<html><head><title>CGI-Script CGI-Environment 2023</title>
</head><body><h2><hr>
<pre>
HTTPS=on
SSL_TLS_SNI=www2.htw-dresden.de
HTTP_HOST=www2.htw-dresden.de
HTTP_USER_AGENT=Mozilla/5.0
HTTP_ACCEPT=*/*
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
SERVER_SIGNATURE=
SERVER_SOFTWARE=Apache
SERVER_NAME=www2.htw-dresden.de
SERVER_ADDR=141.56.16.23
SERVER_PORT=443
REMOTE_ADDR=103.160.75.174
DOCUMENT_ROOT=/srv/www/htdocs
REQUEST_SCHEME=https
CONTEXT_PREFIX=/~beck
CONTEXT_DOCUMENT_ROOT=/home/rex/fi1/beck/public_html
SERVER_ADMIN=root@rlux23
SCRIPT_FILENAME=/home/rex/fi1/beck/public_html/cgi-bin/env.cgi
REMOTE_PORT=52938
GATEWAY_INTERFACE=CGI/1.1
SERVER_PROTOCOL=HTTP/1.1
REQUEST_METHOD=GET
QUERY_STRING=
REQUEST_URI=/~beck/cgi-bin/env.cgi
SCRIPT_NAME=/~beck/cgi-bin/env.cgi
</pre></body></html>
* Trying 103.160.75.174:80...
* Connected to (nil) (103.160.75.174) port 80 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to www2.htw-dresden.de:443
> CONNECT www2.htw-dresden.de:443 HTTP/1.1
> Host: www2.htw-dresden.de:443
> User-Agent: Mozilla/5.0
> Proxy-Connection: Keep-Alive
>
< HTTP/1.0 200 Connection Established
< Proxy-agent: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.33
<
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [108 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [6514 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [589 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: C=DE; ST=Sachsen; O=Hochschule für Technik und Wirtschaft Dresden; CN=www2.htw-dresden.de
* start date: Aug 2 00:00:00 2023 GMT
* expire date: Aug 1 23:59:59 2024 GMT
* issuer: C=NL; O=GEANT Vereniging; CN=GEANT OV RSA CA 4
* SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway.
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /~beck/cgi-bin/env.cgi HTTP/1.1
> Host: www2.htw-dresden.de
> User-Agent: Mozilla/5.0
> Accept: */*
>
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Mon, 04 Dec 2023 23:15:02 GMT
< Server: Apache
< Transfer-Encoding: chunked
< Content-Type: text/html
<
{ [826 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact