# Pastebin eyymEmaG ~> drill www.freebsd.org ;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 54624 ;; flags: qr rd ra ; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;; www.freebsd.org. IN A ;; ANSWER SECTION: www.freebsd.org. 10 IN CNAME web.geo.freebsd.org. web.geo.freebsd.org. 150 IN A 96.47.72.77 ~> traceroute www.freebsd.org traceroute to web.geo.freebsd.org (96.47.72.77), 64 hops max, 40 byte packets 1 one-gw-to-rule-them-all.poneytelecom.eu (62.210.0.1) 0.199 ms 0.152 ms 0.120 ms 2 10.56.110.193 (10.56.110.193) 0.454 ms 0.486 ms 0.519 ms 3 51.158.0.103 (51.158.0.103) 0.865 ms 51.158.0.107 (51.158.0.107) 0.807 ms 0.915 ms 4 212.47.224.7 (212.47.224.7) 0.515 ms 0.657 ms 0.411 ms 5 51.158.8.181 (51.158.8.181) 0.544 ms 1.132 ms a9k2-49-infra-dc2.dc3.poneytelecom.eu (195.154.1.118) 0.693 ms 6 lag-110.ear3.Paris1.Level3.net (212.3.235.197) 1.005 ms 0.953 ms ae53.edge7.Paris1.Level3.net (212.3.235.201) 14.452 ms 7 ae9.3506.ear1.Newark1.net.lumen.tech (4.69.214.26) 83.229 ms 83.379 ms 83.236 ms 8 THE-NEW-YOR.ear1.Newark1.Level3.net (4.15.150.218) 83.566 ms 83.734 ms 83.559 ms 9 cs90.cs89new.v.ewr.nyinternet.net (96.47.77.210) 78.929 ms 78.788 ms 79.003 ms 10 96.47.66.42.static.nyinternet.net (96.47.66.42) 78.889 ms 78.725 ms 78.871 ms 11 wfe0-main.nyi.freebsd.org (96.47.72.77) 83.878 ms 83.626 ms 83.626 ms ~> curl -4vsSLo /dev/null https://www.freebsd.org/ * Host www.freebsd.org:443 was resolved. * IPv6: (none) * IPv4: 96.47.72.77 * Trying 96.47.72.77:443... * ALPN: curl offers h2,http/1.1 } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [25 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2150 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [79 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / id-ecPublicKey * ALPN: server accepted http/1.1 * Server certificate: * subject: CN=www.freebsd.org * start date: Mar 19 20:46:33 2025 GMT * expire date: Jun 17 20:46:32 2025 GMT * subjectAltName: host "www.freebsd.org" matched cert's "www.freebsd.org" * issuer: C=US; O=Let's Encrypt; CN=E5 * SSL certificate verify ok. * Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using ecdsa-with-SHA384 * Certificate level 1: Public key type EC/secp384r1 (384/192 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha256WithRSAEncryption * Connected to www.freebsd.org (96.47.72.77) port 443 * using HTTP/1.x } [5 bytes data] > GET / HTTP/1.1 > Host: www.freebsd.org > User-Agent: curl/8.12.1 > Accept: */* > * Request completely sent off { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [281 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [281 bytes data] < HTTP/1.1 200 OK