Okay, hexr is acting up again. Here is some verbose gnutls-client output : $ gnutls-cli -d 5 hexr.canonical.com Resolving 'hexr.canonical.com'... Connecting to '91.189.89.67:443'... |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA256 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA256 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA256 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA256 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1 |<3>| HSK[0x10e1b30]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1 |<3>| HSK[0x10e1b30]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1 |<3>| HSK[0x10e1b30]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1 |<3>| HSK[0x10e1b30]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1 |<3>| HSK[0x10e1b30]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1 |<3>| HSK[0x10e1b30]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: RSA_ARCFOUR_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: RSA_ARCFOUR_MD5 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: PSK_SHA_AES_128_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: PSK_SHA_AES_256_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1 |<3>| HSK[0x10e1b30]: Keeping ciphersuite: PSK_SHA_ARCFOUR_SHA1 |<3>| HSK[0x10e1b30]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1 |<3>| HSK[0x10e1b30]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1 |<3>| HSK[0x10e1b30]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1 |<2>| EXT[0x10e1b30]: Sending extension CERT_TYPE |<2>| EXT[0x10e1b30]: Sending extension SERVER_NAME |<2>| EXT[0x10e1b30]: Sending extension SAFE_RENEGOTIATION |<2>| EXT[0x10e1b30]: Sending extension SESSION_TICKET |<2>| EXT[0x10e1b30]: Sending extension SIGNATURE_ALGORITHMS |<3>| HSK[0x10e1b30]: CLIENT HELLO was sent [168 bytes] |<4>| REC[0x10e1b30]: Sending Packet[0] Handshake(22) with length: 168 |<4>| REC[0x10e1b30]: Sent Packet[1] Handshake(22) with length: 173 |<4>| REC[0x10e1b30]: Expected Packet[0] Handshake(22) with length: 1 |<4>| REC[0x10e1b30]: Received Packet[0] Handshake(22) with length: 57 |<4>| REC[0x10e1b30]: Decrypted Packet[0] Handshake(22) with length: 57 |<3>| HSK[0x10e1b30]: SERVER HELLO was received [57 bytes] |<3>| HSK[0x10e1b30]: Server's version: 3.1 |<3>| HSK[0x10e1b30]: SessionID length: 0 |<3>| HSK[0x10e1b30]: SessionID: |<3>| HSK[0x10e1b30]: Selected cipher suite: DHE_RSA_AES_128_CBC_SHA1 |<2>| EXT[0x10e1b30]: Found extension 'SERVER_NAME/0' |<2>| EXT[0x10e1b30]: Found extension 'SAFE_RENEGOTIATION/65281' |<2>| EXT[0x10e1b30]: Found extension 'SESSION_TICKET/35' |<3>| HSK[0x10e1b30]: Safe renegotiation succeeded |<4>| REC[0x10e1b30]: Expected Packet[1] Handshake(22) with length: 1 |<4>| REC[0x10e1b30]: Received Packet[1] Handshake(22) with length: 4688 |<4>| REC[0x10e1b30]: Decrypted Packet[1] Handshake(22) with length: 4688 |<3>| HSK[0x10e1b30]: CERTIFICATE was received [4688 bytes] |<4>| REC[0x10e1b30]: Expected Packet[2] Handshake(22) with length: 1 |<4>| REC[0x10e1b30]: Received Packet[2] Handshake(22) with length: 525 |<4>| REC[0x10e1b30]: Decrypted Packet[2] Handshake(22) with length: 525 |<3>| HSK[0x10e1b30]: SERVER KEY EXCHANGE was received [525 bytes] |<2>| ASSERT: gnutls_pk.c:266 |<2>| ASSERT: gnutls_pk.c:336 |<2>| ASSERT: gnutls_sig.c:354 |<2>| ASSERT: gnutls_sig.c:475 |<2>| ASSERT: auth_dhe.c:272 |<2>| ASSERT: gnutls_kx.c:423 |<2>| ASSERT: gnutls_handshake.c:2811 *** Fatal error: Decryption has failed. |<4>| REC: Sending Alert[2|20] - Bad record MAC |<4>| REC[0x10e1b30]: Sending Packet[1] Alert(21) with length: 2 |<4>| REC[0x10e1b30]: Sent Packet[2] Alert(21) with length: 7 *** Handshake has failed GnuTLS error: Decryption has failed.