[00:01:46.739,746] socket_manager: DNS resolved successfully [00:01:46.739,807] socket_manager: IP address of assets.yyyyyyyy.xxxxxxxx.com is 18.159.99.150 [00:01:46.739,837] socket_manager: Trying to access 18.159.99.150 on port 443 [00:01:46.739,990] net_sock_tls: tls_alloc: (xxxxxxxx_com): Allocated TLS context, 0x20015b3c [00:01:46.740,295] net_tcp: tcp_conn_ref: (xxxxxxxx_com): conn: 0x20038634, ref_count: 1 [00:01:46.740,325] net_tcp: tcp_conn_alloc: (xxxxxxxx_com): conn: 0x20038634 [00:01:46.740,905] net_sock: zsock_socket_internal: (xxxxxxxx_com): socket: ctx=0x200136d8, fd=4 [00:01:46.741,027] socket_manager: Set TLS socketopt successful [00:01:46.741,638] net_tcp: net_tcp_connect: (xxxxxxxx_com): context: 0x200136d8, local: 0.0.0.0, remote: 18.159.99.150 [00:01:46.742,797] net_tcp: net_tcp_connect: (xxxxxxxx_com): conn: 0x20038634 src: 172.20.10.9, dst: 18.159.99.150 [00:01:46.742,950] net_tcp: tcp_in: (xxxxxxxx_com): [LISTEN Seq=3189679833 Ack=0] [00:01:46.743,225] net_tcp: tcp_out_ext: (xxxxxxxx_com): SYN Seq=3189679833 Len=0 [00:01:46.743,377] net_tcp: tcp_send_process_no_lock: (xxxxxxxx_com): SYN Seq=3189679833 Len=0 [00:01:46.743,621] net_tcp: tcp_send: (xxxxxxxx_com): SYN Seq=3189679833 Len=0 [00:01:46.743,957] net_tcp: tcp_in: (xxxxxxxx_com): LISTEN->SYN_SENT [00:01:46.911,926] net_tcp: tcp_in: (rx_q[0]): SYN,ACK Seq=602829136 Ack=3189679834 Len=0 [SYN_SENT Seq=3189679834 Ack=0] [00:01:46.911,987] net_tcp: tcp_options_check: (rx_q[0]): len=4 [00:01:46.912,017] net_tcp: tcp_options_check: (rx_q[0]): opt: 2, opt_len: 4 [00:01:46.912,048] net_tcp: tcp_options_check: (rx_q[0]): MSS=1410 [00:01:46.912,078] net_tcp: tcp_in: (rx_q[0]): Lowering send window from 29200 to 1280 [00:01:46.912,109] net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20038634 window_full=0 [00:01:46.912,292] net_tcp: tcp_send_timer_cancel: (rx_q[0]): SYN Seq=3189679833 Len=0 [00:01:46.912,628] net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=3189679834 Ack=602829137 Len=0 [00:01:46.912,841] net_tcp: tcp_send_process_no_lock: (rx_q[0]): ACK Seq=3189679834 Ack=602829137 Len=0 [00:01:46.913,055] net_tcp: tcp_send: (rx_q[0]): ACK Seq=3189679834 Ack=602829137 Len=0 [00:01:46.913,360] net_tcp: tcp_in: (rx_q[0]): SYN_SENT->ESTABLISHED [00:01:46.913,421] net_tcp: net_tcp_connect: (xxxxxxxx_com): conn: 0x20038634, ret=0 [00:01:46.913,482] net_tcp: net_tcp_recv: (xxxxxxxx_com): context: 0x200136d8, cb: 0x30cc5, user_data: (nil) [00:01:46.925,109] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_tls.c:3211: |4| The SSL configuration is tls12 only. [00:01:46.929,229] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_tls.c:5312: |2| => handshake [00:01:46.929,290] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1964: |2| => flush output [00:01:46.929,351] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1976: |2| <= flush output [00:01:46.929,412] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:4192: |2| client state: 0 [00:01:46.929,473] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1964: |2| => flush output [00:01:46.929,534] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1976: |2| <= flush output [00:01:46.929,626] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:4192: |2| client state: 1 [00:01:46.929,687] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:0933: |2| => write client hello [00:01:46.929,779] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:0988: |3| client hello, max version: [3:3] [00:01:46.930,938] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:0998: |3| dumping 'client hello, random bytes' (32 bytes) [00:01:46.931,427] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:0998: |3| 0000: 25 6d c5 70 e2 80 80 59 65 0d f2 58 d6 0f 5d d9 %m.p...Ye..X..]. [00:01:46.931,884] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:0998: |3| 0010: 77 0b 5c 8e b7 bc c1 55 f5 ad c2 7e 35 0c d4 08 w.\....U...~5... [00:01:46.931,976] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:1058: |3| client hello, session id len.: 0 [00:01:46.932,098] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:1059: |3| dumping 'client hello, session id' (0 bytes) [00:01:46.932,189] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:1140: |3| client hello, got 0 ciphersuites (excluding SCSVs) [00:01:46.932,281] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:1150: |3| adding EMPTY_RENEGOTIATION_INFO_SCSV [00:01:46.932,342] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:1160: |3| client hello, compress len.: 1 [00:01:46.932,434] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:1161: |3| client hello, compress alg.: 0 [00:01:46.932,525] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:0225: |3| client hello, adding signature_algorithms extension [00:01:46.932,617] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:0530: |3| client hello, adding max_fragment_length extension [00:01:46.932,708] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:0592: |3| client hello, adding extended_master_secret extension [00:01:46.932,800] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:1309: |3| client hello, total extension length: 27 [00:01:46.932,861] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:2393: |2| => write handshake message [00:01:46.932,983] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:2544: |2| => write record [00:01:46.933,135] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:2633: |3| output record: msgtype = 22, version = [3:3], msglen = 74 [00:01:46.933,258] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:2638: |4| dumping 'output record sent to network' (79 bytes) [00:01:46.933,715] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:2638: |4| 0000: 16 03 03 00 4a 01 00 00 46 03 03 25 6d c5 70 e2 ....J...F..%m.p. [00:01:46.934,173] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:2638: |4| 0010: 80 80 59 65 0d f2 58 d6 0f 5d d9 77 0b 5c 8e b7 ..Ye..X..].w.\.. [00:01:46.934,661] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:2638: |4| 0020: bc c1 55 f5 ad c2 7e 35 0c d4 08 00 00 02 00 ff ..U...~5........ [00:01:46.935,089] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:2638: |4| 0030: 01 00 00 1b 00 0d 00 0e 00 0c 06 03 06 01 05 03 ................ [00:01:46.935,546] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:2638: |4| 0040: 05 01 04 03 04 01 00 01 00 01 04 00 17 00 00 ............... [00:01:46.935,577] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1964: |2| => flush output [00:01:46.935,699] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1982: |2| message length: 79, out_left: 79 [00:01:46.935,760] net_tcp: net_tcp_recv: (xxxxxxxx_com): context: 0x200136d8, cb: 0x30cc5, user_data: (nil) [00:01:46.935,852] net_tcp: tcp_window_full: (xxxxxxxx_com): conn: 0x20038634 window_full=0 [00:01:46.935,882] net_tcp: net_tcp_queue_data: (xxxxxxxx_com): conn: 0x20038634 Queued 79 bytes (total 79) [00:01:46.935,913] net_tcp: tcp_unsent_len: (xxxxxxxx_com): unsent_len=79 [00:01:46.936,309] net_tcp: tcp_out_ext: (xxxxxxxx_com): ACK,PSH Seq=3189679834 Ack=602829137 Len=79 [00:01:46.936,553] net_tcp: tcp_send_process_no_lock: (xxxxxxxx_com): ACK,PSH Seq=3189679834 Ack=602829137 Len=79 [00:01:46.936,798] net_tcp: tcp_send: (xxxxxxxx_com): ACK,PSH Seq=3189679834 Ack=602829137 Len=79 [00:01:46.937,194] net_tcp: tcp_send_data: (xxxxxxxx_com): conn: 0x20038634 total=79, unacked_len=79, send_win=1280, mss=1410 [00:01:46.937,225] net_tcp: tcp_send_data: (xxxxxxxx_com): conn: 0x20038634 send_data_timer=0, send_data_retries=0 [00:01:46.937,255] net_tcp: tcp_unsent_len: (xxxxxxxx_com): unsent_len=0 [00:01:46.937,316] net_tcp: tcp_window_full: (xxxxxxxx_com): conn: 0x20038634 window_full=0 [00:01:46.937,469] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1989: |2| ssl->f_send() returned 79 (-0xffffffb1) [00:01:46.937,561] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:2017: |2| <= flush output [00:01:46.937,591] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:2689: |2| <= write record [00:01:46.937,683] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:2521: |2| <= write handshake message [00:01:46.937,744] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:1346: |2| <= write client hello [00:01:46.937,805] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1964: |2| => flush output [00:01:46.937,866] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1976: |2| <= flush output [00:01:46.937,927] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:4192: |2| client state: 2 [00:01:46.937,988] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:1919: |2| => parse server hello [00:01:46.938,049] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:3721: |2| => read record [00:01:46.938,110] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1748: |2| => fetch input [00:01:46.938,446] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1903: |2| in_left: 0, nb_want: 5 [00:01:46.999,023] net_tcp: tcp_in: (rx_q[0]): ACK Seq=602829137 Ack=3189679913 Len=0 [ESTABLISHED Seq=3189679834 Ack=602829137] [00:01:46.999,053] net_tcp: tcp_in: (rx_q[0]): Lowering send window from 29200 to 1280 [00:01:46.999,084] net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20038634 window_full=0 [00:01:46.999,145] net_tcp: tcp_in: (rx_q[0]): conn: 0x20038634 len_acked=79 [00:01:46.999,176] net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20038634 window_full=0 [00:01:46.999,237] net_tcp: tcp_in: (rx_q[0]): conn: 0x20038634 total=0, unacked_len=0, send_win=1280, mss=1410 [00:01:46.999,267] net_tcp: tcp_in: (rx_q[0]): conn: 0x20038634 send_data_timer=1, send_data_retries=0 [00:01:46.999,298] net_tcp: tcp_unsent_len: (rx_q[0]): unsent_len=0 [00:01:46.999,328] net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20038634 window_full=0 [00:01:47.000,061] net_tcp: tcp_in: (rx_q[0]): ACK,PSH Seq=602829137 Ack=3189679913 Len=7 [ESTABLISHED Seq=3189679913 Ack=602829137] [00:01:47.000,091] net_tcp: tcp_in: (rx_q[0]): Lowering send window from 29200 to 1280 [00:01:47.000,122] net_tcp: tcp_window_full: (rx_q[0]): conn: 0x20038634 window_full=0 [00:01:47.000,488] net_tcp: tcp_out_ext: (rx_q[0]): ACK Seq=3189679913 Ack=602829144 Len=0 [00:01:47.000,701] net_tcp: tcp_send_process_no_lock: (rx_q[0]): ACK Seq=3189679913 Ack=602829144 Len=0 [00:01:47.000,915] net_tcp: tcp_send: (rx_q[0]): ACK Seq=3189679913 Ack=602829144 Len=0 [00:01:47.001,342] net_sock: zsock_received_cb: (rx_q[0]): ctx=0x200136d8, pkt=0x20036b40, st=0, user_data=(nil) [00:01:47.001,861] net_tcp: tcp_in: (rx_q[0]): ACK,RST Seq=602829144 Ack=3189679913 Len=0 [ESTABLISHED Seq=3189679913 Ack=602829144] [00:01:47.001,892] net_tcp: tcp_in: (rx_q[0]): ESTABLISHED->CLOSED [00:01:47.001,953] net_tcp: tcp_conn_unref_debug: (rx_q[0]): conn: 0x20038634, ref_count=1 (tcp_in():2330) [00:01:47.001,983] net_sock: zsock_received_cb: (rx_q[0]): ctx=0x200136d8, pkt=(nil), st=-104, user_data=(nil) [00:01:47.002,014] net_sock: zsock_received_cb: (rx_q[0]): Set EOF flag on pkt 0x20036b40 [00:01:47.002,166] net_tcp: context->tcp == NULL [00:01:47.002,288] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1928: |2| in_left: 0, nb_want: 5 [00:01:47.002,441] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1931: |2| ssl->f_recv(_timeout)() returned 5 (-0xfffffffb) [00:01:47.002,471] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1951: |2| <= fetch input [00:01:47.002,807] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:3454: |4| dumping 'input record header' (5 bytes) [00:01:47.003,051] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:3454: |4| 0000: 15 03 03 00 02 ..... [00:01:47.003,204] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:3456: |3| input record: msgtype = 21, version = [3:3], msglen = 2 [00:01:47.003,265] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1748: |2| => fetch input [00:01:47.003,356] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1903: |2| in_left: 5, nb_want: 7 [00:01:47.003,479] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1928: |2| in_left: 5, nb_want: 7 [00:01:47.003,601] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:1931: |2| ssl->f_recv(_timeout)() returned -76 (-0x004c) [00:01:47.003,723] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:4490: |1| mbedtls_ssl_fetch_input() returned -76 (-0x004c) [00:01:47.003,875] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:3754: |1| ssl_get_next_record() returned -76 (-0x004c) [00:01:47.003,997] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_cli.c:1924: |1| mbedtls_ssl_read_record() returned -76 (-0x004c) [00:01:47.004,058] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_tls.c:5323: |2| <= handshake [00:01:47.004,058] net_sock_tls: TLS handshake error: -4c [00:01:47.008,209] net_sock: z_impl_zsock_close: (xxxxxxxx_com): close: ctx=0x20015b3c, fd=3 [00:01:47.008,270] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:5553: |2| => write close notify [00:01:47.008,331] net_sock_tls: tls_debug: (xxxxxxxx_com): ssl_msg.c:5569: |2| <= write close notify [00:01:47.012,878] net_sock: z_impl_zsock_close: (xxxxxxxx_com): close: ctx=0x200136d8, fd=4 [00:01:47.012,908] net_tcp: net_tcp_recv: (xxxxxxxx_com): context: 0x200136d8, cb: (nil), user_data: (nil) [00:01:47.012,969] net_sock: zsock_flush_queue: (xxxxxxxx_com): discarding pkt 0x20036b40 [00:01:47.013,000] net_tcp: net_tcp_unref: (xxxxxxxx_com): context: 0x200136d8, conn: (nil) [00:01:47.013,031] socket_manager: Cannot connect to remote (-113)