https://5dok.org/document/dy48vgrq-analysis-methods-chained-connections-mutual-authentication-using-tls.html