% Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying 168.0.0.6:443... * Connected to 168.0.0.6 (168.0.0.6) port 443 * ALPN: curl offers h2,http/1.1 } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [21 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [5678 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / x25519 / RSASSA-PSS * ALPN: server accepted http/1.1 * Server certificate: * subject: CN=opasuite.netguibor.com.br * start date: Oct 17 00:00:00 2024 GMT * expire date: Oct 18 23:59:59 2025 GMT * issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA * SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway. * Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha384WithRSAEncryption * Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha384WithRSAEncryption * Certificate level 3: Public key type RSA (2048/112 Bits/secBits), signed using sha1WithRSAEncryption * using HTTP/1.x 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0} [5 bytes data] > HEAD / HTTP/1.1 > Host: 168.0.0.6 > User-Agent: curl/8.9.1 > Accept: */* > * Request completely sent off { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [265 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [265 bytes data] < HTTP/1.1 302 Found < Cross-Origin-Opener-Policy: same-origin < Origin-Agent-Cluster: ?1 < Referrer-Policy: no-referrer < Strict-Transport-Security: max-age=15552000; includeSubDomains < X-Content-Type-Options: nosniff < X-DNS-Prefetch-Control: off < X-Download-Options: noopen < X-Frame-Options: SAMEORIGIN < X-Permitted-Cross-Domain-Policies: none < X-XSS-Protection: 0 < Location: /auth/login < Vary: Accept, Accept-Encoding < Content-Type: text/plain < Content-Length: 33 < Date: Fri, 14 Feb 2025 19:20:39 GMT < Connection: keep-alive < Keep-Alive: timeout=5 < 0 33 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 * Connection #0 to host 168.0.0.6 left intact HTTP/1.1 302 Found Cross-Origin-Opener-Policy: same-origin Origin-Agent-Cluster: ?1 Referrer-Policy: no-referrer Strict-Transport-Security: max-age=15552000; includeSubDomains X-Content-Type-Options: nosniff X-DNS-Prefetch-Control: off X-Download-Options: noopen X-Frame-Options: SAMEORIGIN X-Permitted-Cross-Domain-Policies: none X-XSS-Protection: 0 Location: /auth/login Vary: Accept, Accept-Encoding Content-Type: text/plain Content-Length: 33 Date: Fri, 14 Feb 2025 19:20:39 GMT Connection: keep-alive Keep-Alive: timeout=5