haproxy - curl diffs with and with out -H "Host:" parameter

Created Diff never expires
9 removals
42 lines
17 additions
51 lines
root@mc-hapr-v-201a:/etc/haproxy# curl -vv https://10.10.1.85/SAAS/API/1.0/REST/system/health/heartbeat -H "User-Agent:" -H "Accept:" -H "content-length: 0" -H "connection: close" -H "Host:"
root@mc-hapr-v-201a:/etc/haproxy# curl -vv https://10.10.1.85/SAAS/API/1.0/REST/system/health/heartbeat -H "User-Agent:" -H "Accept:" -H "content-length: 0" -H "connection: close"
* Trying 10.10.1.85...
* Trying 10.10.1.85...
* TCP_NODELAY set
* TCP_NODELAY set
* Connected to 10.10.1.85 (10.10.1.85) port 443 (#0)
* Connected to 10.10.1.85 (10.10.1.85) port 443 (#0)
* ALPN, offering h2
* ALPN, offering h2
* ALPN, offering http/1.1
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: /etc/ssl/certs
CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server did not agree to a protocol
* ALPN, server did not agree to a protocol
* Server certificate:
* Server certificate:
* subject: C=GB; ST=Hampshire; L=Basingstoke; O=Momus Consulting; OU=Momus Labs; CN=vidmlb.momusconsulting.com
* subject: C=GB; ST=Hampshire; L=Basingstoke; O=Momus Consulting; OU=Momus Labs; CN=vidmlb.momusconsulting.com
* start date: Nov 30 15:04:59 2021 GMT
* start date: Nov 30 15:04:59 2021 GMT
* expire date: Nov 29 15:04:59 2026 GMT
* expire date: Nov 29 15:04:59 2026 GMT
* subjectAltName: host "10.10.1.85" matched cert's IP address!
* subjectAltName: host "10.10.1.85" matched cert's IP address!
* issuer: DC=com; DC=momusconsulting; CN=MomusInterCA
* issuer: DC=com; DC=momusconsulting; CN=MomusInterCA
* SSL certificate verify ok.
* SSL certificate verify ok.
> GET /SAAS/API/1.0/REST/system/health/heartbeat HTTP/1.1
> GET /SAAS/API/1.0/REST/system/health/heartbeat HTTP/1.1
> Host: 10.10.1.85
> content-length: 0
> content-length: 0
> connection: close
> connection: close
>
>
< HTTP/1.1 400
< HTTP/1.1 200
< Content-Type: text/html;charset=utf-8
< Cache-Control: no-cache, no-store, must-revalidate
< Content-Language: en
< Expires: Thu, 01 Jan 1970 00:00:00 GMT
< Content-Length: 762
< Strict-Transport-Security: max-age=31536000
< Date: Thu, 02 Dec 2021 08:52:06 GMT
< X-XSS-Protection: 1; mode=block
< X-Frame-Options: SAMEORIGIN
< X-Content-Type-Options: nosniff
< Content-Security-Policy: object-src 'none'; default-src blob: https: 'self' ; script-src 'unsafe-inline' 'unsafe-eval' https: 'self' ; style-src 'unsafe-inline' https: 'self'; img-src https: data: 'self'
< Set-Cookie: JSESSIONID=3448AAD7C57B54A7D15C72DC01E6DDEA; Path=/; Secure; HttpOnly
< P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
< Content-Type: text/plain;charset=ISO-8859-1
< Content-Length: 2
< Date: Thu, 02 Dec 2021 08:53:56 GMT
< Connection: close
< Connection: close
<
<
* Closing connection 0
* Closing connection 0
* TLSv1.2 (OUT), TLS alert, Client hello (1):
* TLSv1.2 (OUT), TLS alert, Client hello (1):
<!doctype html><html lang="en"><head><title>HTTP Status 400 – Bad Request</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 400 – Bad Request</h1><hr class="line" /><p><b>Type</b> Status Report</p><p><b>Description</b> The server cannot or will not process the request due to something that is perceived to be a client error (e.g., malformed request syntax, invalid request message framing, or deceptive request routing).</p><hr class="line" /><h3>Apache Tomcat/8.5.63</h3></body></html>root@mc-hapr-v-201a:/etc/haproxy#
okroot@mc-hapr-v-201a:/etc/haproxy#
root@mc-hapr-v-201a:/etc/haproxy#
root@mc-hapr-v-201a:/etc/haproxy#