haproxy - curl diffs with and with out -H "Host:" parameter

Created Diff never expires
7 removals
Lines
Total
Removed
Words
Total
Removed
To continue using this feature, upgrade to
Diffchecker logo
Diffchecker Pro
42 lines
15 additions
Lines
Total
Added
Words
Total
Added
To continue using this feature, upgrade to
Diffchecker logo
Diffchecker Pro
51 lines
root@mc-hapr-v-201a:/etc/haproxy# curl -vv https://10.10.1.85/SAAS/API/1.0/REST/system/health/heartbeat -H "User-Agent:" -H "Accept:" -H "content-length: 0" -H "connection: close" -H "Host:"
root@mc-hapr-v-201a:/etc/haproxy# curl -vv https://10.10.1.85/SAAS/API/1.0/REST/system/health/heartbeat -H "User-Agent:" -H "Accept:" -H "content-length: 0" -H "connection: close"
* Trying 10.10.1.85...
* Trying 10.10.1.85...
* TCP_NODELAY set
* TCP_NODELAY set
* Connected to 10.10.1.85 (10.10.1.85) port 443 (#0)
* Connected to 10.10.1.85 (10.10.1.85) port 443 (#0)
* ALPN, offering h2
* ALPN, offering h2
* ALPN, offering http/1.1
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: /etc/ssl/certs
CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server did not agree to a protocol
* ALPN, server did not agree to a protocol
* Server certificate:
* Server certificate:
* subject: C=GB; ST=Hampshire; L=Basingstoke; O=Momus Consulting; OU=Momus Labs; CN=vidmlb.momusconsulting.com
* subject: C=GB; ST=Hampshire; L=Basingstoke; O=Momus Consulting; OU=Momus Labs; CN=vidmlb.momusconsulting.com
* start date: Nov 30 15:04:59 2021 GMT
* start date: Nov 30 15:04:59 2021 GMT
* expire date: Nov 29 15:04:59 2026 GMT
* expire date: Nov 29 15:04:59 2026 GMT
* subjectAltName: host "10.10.1.85" matched cert's IP address!
* subjectAltName: host "10.10.1.85" matched cert's IP address!
* issuer: DC=com; DC=momusconsulting; CN=MomusInterCA
* issuer: DC=com; DC=momusconsulting; CN=MomusInterCA
* SSL certificate verify ok.
* SSL certificate verify ok.
> GET /SAAS/API/1.0/REST/system/health/heartbeat HTTP/1.1
> GET /SAAS/API/1.0/REST/system/health/heartbeat HTTP/1.1
> Host: 10.10.1.85
> content-length: 0
> content-length: 0
> connection: close
> connection: close
>
>
< HTTP/1.1 400
< HTTP/1.1 200
< Content-Type: text/html;charset=utf-8
< Cache-Control: no-cache, no-store, must-revalidate
< Content-Language: en
< Expires: Thu, 01 Jan 1970 00:00:00 GMT
< Content-Length: 762
< Strict-Transport-Security: max-age=31536000
< Date: Thu, 02 Dec 2021 08:52:06 GMT
< X-XSS-Protection: 1; mode=block
< X-Frame-Options: SAMEORIGIN
< X-Content-Type-Options: nosniff
< Content-Security-Policy: object-src 'none'; default-src blob: https: 'self' ; script-src 'unsafe-inline' 'unsafe-eval' https: 'self' ; style-src 'unsafe-inline' https: 'self'; img-src https: data: 'self'
< Set-Cookie: JSESSIONID=3448AAD7C57B54A7D15C72DC01E6DDEA; Path=/; Secure; HttpOnly
< P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
< Content-Type: text/plain;charset=ISO-8859-1
< Content-Length: 2
< Date: Thu, 02 Dec 2021 08:53:56 GMT
< Connection: close
< Connection: close
<
<
* Closing connection 0
* Closing connection 0
* TLSv1.2 (OUT), TLS alert, Client hello (1):
* TLSv1.2 (OUT), TLS alert, Client hello (1):
<!doctype html><html lang="en"><head><title>HTTP Status 400 – Bad Request</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 400 – Bad Request</h1><hr class="line" /><p><b>Type</b> Status Report</p><p><b>Description</b> The server cannot or will not process the request due to something that is perceived to be a client error (e.g., malformed request syntax, invalid request message framing, or deceptive request routing).</p><hr class="line" /><h3>Apache Tomcat/8.5.63</h3></body></html>root@mc-hapr-v-201a:/etc/haproxy#
okroot@mc-hapr-v-201a:/etc/haproxy#
root@mc-hapr-v-201a:/etc/haproxy#
root@mc-hapr-v-201a:/etc/haproxy#