Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- user ~ curl -v https://rules.emergingthreats.net
- * Rebuilt URL to: https://rules.emergingthreats.net/
- * Trying 96.43.137.99...
- * TCP_NODELAY set
- * Connected to rules.emergingthreats.net (96.43.137.99) port 443 (#0)
- * ALPN, offering h2
- * ALPN, offering http/1.1
- * successfully set certificate verify locations:
- * CAfile: /etc/ssl/certs/ca-certificates.crt
- CApath: /etc/ssl/certs
- * (304) (OUT), TLS handshake, Client hello (1):
- * OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to rules.emergingthreats.net:443
- * stopped the pause stream!
- * Closing connection 0
- curl: (35) OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to rules.emergingthreats.net:443
- user ~ curl -v https://rules.emergingthreats.net
- * Rebuilt URL to: https://rules.emergingthreats.net/
- * Trying 96.43.137.99...
- * TCP_NODELAY set
- * Connected to rules.emergingthreats.net (96.43.137.99) port 443 (#0)
- * ALPN, offering h2
- * ALPN, offering http/1.1
- * successfully set certificate verify locations:
- * CAfile: /etc/ssl/certs/ca-certificates.crt
- CApath: /etc/ssl/certs
- * (304) (OUT), TLS handshake, Client hello (1):
- * (304) (IN), TLS handshake, Server hello (2):
- * TLSv1.2 (IN), TLS handshake, Certificate (11):
- * TLSv1.2 (IN), TLS handshake, Server key exchange (12):
- * TLSv1.2 (IN), TLS handshake, Server finished (14):
- * TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
- * TLSv1.2 (OUT), TLS change cipher, Client hello (1):
- * TLSv1.2 (OUT), TLS handshake, Finished (20):
- * TLSv1.2 (IN), TLS handshake, Finished (20):
- * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
- * ALPN, server accepted to use http/1.1
- * Server certificate:
- * subject: C=US; ST=California; L=Sunnyvale; O=Proofpoint, Inc.; OU=Ops; CN=*.emergingthreats.net
- * start date: Apr 19 00:00:00 2019 GMT
- * expire date: May 20 12:00:00 2020 GMT
- * subjectAltName: host "rules.emergingthreats.net" matched cert's "*.emergingthreats.net"
- * issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=Thawte RSA CA 2018
- * SSL certificate verify ok.
- > GET / HTTP/1.1
- > Host: rules.emergingthreats.net
- > User-Agent: curl/7.58.0
- > Accept: */*
- >
- < HTTP/1.1 200 OK
- < Date: Wed, 21 Aug 2019 23:11:22 GMT
- < Server: Apache/2.4.29 (Ubuntu)
- < Strict-Transport-Security: max-age=63072000; includeSubDomains
- < X-Frame-Options: DENY
- < X-Content-Type-Options: nosniff
- < Vary: Accept-Encoding
- < Transfer-Encoding: chunked
- < Content-Type: text/html;charset=UTF-8
- <
- <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
- <html>
- <head>
- <title>Index of /</title>
- </head>
- <body>
- <... snip everything working fine here ...>
- <address>Apache/2.4.29 (Ubuntu) Server at rules.emergingthreats.net Port 443</address>
- </body></html>
- * Connection #0 to host rules.emergingthreats.net left intact
- user ~ curl -v https://rules.emergingthreats.net
- * Rebuilt URL to: https://rules.emergingthreats.net/
- * Trying 96.43.137.99...
- * TCP_NODELAY set
- * Connected to rules.emergingthreats.net (96.43.137.99) port 443 (#0)
- * ALPN, offering h2
- * ALPN, offering http/1.1
- * successfully set certificate verify locations:
- * CAfile: /etc/ssl/certs/ca-certificates.crt
- CApath: /etc/ssl/certs
- * (304) (OUT), TLS handshake, Client hello (1):
- * OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to rules.emergingthreats.net:443
- * stopped the pause stream!
- * Closing connection 0
- curl: (35) OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to rules.emergingthreats.net:443
- user ~
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement