Попытка подключиться к Kraken WebSocket, но ошибка рукопожатия 403. Что я делаю не так? (включены полные журналы ssl / http) - PullRequest
0 голосов
/ 11 апреля 2020

Я должен быть рядом. Любое предложение будет с благодарностью! Я пытаюсь подключиться к Kraken WebSocket API, чтобы получить книгу. Адрес ws.kraken.com, схема wss. Больше информации здесь: https://docs.kraken.com/websockets/#overview

Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
%% No cached client session
update handshake state: client_hello[1]
upcoming handshake states: server_hello[2]
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 1569791683 bytes = { 146, 252, 42, 7, 205, 76, 72, 61, 36, 221, 181, 143, 16, 69, 244, 128, 167, 87, 55, 67, 162, 231, 12, 155, 221, 27, 129, 247 }
Session ID:  {}
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
Compression Methods:  { 0 }
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
Extension extended_master_secret
***
HttpThread, WRITE: TLSv1.2 Handshake, length = 199
HttpThread, READ: TLSv1.2 Handshake, length = 91
check handshake state: server_hello[2]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1569791683 bytes = { 93, 81, 206, 220, 25, 157, 224, 198, 140, 79, 180, 167, 27, 64, 237, 3, 89, 63, 3, 59, 68, 79, 87, 78, 71, 82, 68, 1 }
Session ID:  {195, 218, 59, 129, 241, 53, 139, 119, 159, 147, 207, 137, 83, 118, 222, 160, 199, 92, 213, 167, 59, 132, 102, 252, 229, 80, 203, 125, 188, 206, 65, 119}
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
Compression Method: 0
Extension extended_master_secret
Extension renegotiation_info, renegotiated_connection: <empty>
Extension ec_point_formats, formats: [uncompressed]
***
%% Initialized:  [Session-1, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256]
** TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
update handshake state: server_hello[2]
upcoming handshake states: server certificate[11]
upcoming handshake states: server_key_exchange[12](optional)
upcoming handshake states: certificate_request[13](optional)
upcoming handshake states: server_hello_done[14]
upcoming handshake states: client certificate[11](optional)
upcoming handshake states: client_key_exchange[16]
upcoming handshake states: certificate_verify[15](optional)
upcoming handshake states: client change_cipher_spec[-1]
upcoming handshake states: client finished[20]
upcoming handshake states: server change_cipher_spec[-1]
upcoming handshake states: server finished[20]
HttpThread, READ: TLSv1.2 Handshake, length = 2154
check handshake state: certificate[11]
update handshake state: certificate[11]
upcoming handshake states: server_key_exchange[12](optional)
upcoming handshake states: certificate_request[13](optional)
upcoming handshake states: server_hello_done[14]
upcoming handshake states: client certificate[11](optional)
upcoming handshake states: client_key_exchange[16]
upcoming handshake states: certificate_verify[15](optional)
upcoming handshake states: client change_cipher_spec[-1]
upcoming handshake states: client finished[20]
upcoming handshake states: server change_cipher_spec[-1]
upcoming handshake states: server finished[20]
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: CN=kraken.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US
  Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2

  Key:  Sun EC public key, 256 bits
  public x coord: 48864501635196549963656287605463406591787460957477889020616429880476276089451
  public y coord: 32590247085304321676098654504198660704005340084345916162208835514735174901269
  parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
  Validity: [From: Sun Sep 29 19:00:00 CDT 2019,
               To: Tue Sep 29 07:00:00 CDT 2020]
  Issuer: CN=CloudFlare Inc ECC CA-2, O="CloudFlare, Inc.", L=San Francisco, ST=CA, C=US
  SerialNumber: [    01333d30 7d33550a db34d81b e40374dc]

Certificate Extensions: 10
[1]: ObjectId: 1.3.6.1.4.1.11129.2.4.2 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 81 F5 04 81 F2 00 F0   00 75 00 A4 B9 09 90 B4  .........u......
0010: 18 58 14 87 BB 13 A2 CC   67 70 0A 3C 35 98 04 F9  .X......gp.<5...
0020: 1B DF B8 E3 77 CD 0E C8   0D DC 10 00 00 01 6D 83  ....w.........m.
0030: A6 9B 5A 00 00 04 03 00   46 30 44 02 20 03 39 6F  ..Z.....F0D. .9o
0040: EE 48 65 B2 A5 BF 20 49   3F F6 C6 C3 BA 0D C9 3F  .He... I?......?
0050: 88 77 0A 58 ED 2C 82 9D   4F 63 5C 0A 4A 02 20 6F  .w.X.,..Oc\.J. o
0060: 2D B9 FE 12 2E 01 78 39   BA 6B 81 95 C3 F3 34 9D  -.....x9.k....4.
0070: F0 B9 77 C5 90 73 58 87   58 C3 7E 01 6E 45 23 00  ..w..sX.X...nE#.
0080: 77 00 5E A7 73 F9 DF 56   C0 E7 B5 36 48 7D D0 49  w.^.s..V...6H..I
0090: E0 32 7A 91 9A 0C 84 A1   12 12 84 18 75 96 81 71  .2z.........u..q
00A0: 45 58 00 00 01 6D 83 A6   9A D1 00 00 04 03 00 48  EX...m.........H
00B0: 30 46 02 21 00 BD 5B 80   3C C7 23 BB E8 3F D8 1C  0F.!..[.<.#..?..
00C0: 09 DB BB 4E 02 51 94 CB   DD 1A 4C A5 40 A2 23 87  ...N.Q....L.@.#.
00D0: 5D CE C1 5C A7 02 21 00   E4 6B 6B AE 93 A9 5C 2A  ]..\..!..kk...\*
00E0: A0 1A 7B 3D E2 04 C7 FF   29 BB E6 21 A8 B7 C8 0D  ...=....)..!....
00F0: 5C 3D AE 25 F5 DB 0F C1                            \=.%....


[2]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
  [
   accessMethod: ocsp
   accessLocation: URIName: http://ocsp.digicert.com
,
   accessMethod: caIssuers
   accessLocation: URIName: http://cacerts.digicert.com/CloudFlareIncECCCA-2.crt
]
]

[3]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 3E 74 2D 1F CF 45 75 04   7E 3F C0 A2 87 3E 4C 43  >t-..Eu..?...>LC
0010: 83 51 13 C6                                        .Q..
]
]

[4]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:false
  PathLen: undefined
]

[5]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
  [DistributionPoint:
     [URIName: http://crl3.digicert.com/CloudFlareIncECCCA2.crl]
, DistributionPoint:
     [URIName: http://crl4.digicert.com/CloudFlareIncECCCA2.crl]
]]

[6]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [2.16.840.1.114412.1.1]
[PolicyQualifierInfo: [
  qualifierID: 1.3.6.1.5.5.7.2.1
  qualifier: 0000: 16 1C 68 74 74 70 73 3A   2F 2F 77 77 77 2E 64 69  ..https://www.di
0010: 67 69 63 65 72 74 2E 63   6F 6D 2F 43 50 53        gicert.com/CPS

]]  ]
  [CertificatePolicyId: [2.23.140.1.2.2]
[]  ]
]

[7]: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
  serverAuth
  clientAuth
]

[8]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
]

[9]: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
  DNSName: kraken.com
]

[10]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: C0 DE 22 6C E6 41 EE BB   59 E9 14 27 65 20 3E B6  .."l.A..Y..'e >.
0010: 5B 1F 62 FC                                        [.b.
]
]

]
  Algorithm: [SHA256withECDSA]
  Signature:
0000: 30 45 02 21 00 97 3E A1   28 46 D7 60 F2 51 F1 54  0E.!..>.(F.`.Q.T
0010: F6 2F D6 2D 0E BE E8 C0   CD ED 68 7A 79 83 52 E6  ./.-......hzy.R.
0020: C0 8B 2B 65 EB 02 20 75   41 80 77 6E 8B 92 02 8A  ..+e.. uA.wn....
0030: 2C 84 48 D2 2E 63 30 63   83 12 D8 EB 9F 15 48 27  ,.H..c0c......H'
0040: 45 D0 DC 30 C5 70 78                               E..0.px

]
chain [1] = [
[
  Version: V3
  Subject: CN=CloudFlare Inc ECC CA-2, O="CloudFlare, Inc.", L=San Francisco, ST=CA, C=US
  Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11

  Key:  Sun EC public key, 256 bits
  public x coord: 94687022452594623789201139772274845840918640222797827363368281341603711614293
  public y coord: 70731992715208353547438509908478121535737517664274520473054656860589489617443
  parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
  Validity: [From: Wed Oct 14 07:00:00 CDT 2015,
               To: Fri Oct 09 07:00:00 CDT 2020]
  Issuer: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
  SerialNumber: [    0ff3e616 39aa3d1a 1265f41f 8b34e5b6]

Certificate Extensions: 7
[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
  [
   accessMethod: ocsp
   accessLocation: URIName: http://ocsp.digicert.com
]
]

[2]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: E5 9D 59 30 82 47 58 CC   AC FA 08 54 36 86 7B 3A  ..Y0.GX....T6..:
0010: B5 04 4D F0                                        ..M.
]
]

[3]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:true
  PathLen:0
]

[4]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
  [DistributionPoint:
     [URIName: http://crl3.digicert.com/Omniroot2025.crl]
]]

[5]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [2.5.29.32.0]
[PolicyQualifierInfo: [
  qualifierID: 1.3.6.1.5.5.7.2.1
  qualifier: 0000: 16 1C 68 74 74 70 73 3A   2F 2F 77 77 77 2E 64 69  ..https://www.di
0010: 67 69 63 65 72 74 2E 63   6F 6D 2F 43 50 53        gicert.com/CPS

]]  ]
]

[6]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_CertSign
  Crl_Sign
]

[7]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 3E 74 2D 1F CF 45 75 04   7E 3F C0 A2 87 3E 4C 43  >t-..Eu..?...>LC
0010: 83 51 13 C6                                        .Q..
]
]

]
  Algorithm: [SHA256withRSA]
  Signature:
0000: 38 5F A7 FF FC 85 F2 73   32 E4 D5 A3 89 99 96 60  8_.....s2......`
0010: AF 32 C1 03 B3 65 DF BE   1E 03 CA A5 ED 85 B2 8F  .2...e..........
0020: AF 4B 8C 73 8F 2A 8C A9   00 0E 01 24 17 F7 EC 52  .K.s.*.....$...R
0030: 85 76 C8 E5 1C 79 CA C3   17 87 50 B6 04 33 36 9E  .v...y....P..36.
0040: 2A 9E 18 17 96 32 12 AF   43 CC 57 18 DE DB C7 D8  *....2..C.W.....
0050: 88 25 83 E5 CA 06 25 31   FD BD 5D 48 3B 51 01 DD  .%....%1..]H;Q..
0060: 2C 14 C7 C1 60 51 E9 95   01 D8 B2 33 56 0E 47 66  ,...`Q.....3V.Gf
0070: 8D 6C CD AF F9 85 D9 EB   1C 47 47 88 34 E8 F0 FA  .l.......GG.4...
0080: C2 AB 4F 69 4E 09 59 D4   57 C6 CC C1 C8 E3 E6 19  ..OiN.Y.W.......
0090: C1 58 38 52 E2 E2 83 85   DE 22 34 DC 3F A6 F7 AF  .X8R....."4.?...
00A0: 24 BC E0 6F C0 AB 68 2D   52 C7 6B 05 57 2C 42 1B  $..o..h-R.k.W,B.
00B0: 2D 48 87 03 0C 90 AB 48   48 A9 28 BE 34 8A FB BA  -H.....HH.(.4...
00C0: ED F4 60 99 1D 15 78 11   AA D9 6D 53 7F 69 28 BC  ..`...x...mS.i(.
00D0: B7 6B 20 76 7F A0 55 03   71 79 F5 67 A7 B0 A0 0A  .k v..U.qy.g....
00E0: 17 57 B2 00 A9 AD CF FF   67 8C 3E 26 E5 A7 24 BC  .W......g.>&..$.
00F0: C2 6F 10 E8 89 C6 70 A5   D2 1F 80 ED 0D 3F 27 13  .o....p......?'.

]
***
Found trusted certificate:
[
[
  Version: V3
  Subject: CN=kraken.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US
  Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2

  Key:  Sun EC public key, 256 bits
  public x coord: 48864501635196549963656287605463406591787460957477889020616429880476276089451
  public y coord: 32590247085304321676098654504198660704005340084345916162208835514735174901269
  parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
  Validity: [From: Sun Sep 29 19:00:00 CDT 2019,
               To: Tue Sep 29 07:00:00 CDT 2020]
  Issuer: CN=CloudFlare Inc ECC CA-2, O="CloudFlare, Inc.", L=San Francisco, ST=CA, C=US
  SerialNumber: [    01333d30 7d33550a db34d81b e40374dc]

Certificate Extensions: 10
[1]: ObjectId: 1.3.6.1.4.1.11129.2.4.2 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 81 F5 04 81 F2 00 F0   00 75 00 A4 B9 09 90 B4  .........u......
0010: 18 58 14 87 BB 13 A2 CC   67 70 0A 3C 35 98 04 F9  .X......gp.<5...
0020: 1B DF B8 E3 77 CD 0E C8   0D DC 10 00 00 01 6D 83  ....w.........m.
0030: A6 9B 5A 00 00 04 03 00   46 30 44 02 20 03 39 6F  ..Z.....F0D. .9o
0040: EE 48 65 B2 A5 BF 20 49   3F F6 C6 C3 BA 0D C9 3F  .He... I?......?
0050: 88 77 0A 58 ED 2C 82 9D   4F 63 5C 0A 4A 02 20 6F  .w.X.,..Oc\.J. o
0060: 2D B9 FE 12 2E 01 78 39   BA 6B 81 95 C3 F3 34 9D  -.....x9.k....4.
0070: F0 B9 77 C5 90 73 58 87   58 C3 7E 01 6E 45 23 00  ..w..sX.X...nE#.
0080: 77 00 5E A7 73 F9 DF 56   C0 E7 B5 36 48 7D D0 49  w.^.s..V...6H..I
0090: E0 32 7A 91 9A 0C 84 A1   12 12 84 18 75 96 81 71  .2z.........u..q
00A0: 45 58 00 00 01 6D 83 A6   9A D1 00 00 04 03 00 48  EX...m.........H
00B0: 30 46 02 21 00 BD 5B 80   3C C7 23 BB E8 3F D8 1C  0F.!..[.<.#..?..
00C0: 09 DB BB 4E 02 51 94 CB   DD 1A 4C A5 40 A2 23 87  ...N.Q....L.@.#.
00D0: 5D CE C1 5C A7 02 21 00   E4 6B 6B AE 93 A9 5C 2A  ]..\..!..kk...\*
00E0: A0 1A 7B 3D E2 04 C7 FF   29 BB E6 21 A8 B7 C8 0D  ...=....)..!....
00F0: 5C 3D AE 25 F5 DB 0F C1                            \=.%....


[2]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
  [
   accessMethod: ocsp
   accessLocation: URIName: http://ocsp.digicert.com
,
   accessMethod: caIssuers
   accessLocation: URIName: http://cacerts.digicert.com/CloudFlareIncECCCA-2.crt
]
]

[3]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 3E 74 2D 1F CF 45 75 04   7E 3F C0 A2 87 3E 4C 43  >t-..Eu..?...>LC
0010: 83 51 13 C6                                        .Q..
]
]

[4]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:false
  PathLen: undefined
]

[5]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
  [DistributionPoint:
     [URIName: http://crl3.digicert.com/CloudFlareIncECCCA2.crl]
, DistributionPoint:
     [URIName: http://crl4.digicert.com/CloudFlareIncECCCA2.crl]
]]

[6]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [2.16.840.1.114412.1.1]
[PolicyQualifierInfo: [
  qualifierID: 1.3.6.1.5.5.7.2.1
  qualifier: 0000: 16 1C 68 74 74 70 73 3A   2F 2F 77 77 77 2E 64 69  ..https://www.di
0010: 67 69 63 65 72 74 2E 63   6F 6D 2F 43 50 53        gicert.com/CPS

]]  ]
  [CertificatePolicyId: [2.23.140.1.2.2]
[]  ]
]

[7]: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
  serverAuth
  clientAuth
]

[8]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
]

[9]: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
  DNSName: kraken.com
]

[10]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: C0 DE 22 6C E6 41 EE BB   59 E9 14 27 65 20 3E B6  .."l.A..Y..'e >.
0010: 5B 1F 62 FC                                        [.b.
]
]

]
  Algorithm: [SHA256withECDSA]
  Signature:
0000: 30 45 02 21 00 97 3E A1   28 46 D7 60 F2 51 F1 54  0E.!..>.(F.`.Q.T
0010: F6 2F D6 2D 0E BE E8 C0   CD ED 68 7A 79 83 52 E6  ./.-......hzy.R.
0020: C0 8B 2B 65 EB 02 20 75   41 80 77 6E 8B 92 02 8A  ..+e.. uA.wn....
0030: 2C 84 48 D2 2E 63 30 63   83 12 D8 EB 9F 15 48 27  ,.H..c0c......H'
0040: 45 D0 DC 30 C5 70 78                               E..0.px

]
HttpThread, READ: TLSv1.2 Handshake, length = 148
check handshake state: server_key_exchange[12]
update handshake state: server_key_exchange[12]
upcoming handshake states: certificate_request[13](optional)
upcoming handshake states: server_hello_done[14]
upcoming handshake states: client certificate[11](optional)
upcoming handshake states: client_key_exchange[16]
upcoming handshake states: certificate_verify[15](optional)
upcoming handshake states: client change_cipher_spec[-1]
upcoming handshake states: client finished[20]
upcoming handshake states: server change_cipher_spec[-1]
upcoming handshake states: server finished[20]
*** ECDH ServerKeyExchange
Signature Algorithm SHA256withECDSA
Server key: Sun EC public key, 256 bits
  public x coord: 103870299237100647660570408942452308880031945079093596968185564497241125104617
  public y coord: 55386326449786111127312394418436759998039329408129170967111058554506455230335
  parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
HttpThread, READ: TLSv1.2 Handshake, length = 4
check handshake state: server_hello_done[14]
update handshake state: server_hello_done[14]
upcoming handshake states: client certificate[11](optional)
upcoming handshake states: client_key_exchange[16]
upcoming handshake states: certificate_verify[15](optional)
upcoming handshake states: client change_cipher_spec[-1]
upcoming handshake states: client finished[20]
upcoming handshake states: server change_cipher_spec[-1]
upcoming handshake states: server finished[20]
*** ServerHelloDone
*** ECDHClientKeyExchange
ECDH Public value:  { 4, 54, 122, 232, 105, 230, 209, 82, 85, 199, 240, 125, 55, 50, 158, 98, 210, 189, 112, 48, 227, 110, 112, 49, 103, 126, 99, 251, 165, 39, 209, 245, 115, 254, 119, 140, 51, 248, 189, 172, 85, 58, 154, 16, 119, 112, 156, 85, 15, 111, 219, 26, 189, 218, 14, 56, 218, 129, 254, 50, 124, 122, 189, 199, 156 }
update handshake state: client_key_exchange[16]
upcoming handshake states: certificate_verify[15](optional)
upcoming handshake states: client change_cipher_spec[-1]
upcoming handshake states: client finished[20]
upcoming handshake states: server change_cipher_spec[-1]
upcoming handshake states: server finished[20]
HttpThread, WRITE: TLSv1.2 Handshake, length = 70
SESSION KEYGEN:
PreMaster Secret:
0000: 23 A3 E5 08 2C 39 9E EF   7E 07 87 05 C8 63 5A 56  #...,9.......cZV
0010: D7 4A 58 0D 2B BE 2F B4   02 7E A6 98 1D C7 72 1C  .JX.+./.......r.
CONNECTION KEYGEN:
Client Nonce:
0000: 5E 91 1F C3 92 FC 2A 07   CD 4C 48 3D 24 DD B5 8F  ^.....*..LH=$...
0010: 10 45 F4 80 A7 57 37 43   A2 E7 0C 9B DD 1B 81 F7  .E...W7C........
Server Nonce:
0000: 5E 91 1F C3 5D 51 CE DC   19 9D E0 C6 8C 4F B4 A7  ^...]Q.......O..
0010: 1B 40 ED 03 59 3F 03 3B   44 4F 57 4E 47 52 44 01  .@..Y?.;DOWNGRD.
Master Secret:
0000: 99 CF 90 F1 56 BB C8 6D   3A E9 D9 70 F4 1D 5A E1  ....V..m:..p..Z.
0010: 54 4A 89 14 45 36 D2 B7   91 46 74 CA FE 6D D2 7A  TJ..E6...Ft..m.z
0020: C3 6A 61 B1 0D 2C 97 B7   C1 9E 99 33 0C 6F F6 27  .ja..,.....3.o.'
... no MAC keys used for this cipher
Client write key:
0000: 5F D8 09 76 93 69 2A 97   1C AF 59 29 57 4F 78 AB  _..v.i*...Y)WOx.
Server write key:
0000: A4 CD 04 B0 C7 E8 82 48   B8 88 36 C8 BB 25 BD 26  .......H..6..%.&
Client write IV:
0000: D1 C6 7B D9                                        ....
Server write IV:
0000: FE F8 A4 7C                                        ....
update handshake state: change_cipher_spec
upcoming handshake states: client finished[20]
upcoming handshake states: server change_cipher_spec[-1]
upcoming handshake states: server finished[20]
HttpThread, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 113, 3, 238, 228, 11, 150, 230, 211, 129, 37, 199, 167 }
***
update handshake state: finished[20]
upcoming handshake states: server change_cipher_spec[-1]
upcoming handshake states: server finished[20]
HttpThread, WRITE: TLSv1.2 Handshake, length = 40
HttpThread, READ: TLSv1.2 Change Cipher Spec, length = 1
update handshake state: change_cipher_spec
upcoming handshake states: server finished[20]
HttpThread, READ: TLSv1.2 Handshake, length = 40
check handshake state: finished[20]
update handshake state: finished[20]
*** Finished
verify_data:  { 16, 74, 7, 123, 78, 46, 163, 248, 186, 92, 92, 191 }
***
%% Cached client session: [Session-1, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256]
HttpThread, WRITE: TLSv1.2 Application Data, length = 232
20:39:15.686040-WARN KrakenWebSocketClient-ws.kraken.com:443 Could not handshake! httpResponseCode=403
HttpThread, called closeOutbound()
HttpThread, closeOutboundInternal()
HttpThread, SEND TLSv1.2 ALERT:  warning, description = close_notify
HttpThread, WRITE: TLSv1.2 Alert, length = 26
%% Invalidated:  [Session-1, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256]
20:39:15.687190-INFO KrakenWebSocketClient-ws.kraken.com:443 Client was disconnected
...