openssl s_client -tls1_2 -connect plot.ly:443 CONNECTED(00000003) depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root verify return:1 depth=2 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO RSA Certification Authority verify return:1 depth=1 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO RSA Domain Validation Secure Server CA verify return:1 depth=0 OU = Domain Control Validated, OU = EssentialSSL Wildcard, CN = *.plot.ly verify return:1 --- Certificate chain 0 s:/OU=Domain Control Validated/OU=EssentialSSL Wildcard/CN=*.plot.ly i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA 1 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority 2 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root 3 s:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root --- Server certificate -----BEGIN CERTIFICATE----- MIIFRDCCBCygAwIBAgIRAIy/qEJUU2ywWhStABgRYeYwDQYJKoZIhvcNAQELBQAw gZAxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAO BgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMTYwNAYD VQQDEy1DT01PRE8gUlNBIERvbWFpbiBWYWxpZGF0aW9uIFNlY3VyZSBTZXJ2ZXIg Q0EwHhcNMTUwMzA3MDAwMDAwWhcNMTcwMzA2MjM1OTU5WjBXMSEwHwYDVQQLExhE b21haW4gQ29udHJvbCBWYWxpZGF0ZWQxHjAcBgNVBAsTFUVzc2VudGlhbFNTTCBX aWxkY2FyZDESMBAGA1UEAxQJKi5wbG90Lmx5MIIBIjANBgkqhkiG9w0BAQEFAAOC AQ8AMIIBCgKCAQEA6K22XZ0RN/yW0AqOh5j1iXVw2PGqiSWmto5XwlUgm50yO8f1 c4p8x6NHbe9m4oCkWA1WHJf3laICOCVFTfYFNSkNAGYJ/9O7/QAb+KJ5RG3vlB5o 7TKvNO70mDGfF9aPSWQ4hyethU9RHGfpHQ4N/YkkxBehyBB8swd3QMKSK7SlYM1q KO9wYr+ZvEdTDTdtpaW1G+wYUVYPjQBl2SDsMTb6jh5J7D7t6Sx+v72uM8QeJH6Y bF+y+0xsC6gvLjNX7v1wK47yCNBxyrExcLIocwvGD7uw+GZbZVsgAJ4vifrQ1O1m PjaA5NX6/8PA1PoXvAtPy+u8N3b+f3kp81s6lwIDAQABo4IBzzCCAcswHwYDVR0j BBgwFoAUkK9qOpRaC9iQ6hJWc99DtDoo2ucwHQYDVR0OBBYEFLs6F22BIbmKxMpe KCNDXkS5PNsEMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMB0GA1UdJQQW MBQGCCsGAQUFBwMBBggrBgEFBQcDAjBPBgNVHSAESDBGMDoGCysGAQQBsjEBAgIH MCswKQYIKwYBBQUHAgEWHWh0dHBzOi8vc2VjdXJlLmNvbW9kby5jb20vQ1BTMAgG BmeBDAECATBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vY3JsLmNvbW9kb2NhLmNv bS9DT01PRE9SU0FEb21haW5WYWxpZGF0aW9uU2VjdXJlU2VydmVyQ0EuY3JsMIGF BggrBgEFBQcBAQR5MHcwTwYIKwYBBQUHMAKGQ2h0dHA6Ly9jcnQuY29tb2RvY2Eu Y29tL0NPTU9ET1JTQURvbWFpblZhbGlkYXRpb25TZWN1cmVTZXJ2ZXJDQS5jcnQw JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNvbW9kb2NhLmNvbTAdBgNVHREEFjAU ggkqLnBsb3QubHmCB3Bsb3QubHkwDQYJKoZIhvcNAQELBQADggEBADWI7RIBou6j EoMOKd+4YCeJITRJZghS8e9PbArpYPlU9DjZz0kf4sblLidiNfyVWM6Ac8BSnhDL aX+JBnVMDj1aI7H/J8jYlIEgLaMcedMOHsav1V3lRwcvgsytnNZP4LHQI7UrU+u/ jvdw0V5BYyPZdwk7Zb1wih4IqwNIG4R/AGGWATCK+Occuyl1VdEHyQCp3zFr1M72 ZPqCHcYIBAJxkJgfvTz9R7GN1z706CyhXmiWnXXs3pNlztCr3auLCbOU7OAnjafi EtQ5DU48jauDAJccTpITBvzjOyaQHC9i124dhEArcEHTLm9xVhOIgAAVX8dWY8tu zOs2BiayPBw= -----END CERTIFICATE----- subject=/OU=Domain Control Validated/OU=EssentialSSL Wildcard/CN=*.plot.ly issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA --- No client certificate CA names sent Peer signing digest: SHA512 Server Temp Key: ECDH, P-256, 256 bits --- SSL handshake has read 6045 bytes and written 433 bytes --- New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-GCM-SHA256 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES128-GCM-SHA256 Session-ID: 72CBB450DB20E1E55DA63D6BD894FEA0C3A73DABCA131E8FBF27C0BD364F0598 Session-ID-ctx: Master-Key: A1EA2B9AEF1CD0EB0030B10BE18DDB27690DEF4E3F026ABB69B1D2183B5D127623CFCAD5CB19A3F833CD9051EBF570C1 Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket: 0000 - ea 55 4c 73 4e 87 89 b7-b9 68 14 de 31 2c f7 c4 .ULsN....h..1,.. 0010 - c2 42 98 37 0d a9 a1 7d-5c be 9b 39 b3 23 b1 68 .B.7...}\..9.#.h 0020 - c2 e3 70 38 1b b3 95 a3-34 ae ae 3e 3c 8a 72 f4 ..p8....4..><.r. 0030 - 85 af 50 79 48 81 4b 37-ad 2f 07 44 f3 b8 c4 27 ..PyH.K7./.D...' 0040 - fe 4a 71 e2 ab 46 20 e4-04 d9 98 db 09 5b fb e2 .Jq..F ......[.. 0050 - 70 bb 08 95 e7 03 2d 02-97 ee ea fa ad 1b dc 59 p.....-........Y 0060 - df 55 92 0a 12 c5 ac 87-e8 3a 5e c0 76 da c7 14 .U.......:^.v... 0070 - 71 5f 10 44 8a ca 82 13-fd c3 83 44 d2 47 45 13 q_.D.......D.GE. 0080 - 38 aa 6c 85 fc b5 36 9a-c0 b5 77 af 3e 52 2d 18 8.l...6...w.>R-. 0090 - 3f 8c 81 b9 62 1d fd 54-b5 76 39 ca 53 cc a0 be ?...b..T.v9.S... Start Time: 1458512832 Timeout : 7200 (sec) Verify return code: 0 (ok) openssl s_client -tls1_1 -connect plot.ly:443 CONNECTED(00000003) depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root verify return:1 depth=2 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO RSA Certification Authority verify return:1 depth=1 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO RSA Domain Validation Secure Server CA verify return:1 depth=0 OU = Domain Control Validated, OU = EssentialSSL Wildcard, CN = *.plot.ly verify return:1 --- Certificate chain 0 s:/OU=Domain Control Validated/OU=EssentialSSL Wildcard/CN=*.plot.ly i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA 1 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority 2 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root 3 s:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root --- Server certificate -----BEGIN CERTIFICATE----- MIIFRDCCBCygAwIBAgIRAIy/qEJUU2ywWhStABgRYeYwDQYJKoZIhvcNAQELBQAw gZAxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAO BgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMTYwNAYD VQQDEy1DT01PRE8gUlNBIERvbWFpbiBWYWxpZGF0aW9uIFNlY3VyZSBTZXJ2ZXIg Q0EwHhcNMTUwMzA3MDAwMDAwWhcNMTcwMzA2MjM1OTU5WjBXMSEwHwYDVQQLExhE b21haW4gQ29udHJvbCBWYWxpZGF0ZWQxHjAcBgNVBAsTFUVzc2VudGlhbFNTTCBX aWxkY2FyZDESMBAGA1UEAxQJKi5wbG90Lmx5MIIBIjANBgkqhkiG9w0BAQEFAAOC AQ8AMIIBCgKCAQEA6K22XZ0RN/yW0AqOh5j1iXVw2PGqiSWmto5XwlUgm50yO8f1 c4p8x6NHbe9m4oCkWA1WHJf3laICOCVFTfYFNSkNAGYJ/9O7/QAb+KJ5RG3vlB5o 7TKvNO70mDGfF9aPSWQ4hyethU9RHGfpHQ4N/YkkxBehyBB8swd3QMKSK7SlYM1q KO9wYr+ZvEdTDTdtpaW1G+wYUVYPjQBl2SDsMTb6jh5J7D7t6Sx+v72uM8QeJH6Y bF+y+0xsC6gvLjNX7v1wK47yCNBxyrExcLIocwvGD7uw+GZbZVsgAJ4vifrQ1O1m PjaA5NX6/8PA1PoXvAtPy+u8N3b+f3kp81s6lwIDAQABo4IBzzCCAcswHwYDVR0j BBgwFoAUkK9qOpRaC9iQ6hJWc99DtDoo2ucwHQYDVR0OBBYEFLs6F22BIbmKxMpe KCNDXkS5PNsEMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMB0GA1UdJQQW MBQGCCsGAQUFBwMBBggrBgEFBQcDAjBPBgNVHSAESDBGMDoGCysGAQQBsjEBAgIH MCswKQYIKwYBBQUHAgEWHWh0dHBzOi8vc2VjdXJlLmNvbW9kby5jb20vQ1BTMAgG BmeBDAECATBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vY3JsLmNvbW9kb2NhLmNv bS9DT01PRE9SU0FEb21haW5WYWxpZGF0aW9uU2VjdXJlU2VydmVyQ0EuY3JsMIGF BggrBgEFBQcBAQR5MHcwTwYIKwYBBQUHMAKGQ2h0dHA6Ly9jcnQuY29tb2RvY2Eu Y29tL0NPTU9ET1JTQURvbWFpblZhbGlkYXRpb25TZWN1cmVTZXJ2ZXJDQS5jcnQw JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNvbW9kb2NhLmNvbTAdBgNVHREEFjAU ggkqLnBsb3QubHmCB3Bsb3QubHkwDQYJKoZIhvcNAQELBQADggEBADWI7RIBou6j EoMOKd+4YCeJITRJZghS8e9PbArpYPlU9DjZz0kf4sblLidiNfyVWM6Ac8BSnhDL aX+JBnVMDj1aI7H/J8jYlIEgLaMcedMOHsav1V3lRwcvgsytnNZP4LHQI7UrU+u/ jvdw0V5BYyPZdwk7Zb1wih4IqwNIG4R/AGGWATCK+Occuyl1VdEHyQCp3zFr1M72 ZPqCHcYIBAJxkJgfvTz9R7GN1z706CyhXmiWnXXs3pNlztCr3auLCbOU7OAnjafi EtQ5DU48jauDAJccTpITBvzjOyaQHC9i124dhEArcEHTLm9xVhOIgAAVX8dWY8tu zOs2BiayPBw= -----END CERTIFICATE----- subject=/OU=Domain Control Validated/OU=EssentialSSL Wildcard/CN=*.plot.ly issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA --- No client certificate CA names sent Server Temp Key: ECDH, P-256, 256 bits --- SSL handshake has read 6067 bytes and written 349 bytes --- New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-SHA Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.1 Cipher : ECDHE-RSA-AES128-SHA Session-ID: CE2751198D27C5C3100B395D4B976DA87DA84D638C57BC6F63715E5A369B7CA3 Session-ID-ctx: Master-Key: 8A76EB2C23894873B55B7920CC095DF235CC93ECDF715899FCB9FA82D91BFF54D0961514DCD36D812450D459E37E19B4 Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket: 0000 - ea 55 4c 73 4e 87 89 b7-b9 68 14 de 31 2c f7 c4 .ULsN....h..1,.. 0010 - 97 45 66 21 d1 30 ec 60-67 4a 76 5c cc 9a 5c d3 .Ef!.0.`gJv\..\. 0020 - d0 52 4b b0 41 75 96 07-e9 06 f3 24 b9 db c9 52 .RK.Au.....$...R 0030 - f1 89 32 60 fb 17 cb 72-01 96 81 9a d0 d4 92 e5 ..2`...r........ 0040 - 9b 12 22 b9 38 04 e8 7c-e6 e9 e2 90 e3 b7 6a e9 ..".8..|......j. 0050 - 3e 19 dd d6 10 89 51 07-5d 19 ac 34 51 2f 88 1c >.....Q.]..4Q/.. 0060 - 7e ec b8 78 c8 6c dc 99-9d ea ff 29 81 f0 85 3f ~..x.l.....)...? 0070 - 05 21 23 5c 72 41 d6 82-ba 13 33 02 02 9f cf 0d .!#\rA....3..... 0080 - a0 94 8f 80 f2 62 d9 23-36 57 be 31 fa bd 6a a2 .....b.#6W.1..j. 0090 - a5 bd 5e 8a 1c 66 b2 64-54 33 8f b1 b6 6a 23 9b ..^..f.dT3...j#. Start Time: 1458512917 Timeout : 7200 (sec) Verify return code: 0 (ok)