TLS crash on 3.1.0
It's on Turris Omnia, most likely it's segmentation fault related to TLS. (There's no message from an assertion though they are on.)
There are several TLS connection failures within a few seconds and then after successful handshake a kresd with a new PID suddenly starts logging.
2018-12-18 22:23:57 info kresd[6800]: [16594.04][plan] plan 'lan.' type 'DS' uid [16594.05] 2018-12-18 22:23:57 info kresd[6800]: [16594.05][iter] 'lan.' type 'DS' new uid was assigned .06, parent uid .04 2018-12-18 22:23:57 info kresd[6800]: [16594.06][cach] => trying zone: ., NSEC, hash 0 2018-12-18 22:23:57 info kresd[6800]: [16594.06][cach] => NSEC sname: range search found stale or insecure entry 2018-12-18 22:23:57 info kresd[6800]: [16594.06][cach] => skipping zone: ., NSEC, hash 0;new TTL -123456789, ret -2 2018-12-18 22:23:57 info kresd[6800]: [gnutls] (5) REC[0x283b6f0]: Allocating epoch #0 2018-12-18 22:23:57 info kresd[6800]: [16594.06][wrkr] => connecting to: '1.1.1.1#00853' 2018-12-18 22:23:57 info kresd[6800]: [00000.00][plan] plan 'gitter.im.' type 'A' uid [49315.00] 2018-12-18 22:23:57 info kresd[6800]: [49315.00][iter] 'gitter.im.' type 'A' new uid was assigned .01, parent uid .00 2018-12-18 22:23:57 info kresd[6800]: [49315.01][cach] => skipping exact RR: rank 030 (min. 030), new TTL -133 2018-12-18 22:23:57 info kresd[6800]: [49315.01][cach] => trying zone: ., NSEC, hash 0 2018-12-18 22:23:57 info kresd[6800]: [49315.01][cach] => NSEC sname: covered but delegated (or error) 2018-12-18 22:23:57 info kresd[6800]: [49315.01][cach] => skipping zone: ., NSEC, hash 0;new TTL -123456789, ret -2 2018-12-18 22:23:57 info kresd[6800]: [49315.01][plan] plan '.' type 'DNSKEY' uid [49315.02] 2018-12-18 22:23:57 info kresd[6800]: [49315.02][iter] '.' type 'DNSKEY' new uid was assigned .03, parent uid .01 2018-12-18 22:23:57 info kresd[6800]: [49315.03][cach] => satisfied by exact RRset: rank 060, new TTL 4048 2018-12-18 22:23:57 info kresd[6800]: [49315.03][iter] <= rcode: NOERROR 2018-12-18 22:23:57 info kresd[6800]: [49315.03][vldr] <= parent: updating DNSKEY 2018-12-18 22:23:57 info kresd[6800]: [49315.03][vldr] <= answer valid, OK 2018-12-18 22:23:57 info kresd[6800]: [49315.01][iter] 'gitter.im.' type 'A' new uid was assigned .04, parent uid .00 2018-12-18 22:23:57 info kresd[6800]: [49315.04][plan] plan 'im.' type 'DS' uid [49315.05] 2018-12-18 22:23:57 info kresd[6800]: [49315.05][iter] 'im.' type 'DS' new uid was assigned .06, parent uid .04 2018-12-18 22:23:57 info kresd[6800]: [49315.06][cach] => trying zone: ., NSEC, hash 0 2018-12-18 22:23:57 info kresd[6800]: [49315.06][cach] => NSEC sname: match proved NODATA, new TTL 2821 2018-12-18 22:23:57 info kresd[6800]: [49315.06][cach] => writing RRsets: ++ 2018-12-18 22:23:57 info kresd[6800]: [49315.06][iter] <= rcode: NOERROR 2018-12-18 22:23:57 info kresd[6800]: [49315.06][vldr] <= DS doesn't exist, going insecure 2018-12-18 22:23:57 info kresd[6800]: [49315.06][vldr] <= parent: updating DS 2018-12-18 22:23:57 info kresd[6800]: [49315.06][vldr] <= answer valid, OK 2018-12-18 22:23:57 info kresd[6800]: [49315.04][iter] 'gitter.im.' type 'A' new uid was assigned .07, parent uid .00 2018-12-18 22:23:57 info kresd[6800]: [00000.00][plan] plan 'gitter.im.' type 'AAAA' uid [15550.00] 2018-12-18 22:23:57 info kresd[6800]: [15550.00][iter] 'gitter.im.' type 'AAAA' new uid was assigned .01, parent uid .00 2018-12-18 22:23:57 info kresd[6800]: [15550.01][cach] => satisfied by exact packet: rank 030, new TTL 32 2018-12-18 22:23:57 info kresd[6800]: [15550.01][iter] <= rcode: NOERROR 2018-12-18 22:23:57 info kresd[6800]: [15550.01][resl] AD: request NOT classified as SECURE 2018-12-18 22:23:57 info kresd[6800]: [15550.01][resl] finished: 0, queries: 1, mempool: 49176 B 2018-12-18 22:23:58 info kresd[6800]: [16594.11][iter] 'lan.' type 'DS' new uid was assigned .12, parent uid .04 2018-12-18 22:23:58 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Allocating epoch #0 2018-12-18 22:23:58 info kresd[6800]: [16594.12][wrkr] => connecting to: '1.1.1.1#00853' 2018-12-18 22:23:58 info kresd[6800]: [16594.07][iter] 'lan.' type 'DS' new uid was assigned .08, parent uid .04 2018-12-18 22:23:58 info kresd[6800]: [16594.06][iter] 'lan.' type 'DS' new uid was assigned .07, parent uid .04 2018-12-18 22:23:58 info kresd[6800]: [gnutls] (5) REC[0x27000a0]: Allocating epoch #0 2018-12-18 22:23:58 info kresd[6800]: [16594.07][wrkr] => connecting to: '1.1.1.1#00853' 2018-12-18 22:23:58 info kresd[6800]: [49315.07][iter] 'gitter.im.' type 'A' new uid was assigned .08, parent uid .00 2018-12-18 22:23:58 info kresd[6800]: [gnutls] (5) REC[0x283a1a0]: Start of epoch cleanup 2018-12-18 22:23:58 info kresd[6800]: [gnutls] (5) REC[0x283a1a0]: End of epoch cleanup 2018-12-18 22:23:58 info kresd[6800]: [gnutls] (5) REC[0x283a1a0]: Epoch #0 freed 2018-12-18 22:23:58 info kresd[6800]: [gnutls] (5) REC[0x283b6f0]: Start of epoch cleanup 2018-12-18 22:23:58 info kresd[6800]: [gnutls] (5) REC[0x283b6f0]: End of epoch cleanup 2018-12-18 22:23:58 info kresd[6800]: [gnutls] (5) REC[0x283b6f0]: Epoch #0 freed 2018-12-18 22:24:00 info kresd[6800]: [16594.12][wrkr] => connection to '1.1.1.1' failed 2018-12-18 22:24:00 info kresd[6800]: [16594.12][iter] 'lan.' type 'DS' new uid was assigned .13, parent uid .04 2018-12-18 22:24:00 info kresd[6800]: [16594.03][resl] AD: request NOT classified as SECURE 2018-12-18 22:24:00 info kresd[6800]: [16594.13][resl] finished: 0, queries: 1, mempool: 49176 B 2018-12-18 22:24:00 info kresd[6800]: [16594.08][iter] 'lan.' type 'DS' new uid was assigned .09, parent uid .04 2018-12-18 22:24:00 info kresd[6800]: [gnutls] (5) REC[0x27fd150]: Allocating epoch #0 2018-12-18 22:24:00 info kresd[6800]: [16594.09][wrkr] => connecting to: '1.1.1.1#00853' 2018-12-18 22:24:00 info kresd[6800]: [16594.07][wrkr] => connection to '1.1.1.1' failed 2018-12-18 22:24:00 info kresd[6800]: [16594.07][iter] 'lan.' type 'DS' new uid was assigned .08, parent uid .04 2018-12-18 22:24:00 info kresd[6800]: [gnutls] (5) REC[0x21503e0]: Allocating epoch #0 2018-12-18 22:24:00 info kresd[6800]: [16594.08][wrkr] => connecting to: '1.1.1.1#00853' 2018-12-18 22:24:00 info kresd[6800]: [49315.08][iter] 'gitter.im.' type 'A' new uid was assigned .09, parent uid .00 2018-12-18 22:24:00 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Start of epoch cleanup 2018-12-18 22:24:00 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: End of epoch cleanup 2018-12-18 22:24:00 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Epoch #0 freed 2018-12-18 22:24:00 info kresd[6800]: [gnutls] (5) REC[0x27000a0]: Start of epoch cleanup 2018-12-18 22:24:00 info kresd[6800]: [gnutls] (5) REC[0x27000a0]: End of epoch cleanup 2018-12-18 22:24:00 info kresd[6800]: [gnutls] (5) REC[0x27000a0]: Epoch #0 freed 2018-12-18 22:24:01 info /usr/sbin/cron[14258]: (root) CMD (/usr/bin/rainbow_button_sync.sh) 2018-12-18 22:24:01 info /usr/sbin/cron[14259]: (root) CMD (nethist_stats.lua) 2018-12-18 22:24:01 info kresd[6800]: [16594.09][iter] 'lan.' type 'DS' new uid was assigned .10, parent uid .04 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Allocating epoch #0 2018-12-18 22:24:01 info kresd[6800]: [16594.10][wrkr] => connecting to: '1.1.1.1#00853' 2018-12-18 22:24:01 info kresd[6800]: [16594.08][iter] 'lan.' type 'DS' new uid was assigned .09, parent uid .04 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Allocating epoch #0 2018-12-18 22:24:01 info kresd[6800]: [16594.09][wrkr] => connecting to: '1.1.1.1#00853' 2018-12-18 22:24:01 info kresd[6800]: [49315.09][iter] 'gitter.im.' type 'A' new uid was assigned .10, parent uid .00 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x27fd150]: Start of epoch cleanup 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x27fd150]: End of epoch cleanup 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x27fd150]: Epoch #0 freed 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x21503e0]: Start of epoch cleanup 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x21503e0]: End of epoch cleanup 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x21503e0]: Epoch #0 freed 2018-12-18 22:24:01 info kresd[6800]: [16594.10][wrkr] => connected to '1.1.1.1' 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: constate.c[_gnutls_epoch_get]:600 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Allocating epoch #1 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Adv. version: 3.3 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384 (C0.87) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305 (CC.A9) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CCM (C0.AD) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384 (C0.73) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256 (C0.86) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CCM (C0.AC) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256 (C0.72) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384 (C0.30) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CHACHA20_POLY1305 (CC.A8) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1 (C0.14) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA384 (C0.28) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 (C0.13) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA256 (C0.27) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_GCM_SHA384 (00.9D) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_GCM_SHA384 (C0.7B) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CCM (C0.9D) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA1 (00.35) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA256 (00.3D) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA1 (00.84) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA256 (00.C0) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_GCM_SHA256 (00.9C) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_GCM_SHA256 (C0.7A) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CCM (C0.9C) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA1 (00.2F) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA256 (00.3C) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA1 (00.41) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA256 (00.BA) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_RSA_3DES_EDE_CBC_SHA1 (00.0A) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_GCM_SHA384 (00.9F) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.7D) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CHACHA20_POLY1305 (CC.AA) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CCM (C0.9F) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA1 (00.39) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA256 (00.6B) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA256 (00.C4) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_GCM_SHA256 (00.9E) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.7C) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CCM (C0.9E) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA1 (00.33) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA256 (00.67) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA256 (00.BE) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Keeping ciphersuite: GNUTLS_DHE_RSA_3DES_EDE_CBC_SHA1 (00.16) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: Sending extension Extended Master Secret (0 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: Sending extension Encrypt-then-MAC (0 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: Sending extension OCSP Status Request (5 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: Sending extension Safe Renegotiation (1 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: Sending extension Session Ticket (0 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: Sending extension Supported curves (12 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: Sending extension Supported ECC Point Formats (2 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: sent signature algo (4.1) RSA-SHA256 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: sent signature algo (4.3) ECDSA-SHA256 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: sent signature algo (5.1) RSA-SHA384 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: sent signature algo (5.3) ECDSA-SHA384 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: sent signature algo (6.1) RSA-SHA512 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: sent signature algo (6.3) ECDSA-SHA512 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: sent signature algo (3.1) RSA-SHA224 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: sent signature algo (3.3) ECDSA-SHA224 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: sent signature algo (2.1) RSA-SHA1 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: sent signature algo (2.3) ECDSA-SHA1 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: Sending extension Signature Algorithms (22 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: CLIENT HELLO was queued [233 bytes] 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Preparing Packet Handshake(22) with length: 233 and min pad: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 238 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1159 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:587 2018-12-18 22:24:01 info kresd[6800]: [16594.09][wrkr] => connected to '1.1.1.1' 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: constate.c[_gnutls_epoch_get]:600 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Allocating epoch #1 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Adv. version: 3.3 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384 (C0.87) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305 (CC.A9) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CCM (C0.AD) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384 (C0.73) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256 (C0.86) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CCM (C0.AC) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256 (C0.72) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384 (C0.30) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CHACHA20_POLY1305 (CC.A8) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1 (C0.14) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA384 (C0.28) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 (C0.13) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA256 (C0.27) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_GCM_SHA384 (00.9D) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_GCM_SHA384 (C0.7B) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CCM (C0.9D) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA1 (00.35) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA256 (00.3D) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA1 (00.84) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA256 (00.C0) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_GCM_SHA256 (00.9C) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_GCM_SHA256 (C0.7A) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CCM (C0.9C) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA1 (00.2F) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA256 (00.3C) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA1 (00.41) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA256 (00.BA) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_RSA_3DES_EDE_CBC_SHA1 (00.0A) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_GCM_SHA384 (00.9F) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.7D) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CHACHA20_POLY1305 (CC.AA) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CCM (C0.9F) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA1 (00.39) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA256 (00.6B) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA256 (00.C4) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_GCM_SHA256 (00.9E) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.7C) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CCM (C0.9E) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA1 (00.33) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA256 (00.67) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA256 (00.BE) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Keeping ciphersuite: GNUTLS_DHE_RSA_3DES_EDE_CBC_SHA1 (00.16) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: Sending extension Extended Master Secret (0 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: Sending extension Encrypt-then-MAC (0 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: Sending extension OCSP Status Request (5 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: Sending extension Safe Renegotiation (1 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: Sending extension Session Ticket (0 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: Sending extension Supported curves (12 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: Sending extension Supported ECC Point Formats (2 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: sent signature algo (4.1) RSA-SHA256 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: sent signature algo (4.3) ECDSA-SHA256 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: sent signature algo (5.1) RSA-SHA384 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: sent signature algo (5.3) ECDSA-SHA384 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: sent signature algo (6.1) RSA-SHA512 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: sent signature algo (6.3) ECDSA-SHA512 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: sent signature algo (3.1) RSA-SHA224 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: sent signature algo (3.3) ECDSA-SHA224 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: sent signature algo (2.1) RSA-SHA1 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: sent signature algo (2.3) ECDSA-SHA1 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: Sending extension Signature Algorithms (22 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: CLIENT HELLO was queued [233 bytes] 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Preparing Packet Handshake(22) with length: 233 and min pad: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 238 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1159 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:587 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1159 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: SSL 3.3 Handshake packet received. Epoch 0, length: 95 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Expected Packet Handshake(22) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Received Packet Handshake(22) with length: 95 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Decrypted Packet[0] Handshake(22) with length: 95 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: SERVER HELLO (2) was received. Length 91[91], frag offset 0, frag length: 91, sequence: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Server's version: 3.3 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: SessionID length: 32 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: SessionID: f5d4147b0a4ca3e67e6a7e7681e8d373cd8360210f9518634485d571704717aa 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Selected cipher suite: ECDHE_ECDSA_AES_256_GCM_SHA384 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Selected compression method: NULL (0) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: Parsing extension 'Supported ECC Point Formats/11' (2 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: Parsing extension 'Extended Master Secret/23' (0 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: Parsing extension 'Session Ticket/35' (0 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x2489ac0]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Safe renegotiation succeeded 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1159 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: SSL 3.3 Handshake packet received. Epoch 0, length: 1973 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Expected Packet Handshake(22) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Received Packet Handshake(22) with length: 1973 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Decrypted Packet[1] Handshake(22) with length: 1973 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: CERTIFICATE (11) was received. Length 1969[1969], frag offset 0, frag length: 1969, sequence: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: common.c[x509_read_value]:698 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 1 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 2 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: common.c[x509_read_value]:698 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 1 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 2 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: status_request.c[gnutls_ocsp_status_request_get]:379 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: common.c[x509_read_value]:698 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 10 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: common.c[x509_read_value]:698 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 1 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:470 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: mpi.c[_gnutls_x509_read_uint]:246 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: common.c[x509_read_value]:698 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:470 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1159 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: SSL 3.3 Handshake packet received. Epoch 0, length: 147 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Expected Packet Handshake(22) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Received Packet Handshake(22) with length: 147 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Decrypted Packet[2] Handshake(22) with length: 147 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: SERVER KEY EXCHANGE (12) was received. Length 143[143], frag offset 0, frag length: 143, sequence: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (2) received curve SECP256R1 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Selected ECC curve SECP256R1 (2) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: common.c[x509_read_value]:698 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 1 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: verify handshake data: using ECDSA-SHA256 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1159 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: SSL 3.3 Handshake packet received. Epoch 0, length: 4 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Expected Packet Handshake(22) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Received Packet Handshake(22) with length: 4 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Decrypted Packet[3] Handshake(22) with length: 4 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: SERVER HELLO DONE (14) was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1150 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1379 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: CLIENT KEY EXCHANGE was queued [70 bytes] 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) REC[0x2489ac0]: Sent ChangeCipherSpec 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Initializing epoch #1 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Epoch #1 ready 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Cipher Suite: ECDHE_ECDSA_AES_256_GCM_SHA384 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: Initializing internal [write] cipher sessions 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: recording tls-unique CB (send) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x2489ac0]: FINISHED was queued [16 bytes] 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Preparing Packet Handshake(22) with length: 70 and min pad: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 75 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Preparing Packet Handshake(22) with length: 16 and min pad: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 45 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: handshake.c[handshake_client]:2950 2018-12-18 22:24:01 info kresd[6800]: [tls_client] TLS handshake with 1.1.1.1#00853 has completed 2018-12-18 22:24:01 info kresd[6800]: [tls_client] TLS session has not resumed 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: session_pack.c[pack_security_parameters]:730 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: session_pack.c[_gnutls_session_pack]:148 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: session.c[gnutls_session_get_data2]:118 2018-12-18 22:24:01 info kresd[6800]: [16594.09][resl] => id: '07708' querying: '1.1.1.1' score: 950 zone cut: '.' qname: 'lAN.' qtype: 'DS' proto: 'tcp' 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Preparing Packet Application Data(23) with length: 34 and min pad: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 63 2018-12-18 22:24:01 info kresd[6800]: [49315.10][resl] => id: '49521' querying: '1.1.1.1' score: 950 zone cut: '.' qname: 'giTter.im.' qtype: 'A' proto: 'tcp' 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Preparing Packet Application Data(23) with length: 40 and min pad: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x2489ac0]: Sent Packet[3] Application Data(23) in epoch 1 and length: 69 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1159 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[_gnutls_io_read_buffered]:587 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: record.c[check_session_status]:1419 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1159 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: SSL 3.3 Handshake packet received. Epoch 0, length: 95 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Expected Packet Handshake(22) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Received Packet Handshake(22) with length: 95 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Decrypted Packet[0] Handshake(22) with length: 95 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: SERVER HELLO (2) was received. Length 91[91], frag offset 0, frag length: 91, sequence: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Server's version: 3.3 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: SessionID length: 32 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: SessionID: 9f8df2e0023ce06628af4d9116a6d2b2ade09d91495d7bbc40a207a7a1b97a9f 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Selected cipher suite: ECDHE_ECDSA_AES_256_GCM_SHA384 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Selected compression method: NULL (0) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: Parsing extension 'Supported ECC Point Formats/11' (2 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: Parsing extension 'Extended Master Secret/23' (0 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: Parsing extension 'Session Ticket/35' (0 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) EXT[0x243b9b0]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Safe renegotiation succeeded 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1159 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: SSL 3.3 Handshake packet received. Epoch 0, length: 1973 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Expected Packet Handshake(22) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Received Packet Handshake(22) with length: 1973 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Decrypted Packet[1] Handshake(22) with length: 1973 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: CERTIFICATE (11) was received. Length 1969[1969], frag offset 0, frag length: 1969, sequence: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: common.c[x509_read_value]:698 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 1 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 2 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: common.c[x509_read_value]:698 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 1 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 2 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: status_request.c[gnutls_ocsp_status_request_get]:379 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: common.c[x509_read_value]:698 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 10 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: common.c[x509_read_value]:698 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 1 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:470 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: mpi.c[_gnutls_x509_read_uint]:246 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: common.c[x509_read_value]:698 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:470 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1159 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: SSL 3.3 Handshake packet received. Epoch 0, length: 149 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Expected Packet Handshake(22) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Received Packet Handshake(22) with length: 149 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Decrypted Packet[2] Handshake(22) with length: 149 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: SERVER KEY EXCHANGE (12) was received. Length 145[145], frag offset 0, frag length: 145, sequence: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (2) received curve SECP256R1 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Selected ECC curve SECP256R1 (2) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: common.c[x509_read_value]:698 2018-12-18 22:24:01 info kresd[13786]: Last message '[gnutls] (3) ASSERT:' repeated 1 times, suppressed by syslog-ng on turris 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: extensions.c[_gnutls_get_extension]:65 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: verify handshake data: using ECDSA-SHA256 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1159 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: SSL 3.3 Handshake packet received. Epoch 0, length: 4 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Expected Packet Handshake(22) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Received Packet Handshake(22) with length: 4 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Decrypted Packet[3] Handshake(22) with length: 4 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: SERVER HELLO DONE (14) was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[get_last_packet]:1150 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1379 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: CLIENT KEY EXCHANGE was queued [70 bytes] 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) REC[0x243b9b0]: Sent ChangeCipherSpec 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Initializing epoch #1 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Epoch #1 ready 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Cipher Suite: ECDHE_ECDSA_AES_256_GCM_SHA384 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: Initializing internal [write] cipher sessions 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: recording tls-unique CB (send) 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (4) HSK[0x243b9b0]: FINISHED was queued [16 bytes] 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Preparing Packet Handshake(22) with length: 70 and min pad: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 75 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Preparing Packet Handshake(22) with length: 16 and min pad: 0 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (5) REC[0x243b9b0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 45 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: handshake.c[handshake_client]:2950 2018-12-18 22:24:01 info kresd[6800]: [tls_client] TLS handshake with 1.1.1.1#00853 has completed 2018-12-18 22:24:01 info kresd[6800]: [tls_client] TLS session has not resumed 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: session_pack.c[pack_security_parameters]:730 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: session_pack.c[_gnutls_session_pack]:148 2018-12-18 22:24:01 info kresd[6800]: [gnutls] (3) ASSERT: session.c[gnutls_session_get_data2]:118 2018-12-18 22:24:16 info kresd[14262]: [ ta ] key: 19036 state: Valid 2018-12-18 22:24:16 info kresd[14262]: [ ta ] key: 20326 state: Valid 2018-12-18 22:24:16 info kresd[14262]: [ ta ] next refresh for . in 1.4130555555556 hours