pastebin - collaborative debugging tool
eckelmann.kpaste.net RSS


openssl s_client -connect smtp.eckelmann.de:25 -starttls smtp
Posted by Anonymous on Tue 21st Jul 2020 15:10
raw | new post

  1. [schenk:~] 20s $ openssl s_client -connect smtp.eckelmann.de:25 -starttls smtp
  2. CONNECTED(00000003)
  3. depth=1 DC = group, DC = eckelmann, CN = Eckelmann Gruppe CA
  4. verify error:num=20:unable to get local issuer certificate
  5. verify return:1
  6. depth=0 C = DE, ST = Hessen, L = Wiesbaden, O = Eckelmann AG, OU = IT, CN = oa.eckelmann.de
  7. verify return:1
  8. ---
  9. Certificate chain
  10.  0 s:C = DE, ST = Hessen, L = Wiesbaden, O = Eckelmann AG, OU = IT, CN = oa.eckelmann.de
  11.    i:DC = group, DC = eckelmann, CN = Eckelmann Gruppe CA
  12.  1 s:DC = group, DC = eckelmann, CN = Eckelmann Gruppe CA
  13.    i:CN = Eckelmann Gruppe Root CA
  14. ---
  15. Server certificate
  16. -----BEGIN CERTIFICATE-----
  17. MIIHpTCCBo2gAwIBAgITRQAAEtLkz9CDK1uh5QAAAAAS0jANBgkqhkiG9w0BAQsF
  18. ADBQMRUwEwYKCZImiZPyLGQBGRYFZ3JvdXAxGTAXBgoJkiaJk/IsZAEZFgllY2tl
  19. bG1hbm4xHDAaBgNVBAMTE0Vja2VsbWFubiBHcnVwcGUgQ0EwHhcNMTcwODIyMTMw
  20. MzIxWhcNMjUwMzE3MTAyNjA4WjBwMQswCQYDVQQGEwJERTEPMA0GA1UECBMGSGVz
  21. c2VuMRIwEAYDVQQHEwlXaWVzYmFkZW4xFTATBgNVBAoTDEVja2VsbWFubiBBRzEL
  22. MAkGA1UECxMCSVQxGDAWBgNVBAMTD29hLmVja2VsbWFubi5kZTCCASIwDQYJKoZI
  23. hvcNAQEBBQADggEPADCCAQoCggEBAKMeXtL+5o8uRLoBRs5FlZc00RktWmyx0e7W
  24. zLaZBqX6h0HHZnNwdh2lBrkAtfBm5D50SCncfrPfkmjONmcYHR215+pfubBHiWxs
  25. Z2T57ZUfNqIBuUhLoc3DRp0iMCJPNjUdluPdcN465i2QPAzvk9myyQhFkwBZYkfB
  26. ERostbqa0R8RSgVKKgj/l8dpN9lnNF+xZbociKNUN/r4AD7otO4/Y2VKYbmvLANw
  27. LaIYqhkUp9sTFBLsJo95cQNBYJMHyNh2luDjeiFCRjedDsWKOIieK4XV+eRYWPhv
  28. jJIDzmJO40Q4JH1Y77Dos+RdEMqouyhs4z83f11HhcVLZ+jLiesCAwEAAaOCBFYw
  29. ggRSMIIBKQYDVR0RBIIBIDCCARyCD29hLmVja2VsbWFubi5kZYIUd2VibWFpbC5l
  30. Y2tlbG1hbm4uZGWCGWF1dG9kaXNjb3Zlci5lY2tlbG1hbm4uZGWCEXNtdHAuZWNr
  31. ZWxtYW5uLmRlghBwb3AuZWNrZWxtYW5uLmRlghFpbWFwLmVja2VsbWFubi5kZYIX
  32. ZXgtc3J2MS5lY2tlbG1hbm4uZ3JvdXCCF2V4LXNydjIuZWNrZWxtYW5uLmdyb3Vw
  33. ghpSZWxheS1leC1zcnYxLmVja2VsbWFubi5kZYIaUmVsYXktZXgtc3J2Mi5lY2tl
  34. bG1hbm4uZGWCGUludGVybmV0LW91dC5lY2tlbG1hbm4uZGWCCWxvY2FsaG9zdIIH
  35. RVgtU1JWMYIHRVgtU1JWMjAdBgNVHQ4EFgQUT5CC6MzXHjd6UyY2azWpsZDm3vkw
  36. HwYDVR0jBBgwFoAUV82ggckyD6AGMhFPfeOxCz2F2g8wggEkBgNVHR8EggEbMIIB
  37. FzCCAROgggEPoIIBC4aBwmxkYXA6Ly8vQ049RWNrZWxtYW5uJTIwR3J1cHBlJTIw
  38. Q0EsQ049Q0EtU1JWMSxDTj1DRFAsQ049UHVibGljJTIwS2V5JTIwU2VydmljZXMs
  39. Q049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1lY2tlbG1hbm4sREM9Z3Jv
  40. dXA/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNS
  41. TERpc3RyaWJ1dGlvblBvaW50hkRodHRwOi8vY2Etd2ViLmVja2VsbWFubi5ncm91
  42. cC9DZXJ0RW5yb2xsL0Vja2VsbWFubiUyMEdydXBwZSUyMENBLmNybDCCATkGCCsG
  43. AQUFBwEBBIIBKzCCAScwgboGCCsGAQUFBzAChoGtbGRhcDovLy9DTj1FY2tlbG1h
  44. bm4lMjBHcnVwcGUlMjBDQSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vydmlj
  45. ZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1lY2tlbG1hbm4sREM9
  46. Z3JvdXA/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNlcnRpZmljYXRp
  47. b25BdXRob3JpdHkwaAYIKwYBBQUHMAKGXGh0dHA6Ly9jYS13ZWIuZWNrZWxtYW5u
  48. Lmdyb3VwL0NlcnRFbnJvbGwvQ0EtU1JWMS5lY2tlbG1hbm4uZ3JvdXBfRWNrZWxt
  49. YW5uJTIwR3J1cHBlJTIwQ0EuY3J0MA4GA1UdDwEB/wQEAwIFoDA8BgkrBgEEAYI3
  50. FQcELzAtBiUrBgEEAYI3FQiF2vRehaXRWYPNgTWD8PkdiOhYfIXs53KCyKZHAgFm
  51. AgEAMBMGA1UdJQQMMAoGCCsGAQUFBwMBMBsGCSsGAQQBgjcVCgQOMAwwCgYIKwYB
  52. BQUHAwEwDQYJKoZIhvcNAQELBQADggEBAAwsCaNe5vQwNER/NveEYpW0roIQr+3Z
  53. zD9FHQDzHZ4HknBnt3NeiU3Sk5uKdf202lHf0767ZFs42lp5sjn0BLvzHWQadaR7
  54. pYYR2n2jED1oFmyufBHwZ9HFbPD6TfrEMD3jul5SMH7gSlBf0v5oi5rWiu56bFDw
  55. 6CswMgNX2+XHqc3W02MYJ74lF6T7GPI8+7KfnfvHLq+x0cDI6yB6tXZw6ZQTXMU2
  56. 6QbIKP2Oxu+npUkWBzZ+4wuaPdtlli/OrVMi3sogu+3YxNw87o5rgaUwukwk1u9f
  57. D5OM2giqjlQLklER/BrhlTZaqF6m2Xggz5d1LTEkZagJtKrEk9g5OxA=
  58. -----END CERTIFICATE-----
  59. subject=C = DE, ST = Hessen, L = Wiesbaden, O = Eckelmann AG, OU = IT, CN = oa.eckelmann.de
  60.  
  61. issuer=DC = group, DC = eckelmann, CN = Eckelmann Gruppe CA
  62.  
  63. ---
  64. No client certificate CA names sent
  65. Peer signing digest: SHA256
  66. Peer signature type: RSA
  67. Server Temp Key: ECDH, P-256, 256 bits
  68. ---
  69. SSL handshake has read 4370 bytes and written 472 bytes
  70. Verification error: unable to get local issuer certificate
  71. ---
  72. New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256
  73. Server public key is 2048 bit
  74. Secure Renegotiation IS supported
  75. Compression: NONE
  76. Expansion: NONE
  77. No ALPN negotiated
  78. SSL-Session:
  79.     Protocol  : TLSv1.2
  80.     Cipher    : ECDHE-RSA-AES128-GCM-SHA256
  81.     Session-ID: 621D0000F9002CDD06EE6C4CDDFF5BEBB6775576DC2BDB3F354BA47751801D5E
  82.     Session-ID-ctx:
  83.     Master-Key: 4A92C726893A9F11B79A325421E93BFD8EDF2131E465946BCCDDFFE194068D1415FD75E127E84D420FF6290591F3E8A7
  84.     PSK identity: None
  85.     PSK identity hint: None
  86.     SRP username: None
  87.     Start Time: 1595324556
  88.     Timeout   : 7200 (sec)
  89.     Verify return code: 20 (unable to get local issuer certificate)
  90.     Extended master secret: yes
  91. ---
  92. 250 XRDST

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at