RSE/Backend/Scripts/443Header13.txt

82 lines
3.5 KiB
Plaintext

% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying 168.0.0.2:443...
* Connected to 168.0.0.2 (168.0.0.2) port 443
* ALPN: curl offers h2,http/1.1
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [108 bytes data]
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [5659 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [300 bytes data]
* TLSv1.2 (IN), TLS handshake, Request CERT (13):
{ [420 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Certificate (11):
} [7 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [37 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 / x25519 / RSASSA-PSS
* ALPN: server accepted http/1.1
* Server certificate:
* subject: CN=ixc.netguibor.com.br
* start date: Jul 25 00:00:00 2024 GMT
* expire date: Aug 1 23:59:59 2025 GMT
* issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA
* SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha384WithRSAEncryption
* Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha384WithRSAEncryption
* Certificate level 3: Public key type RSA (2048/112 Bits/secBits), signed using sha1WithRSAEncryption
* using HTTP/1.x
} [5 bytes data]
> HEAD / HTTP/1.1
> Host: 168.0.0.2
> User-Agent: curl/8.9.1
> Accept: */*
>
* Request completely sent off
{ [5 bytes data]
< HTTP/1.1 200 OK
< Server: nginx
< Date: Fri, 14 Feb 2025 19:20:39 GMT
< Content-Type: text/html; charset=ISO-8859-1
< Connection: keep-alive
< Set-Cookie: PHPSESSID=02hoee5o39m1ia78okburjgr56; path=/
< Set-Cookie: ixc_cli=d880aeebae5c4f346d379f3944ea2497; expires=Sat, 14-Feb-2026 19:20:39 GMT; Max-Age=31536000; path=/
< Expires: Fri, 14 Feb 2025 18:20:39 GMT
< Last-Modified: Fri, 14 Feb 2025 19:20:39 GMT
< Cache-Control: no-cache, must-revalidate
< Pragma: no-cache
< X-Content-Type-Options: nosniff
< X-Frame-Options: SAMEORIGIN
< X-XSS-Protection: 1; mode=block
<
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0
* Connection #0 to host 168.0.0.2 left intact
HTTP/1.1 200 OK
Server: nginx
Date: Fri, 14 Feb 2025 19:20:39 GMT
Content-Type: text/html; charset=ISO-8859-1
Connection: keep-alive
Set-Cookie: PHPSESSID=02hoee5o39m1ia78okburjgr56; path=/
Set-Cookie: ixc_cli=d880aeebae5c4f346d379f3944ea2497; expires=Sat, 14-Feb-2026 19:20:39 GMT; Max-Age=31536000; path=/
Expires: Fri, 14 Feb 2025 18:20:39 GMT
Last-Modified: Fri, 14 Feb 2025 19:20:39 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block