<html><head><title>CGI-Script CGI-Environment 2023</title>
</head><body><h2><hr>
<pre>
HTTPS=on
SSL_TLS_SNI=www2.htw-dresden.de
HTTP_HOST=www2.htw-dresden.de
HTTP_USER_AGENT=Mozilla/5.0
HTTP_ACCEPT=*/*
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
SERVER_SIGNATURE=
SERVER_SOFTWARE=Apache
SERVER_NAME=www2.htw-dresden.de
SERVER_ADDR=141.56.16.23
SERVER_PORT=443
REMOTE_ADDR=197.210.217.66
DOCUMENT_ROOT=/srv/www/htdocs
REQUEST_SCHEME=https
CONTEXT_PREFIX=/~beck
CONTEXT_DOCUMENT_ROOT=/home/rex/fi1/beck/public_html
SERVER_ADMIN=root@rlux23
SCRIPT_FILENAME=/home/rex/fi1/beck/public_html/cgi-bin/env.cgi
REMOTE_PORT=52700
GATEWAY_INTERFACE=CGI/1.1
SERVER_PROTOCOL=HTTP/1.1
REQUEST_METHOD=GET
QUERY_STRING=
REQUEST_URI=/~beck/cgi-bin/env.cgi
SCRIPT_NAME=/~beck/cgi-bin/env.cgi
</pre></body></html>
* Trying 197.210.217.66:60896...
* SOCKS4 communication to www2.htw-dresden.de:443
* SOCKS4 non-blocking resolve of www2.htw-dresden.de
* SOCKS4 connect to IPv4 141.56.16.23 (locally resolved)
* SOCKS4 request granted.
* Connected to (nil) (197.210.217.66) port 60896 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [108 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [6514 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [589 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: C=DE; ST=Sachsen; O=Hochschule für Technik und Wirtschaft Dresden; CN=www2.htw-dresden.de
* start date: Aug 2 00:00:00 2023 GMT
* expire date: Aug 1 23:59:59 2024 GMT
* issuer: C=NL; O=GEANT Vereniging; CN=GEANT OV RSA CA 4
* SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway.
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /~beck/cgi-bin/env.cgi HTTP/1.1
> Host: www2.htw-dresden.de
> User-Agent: Mozilla/5.0
> Accept: */*
>
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Mon, 27 Nov 2023 23:11:04 GMT
< Server: Apache
< Transfer-Encoding: chunked
< Content-Type: text/html
<
{ [826 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact