gargle@msi:~$ time gnutls-cli elpa.gnu.org
Processed 140 CA certificate(s).
Resolving 'elpa.gnu.org:443'...
Connecting to '2001:470:142::89:443'...
Connecting to '209.51.188.89:443'...
- Certificate type: X.509
- Got a certificate list of 3 certificates.
- Certificate[0] info:
 - subject `CN=elpa.gnu.org', issuer `CN=R3,O=Let's Encrypt,C=US',
serial 0x039d688ee4d536c2c5d180acd0b77dd534de, RSA key 2048 bits,
signed using RSA-SHA256, activated `2023-11-21 11:08:15 UTC', expires
`2024-02-19 11:08:14 UTC',
pin-sha256="QcwJ9TVQmsXtBHYcKDWyfyNR3X5gWYDtlVNItux6Rhg="
        Public Key ID:
                sha1:445b8bb7b09ad78854d5391cde68b9897a5a052c

sha256:41cc09f535509ac5ed04761c2835b27f2351dd7e605980ed955348b6ec7a4618
        Public Key PIN:
                pin-sha256:QcwJ9TVQmsXtBHYcKDWyfyNR3X5gWYDtlVNItux6Rhg=

- Certificate[1] info:
 - subject `CN=R3,O=Let's Encrypt,C=US', issuer `CN=ISRG Root
X1,O=Internet Security Research Group,C=US', serial
0x00912b084acf0c18a753f6d62e25a75f5a, RSA key 2048 bits, signed using
RSA-SHA256, activated `2020-09-04 00:00:00 UTC', expires `2025-09-15
16:00:00 UTC', pin-sha256="jQJTbIh0grw0/1TkHSumWb+Fs0Ggogr621gT3PvPKG0="
- Certificate[2] info:
 - subject `CN=ISRG Root X1,O=Internet Security Research Group,C=US',
issuer `CN=DST Root CA X3,O=Digital Signature Trust Co.', serial
0x4001772137d4e942b8ee76aa3c640ab7, RSA key 4096 bits, signed using
RSA-SHA256, activated `2021-01-20 19:14:03 UTC', expires `2024-09-30
18:14:03 UTC', pin-sha256="C5+lpZ7tcVwmwQIMcRtPbsQtWLABXhQzejna0wHFr8M="
- Status: The certificate is trusted.
- Description: 
(TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM)
- Session ID: 
1B:FA:A7:4C:81:3D:6B:3E:9C:2D:65:EB:5D:52:44:4B:E8:2E:58:C9:4C:67:DE:69:AB:4F:F7:2C:10:5C:03:C6
- Options:
- Handshake was completed

- Simple Client Mode:

- Peer has closed the GnuTLS connection

real    2m34.806s
user    0m0.014s
sys     0m0.009s


on my wsl2 gnutls-cli doesn't go for ipv6.  It immediately connects to
'209.51.188.89:443'...

Reply via email to