Willy, Cyril, Am 26.02.19 um 10:52 schrieb Cyril Bonté: > Interesting, in fact the downloaded file is a gzip of the tar.gz itself. >
Yes. This appears to be a misconfiguration in either HAProxy or Apache. Probably Apache, because the `.tar.gz` is delivered with Content-Type application/x-tar which I suspect causes HAProxy to compress it once again: > [timwolla@/tmp]curl -v > 'https://www.haproxy.org/download/1.9/src/haproxy-1.9.4.tar.gz' -H > 'Accept-Encoding: gzip' |sha256sum > % Total % Received % Xferd Average Speed Time Time Time > Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- > 0* Trying 51.15.8.218... > * Connected to www.haproxy.org (51.15.8.218) port 443 (#0) > * found 148 certificates in /etc/ssl/certs/ca-certificates.crt > * found 604 certificates in /etc/ssl/certs > * ALPN, offering http/1.1 > * SSL connection using TLS1.2 / ECDHE_RSA_AES_128_GCM_SHA256 > * server certificate verification OK > * server certificate status verification SKIPPED > * common name: *.haproxy.org (matched) > * server certificate expiration date OK > * server certificate activation date OK > * certificate public key: RSA > * certificate version: #3 > * subject: OU=Domain Control Validated,OU=EssentialSSL > Wildcard,CN=*.haproxy.org > * start date: Fri, 21 Apr 2017 00:00:00 GMT > * expire date: Mon, 20 Apr 2020 23:59:59 GMT > * issuer: C=GB,ST=Greater Manchester,L=Salford,O=COMODO CA > Limited,CN=COMODO RSA Domain Validation Secure Server CA > * compression: NULL > * ALPN, server accepted to use http/1.1 >> GET /download/1.9/src/haproxy-1.9.4.tar.gz HTTP/1.1 >> Host: www.haproxy.org >> User-Agent: curl/7.47.0 >> Accept: */* >> Accept-Encoding: gzip >> > < HTTP/1.1 200 OK > < date: Tue, 26 Feb 2019 11:09:23 GMT > < server: Apache > < last-modified: Wed, 06 Feb 2019 13:51:45 GMT > < etag: W/"54259f-23faaf-5813a06cd63c6" > < accept-ranges: bytes > < content-type: application/x-tar > < content-encoding: gzip > < transfer-encoding: chunked > < > { [16120 bytes data] > 100 2301k 0 2301k 0 0 3645k 0 --:--:-- --:--:-- --:--:-- 3647k > * Connection #0 to host www.haproxy.org left intact > 6c3b367f1a119409f333c8cab450aa492d1ec25b8c41aed685e138c87b49599e - vs > [timwolla@/tmp]curl -v > 'https://www.haproxy.org/download/1.9/src/haproxy-1.9.4.tar.gz' |sha256sum > % Total % Received % Xferd Average Speed Time Time Time > Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- > 0* Trying 51.15.8.218... > * Connected to www.haproxy.org (51.15.8.218) port 443 (#0) > * found 148 certificates in /etc/ssl/certs/ca-certificates.crt > * found 604 certificates in /etc/ssl/certs > * ALPN, offering http/1.1 > * SSL connection using TLS1.2 / ECDHE_RSA_AES_128_GCM_SHA256 > * server certificate verification OK > * server certificate status verification SKIPPED > * common name: *.haproxy.org (matched) > * server certificate expiration date OK > * server certificate activation date OK > * certificate public key: RSA > * certificate version: #3 > * subject: OU=Domain Control Validated,OU=EssentialSSL > Wildcard,CN=*.haproxy.org > * start date: Fri, 21 Apr 2017 00:00:00 GMT > * expire date: Mon, 20 Apr 2020 23:59:59 GMT > * issuer: C=GB,ST=Greater Manchester,L=Salford,O=COMODO CA > Limited,CN=COMODO RSA Domain Validation Secure Server CA > * compression: NULL > * ALPN, server accepted to use http/1.1 >> GET /download/1.9/src/haproxy-1.9.4.tar.gz HTTP/1.1 >> Host: www.haproxy.org >> User-Agent: curl/7.47.0 >> Accept: */* >> > < HTTP/1.1 200 OK > < date: Tue, 26 Feb 2019 11:09:30 GMT > < server: Apache > < last-modified: Wed, 06 Feb 2019 13:51:45 GMT > < etag: "54259f-23faaf-5813a06cd63c6" > < accept-ranges: bytes > < content-length: 2357935 > < content-type: application/x-tar > < > { [16149 bytes data] > 100 2302k 100 2302k 0 0 1138k 0 0:00:02 0:00:02 --:--:-- 1138k > * Connection #0 to host www.haproxy.org left intact > 8483fe12b30256f83d542b3f699e165d8f71bf2dfac8b16bb53716abce4ba74f - Best regards Tim Düsterhus