证书管理 curl sv resolve 'foo.com:18443:192.168.0.3' cert client.crt key client.key cacert ca.crt Added foo.com:18443:192.168.0.3 to DNS cache Hostname foo.com was found in DNS cache Trying 192.168.0.3:18443... Connected to foo.com (192.168.0.3) port 18443 ( 0) ALPN, offering h2 ALPN, offering http/1.1 successfully set certificate verify locations: CAfile: ca.crt CApath: none TLSv1.3 (OUT), TLS handshake, Client hello (1): TLSv1.3 (IN), TLS handshake, Server hello (2): TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): TLSv1.3 (IN), TLS handshake, Request CERT (13): TLSv1.3 (IN), TLS handshake, Certificate (11): TLSv1.3 (IN), TLS handshake, CERT verify (15): TLSv1.3 (IN), TLS handshake, Finished (20): TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): TLSv1.3 (OUT), TLS handshake, Certificate (11): TLSv1.3 (OUT), TLS handshake, CERT verify (15): TLSv1.3 (OUT), TLS handshake, Finished (20): SSL connection using TLSv1.3 / TLSAES256GCMSHA384 ALPN, server accepted to use h2 Server certificate: subject: CCN; STGD; LGZ; OTYY; OUMS; CNfoo.com start date: Feb 13 03:09:52 2025 GMT expire date: Feb 11 03:09:52 2035 GMT common name: foo.com (matched) issuer: CCN; STGD; LGZ; ODX; OUTYY SSL certificate verify ok. Using HTTP2, server supports multiuse Connection state changed (HTTP/2 confirmed) Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len0 Using Stream ID: 1 (easy handle 0x55696bbf2690) > GET /headers HTTP/2 > Host: foo.com:18443 > useragent: curl/7.71.1 > accept: / > TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): old SSL session ID is stale, removing Connection state changed (MAXCONCURRENTSTREAMS 2147483647)! < HTTP/2 200 < server: istioenvoy < date: Thu, 13 Feb 2025 07:01:54 GMT < contenttype: application/json < contentlength: 1854 < accesscontrolalloworigin: < accesscontrolallowcredentials: true < xenvoyupstreamservicetime: 4 < {"headers":{"Accept":"/","Host":"foo.com:18443","UserAgent":"curl/7.71.1","XB3Parentspanid":"69de88af50fc781c","XB3Sampled":"0","XB3Spanid":"9fd5daba6fa5657c","XB3Traceid":"cdcc12b950c3d1ca69de88af50fc781c","XEnvoyAttemptCount":"1","XEnvoyInternal":"true","XForwardedClientCert":"Hash304002d17f8665ab020c67e59c56958708c89e622d0cde1893cddc1c2c7d1315;Cert"BEGIN%20CERTIFICATE%0AMIIDHTCCAgUCFHMQj5mjMwsw%2FqrnJtfOXdq0NSGtMA0GCSqGSIb3DQEBCwUAMEIx%0ACzAJBgNVBAYTAkNOMQswCQYDVQQIDAJHRDELMAkGA1UEBwwCR1oxCzAJBgNVBAoM%0AAkRYMQwwCgYDVQQLDANUWVkwHhcNMjUwMjEzMDMwOTUyWhcNMzUwMjExMDMwOTUy%0AWjBUMQswCQYDVQQGEwJDTjELMAkGA1UECAwCR0QxCzAJBgNVBAcMAkdaMQwwCgYD%0AVQQKDANUWVkxCzAJBgNVBAsMAk1TMRAwDgYDVQQDDAdmb28uY29tMIIBIjANBgkq%0AhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvQ61G7G0aBCd7iYWmQKTf5%2BvlgnCuhdk%0ApkQlW%2B3oaxRqTmFqGj44kA0ZygE5FDcgL%2BTXVE2qaS5u21WkpoHOMhGrHxl2Chzl%0ANBcUbVJUliOX%2F9oeKyjC1JEQ%2BxGld0kYpbDeWd85OqRVoebdxOfVHO2ggSbl%2Blxy%0Adqy6Flndfp0Cqs2HfZk4dUsViNjQvewm3NH%2F8HAzcYui7w3aNrBwa%2FeEH0S3evhc%0AtASqSK7CKs6UMn%2FYvheTHe5o0N0Mwo6MDt0U2ox88oKrBkjPDMhFdM3PEfQqwv8V%0AC0AsDQ0CCZiNk9uiE28hEZMXaVhqJ2Nvju6n8JpiZ1M1WD%2B%2FDVC1HwIDAQABMA0G%0ACSqGSIb3DQEBCwUAA4IBAQAn%2B9qchCGymG2nhOGKaThASBj4Au65IqsVo6SHobOt%0AfiVULb3px6N6wlJWKzoT0M%2FwSI3%2Fw3aYQCaDC5uBt7EjvKFTF%2BpwX0uwqtF25F13%0AVHJER%2FEtqRG27EcLLEJuYGuFAxxTsZVnlnfn3Ky%2FPzD8oyzj7IucCb30CE42FXKq%0A6jjRpqDTXEtTxxp%2B8w787QLoel6eEsdZiEwOzRlIhQw9c1uIiyV%2BjCJtcGTTEufE%0AXWofM5kjg8%2B%2Bcc8KlU6WrfHujzV01T1ANAhGIGFG9lK4n%2FtYAMCk5ReMJIZVKy5G%0AE9ZdDv5f128dskKxgbG7LfqDylN9W4U6rByWbtr5k2lG%0AEND%20CERTIFICATE%0A";Subject"CNfoo.com,OUMS,OTYY,LGZ,STGD,CCN";URI,Byspiffe://cluster.local/ns/demo/sa/httpbin;Hashb9b934cf12d7d8eb0c62e8a5c2374b86d3a8eb98e0101eb3ff75796cdcb3345b;Subject"";URIspiffe://cluster.local/ns/demo/sa/testgwserviceaccount"}} Connection