/curl
Created
May 27, 2019 14:11
Revisions
-
helb revised this gist
May 27, 2019 . 1 changed file with 27 additions and 19 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,56 +1,64 @@ * Trying 2a00:1450:4014:800::200e:443... * TCP_NODELAY set * Connected to dns.google.com (2a00:1450:4014:800::200e) port 443 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * successfully set certificate verify locations: * CAfile: /etc/ssl/certs/ca-certificates.crt CApath: /etc/ssl/certs } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Client hello (1): } [212 bytes data] * TLSv1.2 (IN), TLS handshake, Server hello (2): { [100 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [3217 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [116 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [37 bytes data] * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-ECDSA-CHACHA20-POLY1305 * ALPN, server accepted to use h2 * Server certificate: * subject: C=US; ST=California; L=Mountain View; O=Google LLC; CN=*.google.com * start date: May 7 11:29:56 2019 GMT * expire date: Jul 30 10:54:00 2019 GMT * issuer: C=US; O=Google Trust Services; CN=Google Internet Authority G3 * SSL certificate verify ok. * Using HTTP2, server supports multi-use * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 } [5 bytes data] * Using Stream ID: 1 (easy handle 0x56059560e2b0) } [5 bytes data] > GET /experimental?dns=AAAAAAABAAAAAAAAA25pYwJjegAAAQAB HTTP/2 > Host: dns.google.com > User-Agent: curl/7.65.0 > accept: application/dns-message > { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 100)! } [5 bytes data] < HTTP/2 200 < strict-transport-security: max-age=31536000; includeSubDomains; preload < access-control-allow-origin: * < date: Mon, 27 May 2019 13:57:38 GMT < expires: Mon, 27 May 2019 13:57:38 GMT < cache-control: private, max-age=1595 < content-type: application/dns-message < server: HTTP server (unknown) < content-length: 40 < x-xss-protection: 0 < x-frame-options: SAMEORIGIN < alt-svc: quic=":443"; ma=2592000; v="46,44,43,39" < { [5 bytes data] * Connection #0 to host dns.google.com left intact -
helb created this gist
May 27, 2019 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,56 @@ * Trying 2001:148f:ffff::1:443... * TCP_NODELAY set * Connected to odvr.nic.cz (2001:148f:ffff::1) port 443 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * successfully set certificate verify locations: * CAfile: /etc/ssl/certs/ca-certificates.crt CApath: /etc/ssl/certs } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Client hello (1): } [209 bytes data] * TLSv1.2 (IN), TLS handshake, Server hello (2): { [102 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [1456 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [333 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [70 bytes data] * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=odvr.nic.cz * start date: Mar 8 00:00:00 2019 GMT * expire date: Mar 7 12:00:00 2020 GMT * issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=RapidSSL RSA CA 2018 * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multi-use * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 } [5 bytes data] * Using Stream ID: 1 (easy handle 0x55ed06ee52b0) } [5 bytes data] > GET /doh?dns=AAAAAAABAAAAAAAAA25pYwJjegAAAQAB HTTP/2 > Host: odvr.nic.cz > User-Agent: curl/7.65.0 > accept: application/dns-message > { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 4294967295)! } [5 bytes data] < HTTP/2 200 < content-type: application/dns-message < content-length: 40 < cache-control: max-age=912 < { [5 bytes data] * Connection #0 to host odvr.nic.cz left intact