gargle@msi:~$ time gnutls-cli elpa.gnu.org Processed 140 CA certificate(s). Resolving 'elpa.gnu.org:443'... Connecting to '2001:470:142::89:443'... Connecting to '209.51.188.89:443'... - Certificate type: X.509 - Got a certificate list of 3 certificates. - Certificate[0] info: - subject `CN=elpa.gnu.org', issuer `CN=R3,O=Let's Encrypt,C=US', serial 0x039d688ee4d536c2c5d180acd0b77dd534de, RSA key 2048 bits, signed using RSA-SHA256, activated `2023-11-21 11:08:15 UTC', expires `2024-02-19 11:08:14 UTC', pin-sha256="QcwJ9TVQmsXtBHYcKDWyfyNR3X5gWYDtlVNItux6Rhg=" Public Key ID: sha1:445b8bb7b09ad78854d5391cde68b9897a5a052c
sha256:41cc09f535509ac5ed04761c2835b27f2351dd7e605980ed955348b6ec7a4618 Public Key PIN: pin-sha256:QcwJ9TVQmsXtBHYcKDWyfyNR3X5gWYDtlVNItux6Rhg= - Certificate[1] info: - subject `CN=R3,O=Let's Encrypt,C=US', issuer `CN=ISRG Root X1,O=Internet Security Research Group,C=US', serial 0x00912b084acf0c18a753f6d62e25a75f5a, RSA key 2048 bits, signed using RSA-SHA256, activated `2020-09-04 00:00:00 UTC', expires `2025-09-15 16:00:00 UTC', pin-sha256="jQJTbIh0grw0/1TkHSumWb+Fs0Ggogr621gT3PvPKG0=" - Certificate[2] info: - subject `CN=ISRG Root X1,O=Internet Security Research Group,C=US', issuer `CN=DST Root CA X3,O=Digital Signature Trust Co.', serial 0x4001772137d4e942b8ee76aa3c640ab7, RSA key 4096 bits, signed using RSA-SHA256, activated `2021-01-20 19:14:03 UTC', expires `2024-09-30 18:14:03 UTC', pin-sha256="C5+lpZ7tcVwmwQIMcRtPbsQtWLABXhQzejna0wHFr8M=" - Status: The certificate is trusted. - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) - Session ID: 1B:FA:A7:4C:81:3D:6B:3E:9C:2D:65:EB:5D:52:44:4B:E8:2E:58:C9:4C:67:DE:69:AB:4F:F7:2C:10:5C:03:C6 - Options: - Handshake was completed - Simple Client Mode: - Peer has closed the GnuTLS connection real 2m34.806s user 0m0.014s sys 0m0.009s on my wsl2 gnutls-cli doesn't go for ipv6. It immediately connects to '209.51.188.89:443'...