You are not logged in.
Pages: 1
git clone https://aur.archlinux.org/android-studio.git # results in
fatal: unable to access 'https://aur.archlinux.org/android-studio.git/': OpenSSL SSL_connect: Connection reset by peer in connection to aur.archlinux.org:443
same is true for git pull also for the aur repos I had cloned before this started happening.
I am able to clone github repos.
Also I am able to clone the aur repos in my windows os (dual booted, so uses same router and ISP)
I don't know what I did to break it. Please help.
Edit:
It seems to work fine on using my mobile internet through usb tethring. So something related to router. I wonder why it works on windows though.
Last edited by naman (2020-05-29 04:52:08)
Offline
Can you curl from that same url? Is your system up to date? What's the output of `pacman -Qs ssl`?
"UNIX is simple and coherent" - Dennis Ritchie; "GNU's Not Unix" - Richard Stallman
Offline
Also: Is your system's date and time correct?
Inofficial first vice president of the Rust Evangelism Strike Force
Offline
Could be a missing cert. Try reinstalling `ca-certificates` to see if something wasn't broken there.
Offline
Can you curl from that same url?
$ Curl https://aur.archlinux.org/android-studio.git/
curl: (35) OpenSSL SSL_connect: Connection reset by peer in connection to aur.archlinux.org:443
Is your system up to date?
Yes, as much as arch can be up to date. I had run pacman -Syu yesterday, twice
What's the output of `pacman -Qs ssl`?
$ pacman -Qs ssl
local/flac 1.3.3-2
Free Lossless Audio Codec
local/lzo 2.10-3
Portable lossless data compression library
local/openssl 1.1.1.g-2
The Open Source toolkit for Secure Sockets Layer and Transport Layer Security
Also: Is your system's date and time correct?
$ date
returns correct date and time.
My actual date and time is set in utc. The date utility returns date after converting it to local timezone.
Could be a missing cert. Try reinstalling `ca-certificates` to see if something wasn't broken there.
Did that, it reinstalled, Didn't help.
It seems to work fine on using my mobile internet through usb tethring. So something related to router. I wonder why it works on windows though.
Last edited by naman (2020-05-29 08:46:47)
Offline
curl -v https://aur.archlinux.org/android-studio.git/ > /dev/null
curl -v https://www.google.com/ > /dev/null
Offline
curl -v https://aur.archlinux.org/android-studio.git/ > /dev/null
$ curl -v https://aur.archlinux.org/android-studio.git/ > /dev/null ~
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying 5.9.250.164:443...
* Trying 2a01:4f8:160:3033::2:443...
* Immediate connect fail for 2a01:4f8:160:3033::2: Network is unreachable
* Connected to aur.archlinux.org (5.9.250.164) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: none
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [19 bytes data]
0 0 0 0 0 0 0 0 --:--:-- 0:03:03 --:--:-- 0* OpenSSL SSL_connect: Connection reset by peer in connection to aur.archlinux.org:443
0 0 0 0 0 0 0 0 --:--:-- 0:03:03 --:--:-- 0
* Closing connection 0
curl: (35) OpenSSL SSL_connect: Connection reset by peer in connection to aur.archlinux.org:443
curl -v https://www.google.com/ > /dev/null
$ curl -v https://www.google.com/ > /dev/null ~
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying 172.217.166.164:443...
* Connected to www.google.com (172.217.166.164) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: none
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [2340 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [80 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
* subject: C=US; ST=California; L=Mountain View; O=Google LLC; CN=www.google.com
* start date: May 5 08:31:24 2020 GMT
* expire date: Jul 28 08:31:24 2020 GMT
* subjectAltName: host "www.google.com" matched cert's "www.google.com"
* issuer: C=US; O=Google Trust Services; CN=GTS CA 1O1
* SSL certificate verify ok.
* Using HTTP2, server supports multi-use
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x5576f6e588b0)
} [5 bytes data]
> GET / HTTP/2
> Host: www.google.com
> user-agent: curl/7.70.0
> accept: */*
>
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [264 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [264 bytes data]
* old SSL session ID is stale, removing
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 100)!
} [5 bytes data]
< HTTP/2 200
< date: Fri, 29 May 2020 07:23:18 GMT
< expires: -1
< cache-control: private, max-age=0
< content-type: text/html; charset=ISO-8859-1
< p3p: CP="This is not a P3P policy! See g.co/p3phelp for more info."
< server: gws
< x-xss-protection: 0
< x-frame-options: SAMEORIGIN
< set-cookie: 1P_JAR=2020-05-29-07; expires=Sun, 28-Jun-2020 07:23:18 GMT; path=/; domain=.google.com; Secure
< set-cookie: NID=204=cDnFKwVFMWF4HcJhtqN1Ix5-tKcqpjP97CY1pXuNCarpRkeae0zdtYu2CD1cP2__ajhJO3gtKKnaeUYbWIgkyiESuU1gM9pMw25S3w6x5aJ_irq13qCQfl6XCFxumWdE-Zsd-rBnTeoleVD4sXHEIL-nIVnxQqtXQbqtwRISe8E; expires=Sat, 28-Nov-2020 07:23:18 GMT; path=/; domain=.google.com; HttpOnly
< alt-svc: h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
< accept-ranges: none
< vary: Accept-Encoding
<
{ [5 bytes data]
100 15187 0 15187 0 0 31443 0 --:--:-- --:--:-- --:--:-- 31443
* Connection #0 to host www.google.com left intact
Last edited by naman (2020-05-30 09:10:06)
Offline
What does
openssl s_client -connect aur.archlinux.org:https
yield?
Also please use code-Tags for terminal output.
Inofficial first vice president of the Rust Evangelism Strike Force
Offline
naman, please edit your post to use code tags:
https://wiki.archlinux.org/index.php/Co … s_and_code
https://bbs.archlinux.org/help.php#bbcode
Sakura:-
Mobo: MSI MAG X570S TORPEDO MAX // Processor: AMD Ryzen 9 5950X @4.9GHz // GFX: AMD Radeon RX 5700 XT // RAM: 32GB (4x 8GB) Corsair DDR4 (@ 3000MHz) // Storage: 1x 3TB HDD, 6x 1TB SSD, 2x 120GB SSD, 1x 275GB M2 SSD
Making lemonade from lemons since 2015.
Offline
What does
openssl s_client -connect aur.archlinux.org:https
yield?
$ openssl s_client -connect aur.archlinux.org:https ~
CONNECTED(00000003)
depth=2 O = Digital Signature Trust Co., CN = DST Root CA X3
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
verify return:1
depth=0 CN = aur.archlinux.org
verify return:1
---
Certificate chain
0 s:CN = aur.archlinux.org
i:C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
1 s:C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
i:O = Digital Signature Trust Co., CN = DST Root CA X3
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIGWzCCBUOgAwIBAgISAz4EjTGglI//rSpn8Vaw0yLjMA0GCSqGSIb3DQEBCwUA
MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQD
ExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMzAeFw0yMDA1MDQxMjAyMTdaFw0y
MDA4MDIxMjAyMTdaMBwxGjAYBgNVBAMTEWF1ci5hcmNobGludXgub3JnMIICIjAN
BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAx3TU3vy7UOAl5o3i0t9O/Wx0TEp7
/SaRerOFeU1iPxGpk5DPymS05lq0MZTJ73TWOfB9j2BWhR3lw9Aol7uBstw455Sp
hV6xPBpALxRWeaflFb73MLkkj+b8EOYMpdVpITSlegzDCxipuFV9aNcrL8dogTfq
rMKnpL6ncWjRAX2rl/2Bz0Koo5wS7J+MNVJmsRSZEPHrJ7FwisnYQxWiE26AtKen
4Wc+ev07yGdhioNTlomLdO8CKXfYrXejVOHN0hKKYmMXAyUg/aY1yxQh8YFg9kwT
yw1bRArW5SgkaKRQBQ0tNaGRsaAXSfgaOXKrujVKFLWBHPfOaGBeMiSGWH/P9M6c
YIbrlQwizCn2EDQHNrDfFDtt2+1M+sjWp6pG0UI8pTqjvV2J3vz1YD5LEaeYRAxM
Cp2emWXCdo9HEn1QL/M/tpA5/u8S8tz1jJXaTo6YE+bRwmp1glbn0yuyBw/axNRk
DBMiQeJVh3mw22ibNgcv2Go5bchFLenfTKOQGifGNQ6Pr7ua6HcuDXO5W+yEqR/f
WjQngyjRSBZQwaT9DrBhqGHoZ6Y6ZpUa0jYbBMretQywvw9n2FHkS8OZtLK9yiR/
RiXyT8swKDaYmcmDmXiN3AtfEaf3xQTFWZmF+K8afETSlafm1RMWxNbBNjyLWkaY
wrjIyGG2Ox5tClUCAwEAAaOCAmcwggJjMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUE
FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU
gMR9oMrT/mJLDHlI1DVAZRy3YYkwHwYDVR0jBBgwFoAUqEpqYwR93brm0Tm3pkVl
7/Oo7KEwbwYIKwYBBQUHAQEEYzBhMC4GCCsGAQUFBzABhiJodHRwOi8vb2NzcC5p
bnQteDMubGV0c2VuY3J5cHQub3JnMC8GCCsGAQUFBzAChiNodHRwOi8vY2VydC5p
bnQteDMubGV0c2VuY3J5cHQub3JnLzAcBgNVHREEFTATghFhdXIuYXJjaGxpbnV4
Lm9yZzBMBgNVHSAERTBDMAgGBmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsG
AQUFBwIBFhpodHRwOi8vY3BzLmxldHNlbmNyeXB0Lm9yZzCCAQUGCisGAQQB1nkC
BAIEgfYEgfMA8QB2APCVpFnyANGCQBAtL5OIjq1L/h1H45nh0DSmsKiqjrJzAAAB
cd/Hrt0AAAQDAEcwRQIgdDEUvLSi+7DwjEtAuMdUY4RT+CGQsM7kkFqURPlC5DoC
IQCZ8lqQ5CfG30kX7geXeG6PfS4vt7mkHwhPJ3YmisNI2QB3AAe3XBvlfWj/8bDG
HSMVx7rmV3xXlLdq7rxhOhpp06IcAAABcd/HrwkAAAQDAEgwRgIhAMi+/rv/hqLA
czUJXs3QYU2LmV8ILOkDfwjNV98gmmkoAiEA5k2NGk+I/TmGNxCkw7fC3nxjAyax
/WtV0AqK8oVWKVswDQYJKoZIhvcNAQELBQADggEBAJo2h6HouEXhnaWWlobJPmG3
eGYjz8YsHBdyGHOd6fvk7p3/QmtscM+28cBae0W1Mewj97gcoG5rl8yZhSwXwbkp
JJ6lBFsvr084AgbM03yzBYJRuNDQ5WkOEJ0GstdusiF8qhE1Q5ZO//xIYcoZgW2i
KizuOH53rLGwNCUKg494yzZBNmyY+OmQgD75c/KRjQ7SuTsCf7qAlk8wgxAQFkV6
BwGkcpmjuDLScEWD84o0Lctgpwb6N3fUN4aOJ/Becj29fRMPdHaVHolKqsXiW1W0
zNN9Wa7EPiP5bNAbQrp2SCSiPJZutsVH4eRT96v5efuZ0iMSc/q7FdIeRxg6zzw=
-----END CERTIFICATE-----
subject=CN = aur.archlinux.org
issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 3626 bytes and written 399 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 4096 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: D9CB32EBA6EC99352B8FAEF85B9AF82598D8C97145693052E26C6020B582E565
Session-ID-ctx:
Resumption PSK: 913241732B2D31F5D0189D93C8EAF99AA07B2578EE60DCE4F96A24512D8EB128F1B0839C8F060FA31C92E1B286AAA7AC
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 86400 (seconds)
TLS session ticket:
0000 - 35 f4 78 3e 5a 2a 0b c1-5d ad 93 98 04 f3 53 76 5.x>Z*..].....Sv
0010 - 29 f3 66 d8 7e 4f e6 af-81 34 29 d0 50 c0 3a 7d ).f.~O...4).P.:}
Start Time: 1590742169
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: 51E302EBBFE68A16D36B9E9545BC27894DCE68206C98ACF9A9D35FA90B8F38FA
Session-ID-ctx:
Resumption PSK: 45828FC37921026FEFDA45A4D288F11FE6EECEBCB8F4FE2A6363A0C0CCC2E4A6D284839FA2F171A940A7BDFC186E687B
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 86400 (seconds)
TLS session ticket:
0000 - cf c6 db 92 e5 8e a2 35-44 15 63 96 b7 d5 c5 5e .......5D.c....^
0010 - df 31 e6 f4 d5 fb ae e1-0b 4b 66 1d f2 cb 3c 15 .1.......Kf...<.
Start Time: 1590742169
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
closed
Also please use code-Tags for terminal output.
i apologize
Offline
pacman -Qikk curl ca-certificates ca-certificates-mozilla openssl
strace curl 2>&1 | grep open
Offline
pacman -Qikk curl ca-certificates ca-certificates-mozilla openssl
♪ pacman -Qikk curl ca-certificates ca-certificates-mozilla openssl ~
Name : curl
Version : 7.70.0-1
Description : An URL retrieval utility and library
Architecture : x86_64
URL : https://curl.haxx.se
Licenses : MIT
Groups : None
Provides : libcurl.so=4-64
Depends On : ca-certificates krb5 libssh2 openssl zlib libpsl libnghttp2 libidn2 libidn2.so=0-64
Optional Deps : None
Required By : curlftpfs elfutils fbreader git keepassxc libelf pacman poppler steam yubico-c yubico-c-client
Optional For : systemd vicious
Conflicts With : None
Replaces : None
Installed Size : 1657.16 KiB
Packager : Christian Hesse <arch@eworm.de>
Build Date : Wednesday 29 April 2020 12:36:33 PM
Install Date : Wednesday 13 May 2020 11:49:52 PM
Install Reason : Installed as a dependency for another package
Install Script : No
Validated By : Signature
curl: 471 total files, 0 altered files
Name : ca-certificates
Version : 20181109-3
Description : Common CA certificates (default providers)
Architecture : any
URL : https://src.fedoraproject.org/rpms/ca-certificates
Licenses : GPL2
Groups : None
Provides : None
Depends On : ca-certificates-mozilla
Optional Deps : None
Required By : aria2 curl
Optional For : openssl
Conflicts With : ca-certificates-cacert<=20140824-4
Replaces : ca-certificates-cacert<=20140824-4
Installed Size : 0.00 B
Packager : Jan Alexander Steffens (heftig) <jan.steffens@gmail.com>
Build Date : Wednesday 22 January 2020 02:42:23 PM
Install Date : Wednesday 27 May 2020 02:15:42 PM
Install Reason : Installed as a dependency for another package
Install Script : No
Validated By : Signature
ca-certificates: 0 total files, 0 altered files
Name : ca-certificates-mozilla
Version : 3.52.1-2
Description : Mozilla's set of trusted CA certificates
Architecture : x86_64
URL : https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS
Licenses : MPL GPL
Groups : None
Provides : None
Depends On : ca-certificates-utils>=20181109-3
Optional Deps : None
Required By : ca-certificates
Optional For : None
Conflicts With : None
Replaces : None
Installed Size : 941.22 KiB
Packager : Jan Alexander Steffens (heftig) <jan.steffens@gmail.com>
Build Date : Wednesday 20 May 2020 07:11:40 AM
Install Date : Thursday 21 May 2020 05:27:19 PM
Install Reason : Installed as a dependency for another package
Install Script : No
Validated By : Signature
ca-certificates-mozilla: 5 total files, 0 altered files
Name : openssl
Version : 1.1.1.g-2
Description : The Open Source toolkit for Secure Sockets Layer and Transport Layer Security
Architecture : x86_64
URL : https://www.openssl.org
Licenses : custom:BSD
Groups : None
Provides : None
Depends On : perl
Optional Deps : ca-certificates [installed]
Required By : coreutils cryptsetup curl git iputils kmod ldns libarchive libevent libsasl libssh libssh2 mupdf nodejs openssh podofo python python2 srt zathura-pdf-mupdf
Optional For : glib-networking
Conflicts With : None
Replaces : None
Installed Size : 7.30 MiB
Packager : Jelle van der Waa <jelle@vdwaa.nl>
Build Date : Monday 25 May 2020 12:44:32 AM
Install Date : Tuesday 26 May 2020 06:18:23 PM
Install Reason : Installed as a dependency for another package
Install Script : No
Validated By : Signature
openssl: 4108 total files, 0 altered files
strace curl 2>&1 | grep open
♪ strace curl 2>&1 | grep open ~
openat(AT_FDCWD, "/etc/ld.so.preload", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libcurl.so.4", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libidn2.so.0", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libpsl.so.5", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libssl.so.1.1", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libcrypto.so.1.1", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libgssapi_krb5.so.2", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libkrb5.so.3", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libk5crypto.so.3", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libcom_err.so.2", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libunistring.so.2", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libkrb5support.so.0", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libkeyutils.so.1", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/usr/lib/libresolv.so.2", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/etc/ssl/openssl.cnf", O_RDONLY) = 3
openat(AT_FDCWD, "/usr/lib/locale/locale-archive", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/home/navn/.curlrc", O_RDONLY) = -1 ENOENT (No such file or directory)
Offline
What is the output of:
curl --tls-max 1.2 https://aur.archlinux.org/ > /dev/null
curl --trace-ascii dump.txt https://aur.archlinux.org/android-studio.git/ > /dev/null
cat dump.txt
Last edited by loqs (2020-05-29 19:58:09)
Offline
What is the output of:
curl --tls-max 1.2 https://aur.archlinux.org/ > /dev/null curl --trace-ascii dump.txt https://aur.archlinux.org/android-studio.git/ > /dev/null cat dump.txt
♪ curl --tls-max 1.2 https://aur.archlinux.org/ > /dev/null ~
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 13468 0 13468 0 0 6913 0 --:--:-- 0:00:01 --:--:-- 6910
♪ curl --trace-ascii dump.txt https://aur.archlinux.org/android-studio.git/ > /dev/null ~
cat dump.txt
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- 0:03:02 --:--:-- 0
curl: (35) OpenSSL SSL_connect: Connection reset by peer in connection to aur.archlinux.org:443
== Info: Trying 5.9.250.164:443...
== Info: Trying 2a01:4f8:160:3033::2:443...
== Info: Immediate connect fail for 2a01:4f8:160:3033::2: Network is unreachable
== Info: Connected to aur.archlinux.org (5.9.250.164) port 443 (#0)
== Info: ALPN, offering h2
== Info: ALPN, offering http/1.1
== Info: successfully set certificate verify locations:
== Info: CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: none
=> Send SSL data, 5 bytes (0x5)
0000: .....
== Info: TLSv1.3 (OUT), TLS handshake, Client hello (1):
=> Send SSL data, 512 bytes (0x200)
0000: .......y........5...K..,....%....z..pF U..qhI?gY)/L.=.q8#.l.....
0040: ..p.5...>.......,.0.........+./...$.(.k.#.'.g.....9.....3.....=.
0080: <.5./.....u.........aur.archlinux.org........................3t.
00c0: ........h2.http/1.1.........1.....0.............................
0100: ....................+............-.....3.&.$... ...[*....Y.E.DE.
0140: .....x..E.Y..S.J................................................
0180: ................................................................
01c0: ................................................................
<= Recv SSL data, 5 bytes (0x5)
0000: ....z
== Info: TLSv1.3 (IN), TLS handshake, Server hello (2):
<= Recv SSL data, 122 bytes (0x7a)
0000: ...v....g+.b.#7..........JM...p....... U..qhI?gY)/L.=.q8#.l.....
0040: ..p.5........+.....3.$... >........B.1-..oe.N.H..].j.....
<= Recv SSL data, 5 bytes (0x5)
0000: .....
<= Recv SSL data, 5 bytes (0x5)
0000: ....$
<= Recv SSL data, 1 bytes (0x1)
0000: .
== Info: TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
<= Recv SSL data, 19 bytes (0x13)
0000: .................h2
<= Recv SSL data, 5 bytes (0x5)
0000: .....
== Info: OpenSSL SSL_connect: Connection reset by peer in connection to aur.archlinux.org:443
== Info: Closing connection 0
Offline
Pages: 1