I will look into the wireshark trace Here is the output with the debug option CONNECTED(00000003) write to 0x55f11344dea0 [0x55f11345f100] (176 bytes => 176 (0xB0)) 0000 - 16 03 01 00 ab 01 00 00-a7 03 03 8c 1a 33 4f 8e .............3O. 0010 - fb e3 3f 51 82 36 ae 38-5e 86 3c af d2 82 0f d9 ..?Q.6.8^.<..... 0020 - 1a 1c c6 8e 55 98 4e db-16 08 5a 00 00 38 c0 2c ....U.N...Z..8., 0030 - c0 30 00 9f cc a9 cc a8-cc aa c0 2b c0 2f 00 9e .0.........+./.. 0040 - c0 24 c0 28 00 6b c0 23-c0 27 00 67 c0 0a c0 14 .$.(.k.#.'.g.... 0050 - 00 39 c0 09 c0 13 00 33-00 9d 00 9c 00 3d 00 3c .9.....3.....=.< 0060 - 00 35 00 2f 00 ff 01 00-00 46 00 0b 00 04 03 00 .5./.....F...... 0070 - 01 02 00 0a 00 0a 00 08-00 1d 00 17 00 19 00 18 ................ 0080 - 00 23 00 00 00 16 00 00-00 17 00 00 00 0d 00 20 .#............. 0090 - 00 1e 06 01 06 02 06 03-05 01 05 02 05 03 04 01 ................ 00a0 - 04 02 04 03 03 01 03 02-03 03 02 01 02 02 02 03 ................ read from 0x55f11344dea0 [0x55f113455ee3] (5 bytes => 5 (0x5)) 0000 - 48 54 54 50 2f HTTP/ 140415382974912:error:1408F10B:SSL routines:ssl3_get_record:wrong version number:../ssl/record/ssl3_record.c:252: --- no peer certificate available --- No client certificate CA names sent --- SSL handshake has read 5 bytes and written 176 bytes Verification: OK --- New, (NONE), Cipher is (NONE) Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : 0000 Session-ID: Session-ID-ctx: Master-Key: PSK identity: None PSK identity hint: None SRP username: None Start Time: 1528403881 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no --- -- Sent from: http://openssl.6102.n7.nabble.com/OpenSSL-User-f3.html -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users