B FC 0F FC BF 18 F6 4F 51 8C CF C8 87 B1 9C 68 .......OQ......h | |
0060: 79 D5 28 9D 06 FB E8 9D AF 87 47 C8 F1 71 DD 50 y.(.......G..q.P | |
0070: 7C D1 56 CF 3D 13 A4 DA 60 5B 33 BB A9 69 7F E0 ..V.=...`[3..i.. | |
0080: 10 F0 43 6F EE 1A C3 A2 34 BD 3E 22 42 7D 25 88 ..Co....4.>"B.%. | |
0090: 9A 1B B3 B7 A9 78 A5 8B 80 9D 83 37 FC DC 35 2D .....x.....7..5- | |
00A0: 94 A7 68 5C CA B6 BF AC 08 64 20 C6 31 74 DB 30 ..h\.....d .1t.0 | |
00B0: FA BF 26 3F C2 0E 8E 53 3D E2 C6 7E 9D 8A 05 D3 ..&?...S=....... | |
00C0: B0 52 9E 8D 4D DB 27 59 82 18 22 85 74 9F E3 2E .R..M.'Y..".t... | |
00D0: 79 2D 66 CA 1F BF 33 01 0D 68 0F 18 3B 15 97 75 y-f...3..h..;..u | |
00E0: E1 37 42 FB 4F C6 5B E3 F2 BD 37 8C F7 5A 0C 8B .7B.O.[...7..Z.. | |
00F0: 3A 64 B4 A7 71 E0 57 06 36 D8 DE A8 B1 AA 1F AD :d..q.W.6....... | |
] | |
chain [1] = [ | |
[ | |
Version: V3 | |
Subject: CN=Google Internet Authority G2, O=Google Inc, C=US | |
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 19713895149719550196537065661910573762693934593220985668782860735427060889140793885919063737778303548724916253252606564904177491762533295616984617709378739783748100146882543612565825906799282133510087546060971220666055151463898734279731009956582933624646298029265838127046200538496591314458940937082185029845612274584845875286257057247598474925565775989866310636633768255501748172403430876460228793912189332026189491067186811703150477068536877439284697584041860237489395099402658887745588613142391209024263265842301844868193180477031165936332420984796347731387363914950895491332976177715889375379088870580457661428329 | |
public exponent: 65537 | |
Validity: [From: Fri Apr 05 16:15:56 BST 2013, | |
To: Sat Dec 31 23:59:59 GMT 2016] | |
Issuer: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US | |
SerialNumber: [ 023a83] | |
Certificate Extensions: 7 | |
[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false | |
AuthorityInfoAccess [ | |
[ | |
accessMethod: ocsp | |
accessLocation: URIName: http://g.symcd.com | |
] | |
] | |
[2]: ObjectId: 2.5.29.35 Criticality=false | |
AuthorityKeyIdentifier [ | |
KeyIdentifier [ | |
0000: C0 7A 98 68 8D 89 FB AB 05 64 0C 11 7D AA 7D 65 .z.h.....d.....e | |
0010: B8 CA CC 4E ...N | |
] | |
] | |
[3]: ObjectId: 2.5.29.19 Criticality=true | |
BasicConstraints:[ | |
CA:true | |
PathLen:0 | |
] | |
[4]: ObjectId: 2.5.29.31 Criticality=false | |
CRLDistributionPoints [ | |
[DistributionPoint: | |
[URIName: http://g.symcb.com/crls/gtglobal.crl] | |
]] | |
[5]: ObjectId: 2.5.29.32 Criticality=false | |
CertificatePolicies [ | |
[CertificatePolicyId: [1.3.6.1.4.1.11129.2.5.1] | |
[] ] | |
] | |
[6]: ObjectId: 2.5.29.15 Criticality=true | |
KeyUsage [ | |
Key_CertSign | |
Crl_Sign | |
] | |
[7]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 4A DD 06 16 1B BC F6 68 B5 76 F5 81 B6 BB 62 1A J......h.v....b. | |
0010: BA 5A 81 2F .Z./ | |
] | |
] | |
] | |
Algorithm: [SHA256withRSA] | |
Signature: | |
0000: AA FA A9 20 CD 6A 67 83 ED 5E D4 7E DE 1D C4 7F ... .jg..^...... | |
0010: E0 25 06 00 C5 24 FB A9 C8 2D 6D 7E DE 9D 82 65 .%...$...-m....e | |
0020: 2C 81 63 34 66 3E E9 52 C2 08 B4 CB 2F F7 5F 99 ,.c4f>.R..../._. | |
0030: 3A 6A 9C 50 7A 85 05 8C 7D D1 2A 48 84 D3 09 6C :j.Pz.....*H...l | |
0040: 7C C2 CD 35 9F F3 82 EE 52 DE 68 5F E4 00 8A 17 ...5....R.h_.... | |
0050: 20 96 F7 29 8D 9A 4D CB A8 DE 86 C8 0D 6F 56 87 ..)..M......oV. | |
0060: 03 7D 03 3F DC FA 79 7D 21 19 F9 C8 3A 2F 51 76 ...?..y.!...:/Qv | |
0070: 8C C7 41 92 71 8F 25 CE 37 F8 4A 4C 00 23 EF C4 ..A.q.%.7.JL.#.. | |
0080: 35 10 AE E0 23 80 73 7C 4D 34 2E C8 6E 90 D6 10 5...#.s.M4..n... | |
0090: 1E 99 84 73 1A 70 F2 ED 55 0E EE 17 06 EA 67 EE ...s.p..U.....g. | |
00A0: 32 EB 2C DD 67 07 3F F6 8B C2 70 DE 5B 00 E6 BB 2.,.g.?...p.[... | |
00B0: 1B D3 36 1A 22 6C 6C B0 35 42 6C 90 09 3D 93 E9 ..6."ll.5Bl..=.. | |
00C0: 64 09 22 0E 85 06 9F C2 73 21 D3 E6 5F 80 E4 8D d.".....s!.._... | |
00D0: 85 22 3A 73 03 B1 60 8E AE 68 E2 F4 3E 97 E7 60 .":s..`..h..>..` | |
00E0: 12 09 68 36 DE 3A D6 E2 43 95 5B 37 81 92 81 1F ..h6.:..C.[7.... | |
00F0: BB 8D D7 AD 52 64 16 57 96 D9 5E 34 7E C8 35 D8 ....Rd.W..^4..5. | |
] | |
chain [2] = [ | |
[ | |
Version: V3 | |
Subject: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US | |
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 27620593608073140957439440929253438012688864718977347268272053725994928948867769687165112265058896553974818505070806430256424431940072485024407486246475597522063246121214348496326377341879755851197260401080498544606788760407243324127929930612201002157618691487713632251700065187865963692723720912135393438861302779432180613616167225206519123176430362410262429702404863434904116727055203524505580952824336979641923534005571504410997292144760317953739063178352809680844232935574095508445145910310675421726257114605895831426222686272114090063230017292595425393719031924942422176213538487957041730136782988405751614792953 | |
public exponent: 65537 | |
Validity: [From: Tue May 21 05:00:00 BST 2002, | |
To: Tue Aug 21 05:00:00 BST 2018] | |
Issuer: OU=Equifax Secure Certificate Authority, O=Equifax, C=US | |
SerialNumber: [ 12bbe6] | |
Certificate Extensions: 6 | |
[1]: ObjectId: 2.5.29.35 Criticality=false | |
AuthorityKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 48 E6 68 F9 2B D2 B2 95 D7 47 D8 23 20 10 4F 33 H.h.+....G.# .O3 | |
0010: 98 90 9F D4 .... | |
] | |
] | |
[2]: ObjectId: 2.5.29.19 Criticality=true | |
BasicConstraints:[ | |
CA:true | |
PathLen:2147483647 | |
] | |
[3]: ObjectId: 2.5.29.31 Criticality=false | |
CRLDistributionPoints [ | |
[DistributionPoint: | |
[URIName: http://crl.geotrust.com/crls/secureca.crl] | |
]] | |
[4]: ObjectId: 2.5.29.32 Criticality=false | |
CertificatePolicies [ | |
[CertificatePolicyId: [2.5.29.32.0] | |
[PolicyQualifierInfo: [ | |
qualifierID: 1.3.6.1.5.5.7.2.1 | |
qualifier: 0000: 16 2D 68 74 74 70 73 3A 2F 2F 77 77 77 2E 67 65 .-https://www.ge | |
0010: 6F 74 72 75 73 74 2E 63 6F 6D 2F 72 65 73 6F 75 otrust.com/resou | |
0020: 72 63 65 73 2F 72 65 70 6F 73 69 74 6F 72 79 rces/repository | |
]] ] | |
] | |
[5]: ObjectId: 2.5.29.15 Criticality=true | |
KeyUsage [ | |
Key_CertSign | |
Crl_Sign | |
] | |
[6]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: C0 7A 98 68 8D 89 FB AB 05 64 0C 11 7D AA 7D 65 .z.h.....d.....e | |
0010: B8 CA CC 4E ...N | |
] | |
] | |
] | |
Algorithm: [SHA1withRSA] | |
Signature: | |
0000: 76 E1 12 6E 4E 4B 16 12 86 30 06 B2 81 08 CF F0 v..nNK...0...... | |
0010: 08 C7 C7 71 7E 66 EE C2 ED D4 3B 1F FF F0 F0 C8 ...q.f....;..... | |
0020: 4E D6 43 38 B0 B9 30 7D 18 D0 55 83 A2 6A CB 36 N.C8..0...U..j.6 | |
0030: 11 9C E8 48 66 A3 6D 7F B8 13 D4 47 FE 8B 5A 5C ...Hf.m....G..Z\ | |
0040: 73 FC AE D9 1B 32 19 38 AB 97 34 14 AA 96 D2 EB s....2.8..4..... | |
0050: A3 1C 14 08 49 B6 BB E5 91 EF 83 36 EB 1D 56 6F ....I......6..Vo | |
0060: CA DA BC 73 63 90 E4 7F 7B 3E 22 CB 3D 07 ED 5F ...sc....>".=.._ | |
0070: 38 74 9C E3 03 50 4E A1 AF 98 EE 61 F2 84 3F 12 8t...PN....a..?. | |
] | |
*** | |
main, READ: TLSv1.1 Handshake, length = 331 | |
*** ECDH ServerKeyExchange | |
Server key: Sun EC public key, 256 bits | |
public x coord: 18119566256774333712908860956116194019583855090156387138417234204590531403784 | |
public y coord: 95903739065419197886070185236274551733293917264315242225269858950363913658023 | |
parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) | |
main, READ: TLSv1.1 Handshake, length = 4 | |
*** ServerHelloDone | |
*** ECDHClientKeyExchange | |
ECDH Public value: { 4, 174, 199, 97, 19, 120, 130, 245, 79, 164, 152, 201, 222, 0, 177, 154, 73, 223, 58, 39, 129, 211, 198, 126, 51, 100, 222, 120, 221, 247, 121, 139, 55, 41, 226, 235, 17, 28, 34, 163, 48, 226, 160, 25, 63, 37, 121, 251, 173, 13, 174, 64, 17, 28, 32, 19, 246, 96, 112, 53, 14, 152, 171, 79, 15 } | |
main, WRITE: TLSv1.1 Handshake, length = 70 | |
SESSION KEYGEN: | |
PreMaster Secret: | |
0000: 30 6E 33 3C BC D8 53 AC 24 E1 4D C6 21 89 60 44 0n3<..S.$.M.!.`D | |
0010: 0E 61 F8 F5 E7 71 0D 73 68 65 84 A4 F7 F2 B5 3F .a...q.she.....? | |
CONNECTION KEYGEN: | |
Client Nonce: | |
0000: 57 4F 11 F5 6C F2 C6 3B 74 16 56 B3 6A 66 F0 2C WO..l..;t.V.jf., | |
0010: E1 04 D5 CA 1A 91 64 E5 D0 4A F3 95 B8 E8 F9 83 ......d..J...... | |
Server Nonce: | |
0000: 57 4F 11 F5 30 B5 DA 4C 3A 57 54 69 83 9F 9C 15 WO..0..L:WTi.... | |
0010: 0D 7B A9 71 A2 73 31 9F 7C 57 85 9C 68 04 D8 26 ...q.s1..W..h..& | |
Master Secret: | |
0000: 07 54 90 63 93 C4 37 64 E9 DA 53 30 D4 70 B9 DD .T.c..7d..S0.p.. | |
0010: 9D B3 C0 C6 01 0C E3 C3 C0 44 A5 E0 70 6A 7C 7E .........D..pj.. | |
0020: C8 D5 6C A1 F7 80 07 5C 65 2B C4 00 CD FD 6C 5E ..l....\e+....l^ | |
Client MAC write Secret: | |
0000: EA 5C 57 5B DD E9 A6 29 F9 DC 95 8F C5 01 2E 79 .\W[...).......y | |
0010: 8C D0 05 AD .... | |
Server MAC write Secret: | |
0000: 90 64 22 B1 49 A2 19 60 92 33 F9 35 79 9F 13 90 .d".I..`.3.5y... | |
0010: 4E AE 76 40 N.v@ | |
Client write key: | |
0000: 6A D3 32 78 AC 4C 86 38 26 47 8F C8 1D 76 06 D1 j.2x.L.8&G...v.. | |
Server write key: | |
0000: FC FD FD 6A 2E 4C 02 09 C9 7E 64 B1 1B 87 BB 97 ...j.L....d..... | |
... no IV derived for this protocol | |
main, WRITE: TLSv1.1 Change Cipher Spec, length = 1 | |
*** Finished | |
verify_data: { 144, 170, 26, 213, 149, 242, 125, 202, 36, 224, 33, 252 } | |
*** | |
main, WRITE: TLSv1.1 Handshake, length = 64 | |
main, READ: TLSv1.1 Change Cipher Spec, length = 1 | |
main, READ: TLSv1.1 Handshake, length = 64 | |
*** Finished | |
verify_data: { 217, 229, 253, 39, 125, 130, 87, 57, 4, 193, 106, 96 } | |
*** | |
%% Cached client session: [Session-1, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA] | |
main, WRITE: TLSv1.1 Application Data, length = 192 | |
main, READ: TLSv1.1 Application Data, length = 816 | |
main, READ: TLSv1.1 Application Data, length = 1360 | |
main, READ: TLSv1.1 Application Data, length = 256 | |
main, READ: TLSv1.1 Application Data, length = 1360 | |
main, READ: TLSv1.1 Application Data, length = 224 | |
main, READ: TLSv1.1 Application Data, length = 1360 | |
output line 0: <!DOCTYPE html><html><head><script>(function(){(function(){function e(a){this.t={};this.tick=function(a,c,b){var d=void 0!=b?b:(new Date).getTime();this.t[a]=[d,c];if(void 0==b)try{window.console.timeStamp("CSI/"+a)}catch(e){}};this.tick("start",null,a)}var a;window.performance&&(a=window.performance.timing);var f=a?new e(a.responseStart):new e;window.jstiming={Timer:e,load:f};if(a){var c=a.navigationStart,d=a.responseStart;0<c&&d>=c&&(window.jstiming.srt=d-c)}if(a){var b=window.jstiming.load;0<c&&d>=c&&(b.tick("_wtsrt",void 0,c),b.tick("wtsrt_", | |
output line 1: "_wtsrt",d),b.tick("tbsd_","wtsrt_"))}try{a=null,window.chrome&&window.chrome.csi&&(a=Math.floor(window.chrome.csi().pageT),b&&0<c&&(b.tick("_tbnd",void 0,window.chrome.csi().startE),b.tick("tbnd_","_tbnd",c))),null==a&&window.gtbExternal&&(a=window.gtbExternal.pageT()),null==a&&window.external&&(a=window.external.pageT,b&&0<c&&(b.tick("_tbnd",void 0,window.external.startE),b.tick("tbnd_","_tbnd",c))),a&&(window.jstiming.pt=a)}catch(g){}})();})(); | |
output line 2: </script><title>Google Finance: Stock market quotes, news, currency conversions & more</title><meta name="Description" content="Get real-time stock quotes & charts, financial news, currency conversions, or track your portfolio with Google Finance."><meta http-equiv="X-UA-Compatible" content="IE=10"><link rel="stylesheet" type="text/css" href="/finance/f/finance_us-1489929081.css"><link rel="stylesheet" type="text/css" href="/_/scs/finance-static/_/ss/k=finance.a.-kkfalcj16abn.L.X.O/d=0/rs=AGHGApHGsRH3GV3lpHMhhcuy6gj7vmAAjw"><link rel="icon" type="image/vnd.microsoft.icon" href="/finance/favicon.ico"><style>#gbar,#guser{font-size:13px;padding-right:8px;padding-top:4px !important;}#gbar{padding-left:8px;height:22px}#guser{padding-bottom:7px !important;text-align:right}.gbh,.gbd{border-top:1px solid #c9d7f1;font-size:1px}.gbh{height:0;position:absolute;top:24px;width:100%}@media all{.gb1{height:22px;margin-right:.5em;vertical-align:top}#gbar{float:left}}a.gb1,a.gb4{text-decoration:underline !important}a.gb1,a.gb4{color:#00c !important}.gbi .gb4{color:#dd8e27 !important}.gbf .gb4{color:#900 !important} | |
output line 3: </style><script></script><script> | |
output line 4: function _rpt() {} | |
main, READ: TLSv1.1 Application Data, length = 864 | |
main, READ: TLSv1.1 Application Data, length = 1360 | |
main, READ: TLSv1.1 Application Data, length = 1360 | |
main, READ: TLSv1.1 Application Data, length = 1360 | |
main, READ: TLSv1.1 Application Data, length = 160 | |
main, READ: TLSv1.1 Application Data, length = 1360 | |
main, READ: TLSv1.1 Application Data, length = 688 | |
main, READ: TLSv1.1 Application Data, length = 272 | |
main, READ: TLSv1.1 Application Data, length = 1360 | |
main, READ: TLSv1.1 Application Data, length = 1360 | |
main, READ: TLSv1.1 Application Data, length = 736 | |
main, READ: TLSv1.1 Application Data, length = 112 | |
Process finished with exit code 0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment