Hi All,
Im having issue with http client5 , same post call is working in postman ,
Bruno , client 4 and plain java http connection
Please find details
1. Code
2. Output
3. Debug message
4. Curl output
Best Regards,
Koti.
public class HttpClientExample {
static String body= "{\"method\":
\"exec\",\"params\":[{\"data\":{\"user\":\"admin\",\"passwd\":\"cloudmylab\"},\"url\":
\"/sys/login/user\"}]}";
static String url = "https://10.10.10.10:443/jsonrpc";
static Map<String, String> headers = new HashMap<>();
static {
headers.put("Accept", "application/json");
headers.put("Content-Type", "application/json");
}
private static void callClient4() throws Exception {
System.out.println("======call Client 4=======\n");
SSLContext sslContext =
SSLContextBuilder.create().loadTrustMaterial(null, (chain, authType) ->
true).build();
SSLConnectionSocketFactory socketFactory = new
SSLConnectionSocketFactory(sslContext, NoopHostnameVerifier.INSTANCE);
CloseableHttpClient client =
HttpClients.custom().setSSLSocketFactory(socketFactory).build();
HttpPost request = new HttpPost(url);
headers.forEach(request::setHeader);
request.setEntity(new StringEntity(body));
client.execute(request, (ResponseHandler<CloseableHttpResponse>)
response -> {
System.out.println(response.getStatusLine());
System.out.println(EntityUtils.toString(response.getEntity()));
return null;
});
}
private static void callClient5() throws Exception {
System.out.println("======call Client 5=======\n");
SSLContext sslContext =
SSLContextBuilder.create().loadTrustMaterial(null, (chain, authType) ->
true).build();
TlsStrategy tlsStrategy = ClientTlsStrategyBuilder.create()
.setSslContext(sslContext).setHostnameVerifier(NoopHostnameVerifier.INSTANCE).buildAsync();
PoolingAsyncClientConnectionManager connManager =
PoolingAsyncClientConnectionManagerBuilder.create()
.setTlsStrategy(tlsStrategy).setMaxConnTotal(10).setMaxConnPerRoute(10).build();
CloseableHttpAsyncClient httpClient =
HttpAsyncClients.custom().setConnectionManager(connManager)
.setVersionPolicy(HttpVersionPolicy.FORCE_HTTP_1) // Force
HTTP/1.1 to avoid HTTP/2 issues
.evictIdleConnections(TimeValue.ofSeconds(60)).build();
httpClient.start();
SimpleRequestBuilder builder = SimpleRequestBuilder.create("POST");
headers.forEach(builder::setHeader);
builder.setBody(body, ContentType.APPLICATION_JSON);
builder.setUri(new URIBuilder(url).build());
builder.setVersion(HttpVersion.HTTP_1_1); // Explicitly set HTTP/1.1 to
avoid HTTP/2 issues
Future<SimpleHttpResponse> future = httpClient.execute(builder.build(),
new FutureCallback<>() {
public void completed(SimpleHttpResponse simpleHttpResponse) {
System.out.println("simpleHttpResponse: " + simpleHttpResponse);
System.out.println("Response received: " +
simpleHttpResponse.getBodyText());
}
public void failed(Exception e) {
}
public void cancelled() {
}
});
future.get(1, TimeUnit.MINUTES);
}
public static void main(String[] args) {
try {
//callClient4();
callClient5();
} catch (Exception e) { e.printStackTrace(); }
}
}
out put
=========
======call Client 4=======
HTTP/1.1 200 OK
{ "result": [ { "status": { "code": 0, "message": "OK" }, "url":
"\/sys\/login\/user" } ], "session":
"9GxQF4tFVoJcwyC2600mZ0v+QBwKnwpV541QQQD4vV789ExKhc8t+SMN9tWzuLwmEJ+PfUkP1KadCHyPwxtn1Q=="
}
======call Client 5=======
simpleHttpResponse: 400 null HTTP/2.0
Response received: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>400 Bad Request</title>
</head><body>
<h1>Bad Request</h1>
<p>Your browser sent a request that this server could not understand.<br />
</p>
</body></html>
Curl output
============
curl -kv -X POST https://10.10.10.10/jsonrpc<https://172.16.14.130/jsonrpc> -H
"Content-Type: application/json" -d
'{"method":"exec","params":[{"url":"sys/login/user","data":{"user":"admin","passwd":"cloudmylab"}}]}'
Note: Unnecessary use of -X or --request, POST is already inferred.
* Trying 10.10.10.10:443...
* Connected to 10.10.10.10 (10.10.10.10) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS header, Certificate Status (22):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS header, Finished (20):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.2 (OUT), TLS header, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
* subject: CN=FMGVMSTM24000898; O=Fortinet; OU=FortiManager; C=US;
ST=California; L=Sunnyvale;
[email protected]<mailto:[email protected]>
* start date: Mar 11 03:07:22 2024 GMT
* expire date: Jan 2 07:59:59 2038 GMT
* issuer: CN=FMGVMSTM24000898; O=Fortinet; OU=FortiManager; C=US;
ST=California; L=Sunnyvale;
[email protected]<mailto:[email protected]>
* SSL certificate verify result: self-signed certificate (18), continuing
anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* Using Stream ID: 1 (easy handle 0x61e17b50b9f0)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
> POST /jsonrpc HTTP/2
> Host: 10.10.10.10
> user-agent: curl/7.81.0
> accept: */*
> content-type: application/json
> content-length: 99
>
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* We are completely uploaded and fine
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
< HTTP/2 200
< x-frame-options: SAMEORIGIN
< vary: Accept-Encoding
< strict-transport-security: max-age=63072000
< x-ua-compatible: IE=Edge
< x-xss-protection: 1; mode=block
< x-content-type-options: nosniff
< content-security-policy: frame-ancestors 'none'; object-src 'none';
script-src 'self';
< content-type: application/json
< date: Wed, 25 Feb 2026 04:12:10 GMT
< server: Apache
<
* Connection #0 to host 10.10.10.10 left intact
{ "result": [ { "status": { "code": 0, "message": "OK" }, "url":
"sys\/login\/user" } ], "session":
"MwLTkNa\/iP0HUC7EW1\/MRH7AY3BsCrgjqH20MRpjUT8bE9uWNd2r7v7NG1E3mQ32ZpeqjGS9gdk22USGHu8nQA=="
}
Debug message
===============
2026-02-25 12:12:01.579 [main] DEBUG InternalAbstractHttpAsyncClient -
ex-0000000001 preparing request execution
2026-02-25 12:12:01.592 [main] DEBUG AsyncProtocolExec - ex-0000000001 target
auth state: UNCHALLENGED
2026-02-25 12:12:01.593 [main] DEBUG AsyncProtocolExec - ex-0000000001 proxy
auth state: UNCHALLENGED
2026-02-25 12:12:01.594 [main] DEBUG AsyncConnectExec - ex-0000000001 acquiring
connection with route {s}->[https://10.10.10.10:443]
2026-02-25 12:12:01.594 [main] DEBUG InternalHttpAsyncClient - ex-0000000001
acquiring endpoint (3 MINUTES)
2026-02-25 12:12:01.596 [main] DEBUG PoolingAsyncClientConnectionManager -
ex-0000000001 endpoint lease request (3 MINUTES) [route:
{s}->[https://10.10.10.10:443]][total available: 0; route allocated: 0 of 10;
total allocated: 0 of 10]
2026-02-25 12:12:01.604 [main] DEBUG PoolingAsyncClientConnectionManager -
ex-0000000001 endpoint leased [route: {s}->[https://10.10.10.10:443]][total
available: 0; route allocated: 1 of 10; total allocated: 1 of 10]
2026-02-25 12:12:01.604 [main] DEBUG PoolingAsyncClientConnectionManager -
ex-0000000001 acquired ep-0000000001
2026-02-25 12:12:01.604 [main] DEBUG InternalHttpAsyncClient - ex-0000000001
acquired endpoint ep-0000000001
2026-02-25 12:12:01.604 [main] DEBUG InternalHttpAsyncClient - ep-0000000001
connecting endpoint (null)
2026-02-25 12:12:01.605 [main] DEBUG PoolingAsyncClientConnectionManager -
ep-0000000001 connecting endpoint to
https://10.10.10.10:443<https://172.16.14.130:443> (3 MINUTES)
2026-02-25 12:12:01.605 [main] DEBUG DefaultAsyncClientConnectionOperator -
https://10.10.10.10:443<https://172.16.14.130:443> connecting null->null (3
MINUTES)
2026-02-25 12:12:01.607 [main] DEBUG MultihomeIOSessionRequester - 10.10.10.10
resolving remote address
2026-02-25 12:12:01.608 [main] DEBUG MultihomeIOSessionRequester - 10.10.10.10
resolved to [/10.10.10.10:443]
2026-02-25 12:12:01.609 [main] DEBUG MultihomeIOSessionRequester -
10.10.10.10:443 connecting null->/10.10.10.10:443 (3 MINUTES)
2026-02-25 12:12:01.903 [httpclient-dispatch-1] DEBUG IOSessionImpl -
c-0000000000[ACTIVE][rc:c] protocol upgrade class
org.apache.hc.core5.http2.impl.nio.HttpProtocolNegotiator
2026-02-25 12:12:01.905 [httpclient-dispatch-1] DEBUG
MultihomeIOSessionRequester - 10.10.10.10:443 connected null->/10.10.10.10:443
as c-0000000000
2026-02-25 12:12:01.906 [httpclient-dispatch-1] DEBUG
DefaultAsyncClientConnectionOperator - c-0000000000
https://10.10.10.10:443<https://172.16.14.130:443> connected
/10.147.17.239:59786->/10.10.10.10:443
2026-02-25 12:12:01.906 [httpclient-dispatch-1] DEBUG
DefaultAsyncClientConnectionOperator - c-0000000000
https://10.10.10.10:443<https://172.16.14.130:443> upgrading to TLS
2026-02-25 12:12:01.908 [httpclient-dispatch-1] DEBUG
DefaultManagedAsyncClientConnection - c-0000000000 start TLS
2026-02-25 12:12:01.919 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy
- Enabled protocols: [TLSv1.3, TLSv1.2]
2026-02-25 12:12:01.919 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy
- Enabled cipher suites: [TLS_AES_256_GCM_SHA384, TLS_AES_128_GCM_SHA256,
TLS_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384,
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA,
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA,
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,
TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_GCM_SHA256,
TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256,
TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA,
TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
2026-02-25 12:12:01.919 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy
- Starting handshake (3 MINUTES)
2026-02-25 12:12:01.923 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:c][ACTIVE][r][NEED_UNWRAP][0][0][389] Event cleared [c]
2026-02-25 12:12:02.214 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy
- Secure session established
2026-02-25 12:12:02.214 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy
- negotiated protocol: TLSv1.3
2026-02-25 12:12:02.214 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy
- negotiated cipher suite: TLS_AES_256_GCM_SHA384
2026-02-25 12:12:02.216 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy
- Peer principal:
1.2.840.113549.1.9.1=#1614737570706f727440666f7274696e65742e636f6d,L=Sunnyvale,ST=California,C=US,OU=FortiManager,O=Fortinet,CN=FMGVMSTM24000898
2026-02-25 12:12:02.219 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy
- Issuer principal:
1.2.840.113549.1.9.1=#1614737570706f727440666f7274696e65742e636f6d,L=Sunnyvale,ST=California,C=US,OU=FortiManager,O=Fortinet,CN=FMGVMSTM24000898
2026-02-25 12:12:02.220 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][90] protocol
upgrade class org.apache.hc.core5.http2.impl.nio.ClientH2PrefaceHandler
2026-02-25 12:12:02.220 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][90] Event set [w]
2026-02-25 12:12:02.221 [httpclient-dispatch-1] DEBUG
PoolingAsyncClientConnectionManager - ep-0000000001 connected c-0000000000
2026-02-25 12:12:02.221 [httpclient-dispatch-1] DEBUG InternalHttpAsyncClient -
ep-0000000001 endpoint connected
2026-02-25 12:12:02.221 [httpclient-dispatch-1] DEBUG AsyncConnectExec -
ex-0000000001 connected to target
2026-02-25 12:12:02.221 [httpclient-dispatch-1] DEBUG AsyncConnectExec -
ex-0000000001 route fully established
2026-02-25 12:12:02.221 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec -
ex-0000000001 executing POST /jsonrpc
2026-02-25 12:12:02.223 [httpclient-dispatch-1] DEBUG InternalHttpAsyncClient -
ep-0000000001 start execution ex-0000000001
2026-02-25 12:12:02.223 [httpclient-dispatch-1] DEBUG
PoolingAsyncClientConnectionManager - ep-0000000001 executing exchange
ex-0000000001 over c-0000000000
2026-02-25 12:12:02.224 [httpclient-dispatch-1] DEBUG
DefaultManagedAsyncClientConnection - c-0000000000 RequestExecutionCommand with
NORMAL priority
2026-02-25 12:12:02.225 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][90] Enqueued
RequestExecutionCommand with priority IMMEDIATE
2026-02-25 12:12:02.225 [httpclient-dispatch-1] DEBUG
DefaultAsyncClientConnectionOperator - c-0000000000
https://10.10.10.10:443<https://172.16.14.130:443> upgraded to TLS
2026-02-25 12:12:02.225 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][152] 24 bytes
written
2026-02-25 12:12:02.225 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][152] >> PRI *
HTTP/2.0 50 52 49 20 2a 20 48 54 54 50 2f 32 2e 30 0d 0a
2026-02-25 12:12:02.225 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][152] >> SM
0d 0a 53 4d 0d 0a 0d 0a
2026-02-25 12:12:02.225 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][152] Event cleared
[w]
2026-02-25 12:12:02.246 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][152] protocol
upgrade class org.apache.hc.core5.http2.impl.nio.ClientH2IOEventHandler
2026-02-25 12:12:02.248 [httpclient-dispatch-1] DEBUG frame - c-0000000000 >>
stream 0 frame: SETTINGS (0x4); flags: (0x0); length: 42
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
HEADER_TABLE_SIZE: 8192
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
ENABLE_PUSH: 1
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
MAX_CONCURRENT_STREAMS: 250
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
INITIAL_WINDOW_SIZE: 65535
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
MAX_FRAME_SIZE: 65536
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
MAX_HEADER_LIST_SIZE: 16777215
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
SETTINGS_NO_RFC7540_PRIORITIES: 1
2026-02-25 12:12:02.251 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][241] 51 bytes
written
2026-02-25 12:12:02.251 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][241] >>
..*.......... .. 00 00 2a 04 00 00 00 00 00 00 01 00 00 20 00 00
2026-02-25 12:12:02.254 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][241] >>
................ 02 00 00 00 01 00 03 00 00 00 fa 00 04 00 00 ff
2026-02-25 12:12:02.254 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][241] >>
.............. . ff 00 05 00 01 00 00 00 06 00 ff ff ff 00 09 00
2026-02-25 12:12:02.254 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][241] >> ...
00 00 01
2026-02-25 12:12:02.254 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][241] Event set [w]
2026-02-25 12:12:02.254 [httpclient-dispatch-1] DEBUG frame - c-0000000000 >>
stream 0 frame: WINDOW_UPDATE (0x8); flags: (0x0); length: 4
2026-02-25 12:12:02.254 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
Increment 2147418112
2026-02-25 12:12:02.255 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][292] 13 bytes
written
2026-02-25 12:12:02.255 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][292] >>
............ 00 00 04 08 00 00 00 00 00 7f ff 00 00
2026-02-25 12:12:02.255 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][292] Event set [w]
2026-02-25 12:12:02.255 [httpclient-dispatch-1] DEBUG flow - c-0000000000 <<
stream 0 flow control 2147483647 -> 2147483647
2026-02-25 12:12:02.255 [httpclient-dispatch-1] DEBUG flow - c-0000000000 >>
stream 0 flow control 65535 -> 65535
2026-02-25 12:12:02.255 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][r:w][ACTIVE][r][NOT_HANDSHAKING][0][0][0] Event cleared [w]
2026-02-25 12:12:02.822 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][624][0][0] <<
..............d. 00 00 06 04 00 00 00 00 00 00 03 00 00 00 64 00
2026-02-25 12:12:02.823 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][624][0][0] <<
........... 00 04 08 00 00 00 00 00 7f ff 00 00
2026-02-25 12:12:02.823 [httpclient-dispatch-1] DEBUG frame - c-0000000000 <<
stream 0 frame: SETTINGS (0x4); flags: (0x0); length: 6
2026-02-25 12:12:02.823 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
MAX_CONCURRENT_STREAMS: 100
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG frame - c-0000000000 >>
stream 0 frame: SETTINGS (0x4); flags: ACK (0x1); length: 0
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][624][28][47] 9 bytes
written
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][624][28][47] >> .........
00 00 00 04 01 00 00 00 00
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][624][28][47] Event set
[w]
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG frame - c-0000000000 <<
stream 0 frame: WINDOW_UPDATE (0x8); flags: (0x0); length: 4
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
Increment 2147418112
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG flow - c-0000000000 >>
stream 0 flow control 2147418112 -> 2147483647
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][624][28][47] Event set
[w]
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][624][28][47] 0 bytes
read
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][47] Event cleared
[w]
2026-02-25 12:12:02.831 [httpclient-dispatch-1] DEBUG flow - c-0000000000 <<
stream 1 flow control 65535 -> 65535
2026-02-25 12:12:02.831 [httpclient-dispatch-1] DEBUG flow - c-0000000000 >>
stream 1 flow control 65535 -> 65535
2026-02-25 12:12:02.832 [httpclient-dispatch-1] DEBUG RequestUpgrade -
Connection is upgradable: protocol version = HTTP/1.1
2026-02-25 12:12:02.832 [httpclient-dispatch-1] DEBUG RequestAddCookies -
ex-0000000001 Cookie spec selected: strict
2026-02-25 12:12:02.842 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec -
ex-0000000001 send request POST /jsonrpc, entity len 102
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >>
:method: POST
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >>
:scheme: https
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >>
:authority: 10.10.10.10:443
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >>
:path: /jsonrpc
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >>
accept: application/json
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >>
content-type: application/json
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >>
accept-encoding: gzip, x-gzip, deflate
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >>
user-agent: Apache-HttpAsyncClient/5.6 (Java/11.0.23)
2026-02-25 12:12:02.846 [httpclient-dispatch-1] DEBUG frame - c-0000000000 >>
stream 1 frame: HEADERS (0x1); flags: END_HEADERS (0x4); length: 102
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
..A. .\.... ..L 83 87 41 8d 0b a2 5c 2e 2e 16 97 0b 20 b8 d3 4c
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
.D.c..U..S. u.b ff 44 86 63 a2 0f 55 95 93 53 8b 1d 75 d0 62 0d
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
&=LtA._. u.b &=L 26 3d 4c 74 41 ea 5f 8b 1d 75 d0 62 0d 26 3d 4c
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
tA.P.....S..{5J 74 41 ea 50 90 9b d9 ab fa 53 ca d3 7b 35 7f 4a
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
HYh.Kz....r..).. 48 59 68 1a 4b 7a 9f 86 b1 92 72 ad 8d 29 ae 14
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
z...1jK ....Q... 7a a8 97 a8 31 6a 4b 0d ae e2 9f d6 51 f7 1b 01
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
.\L. 0a e0 5c 4c ff 7f
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] 111 bytes
written
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >>
..f........A. .\ 00 00 66 01 04 00 00 00 01 83 87 41 8d 0b a2 5c
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >> ....
..L.D.c..U 2e 2e 16 97 0b 20 b8 d3 4c ff 44 86 63 a2 0f 55
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >> ..S. u.b
&=LtA._ 95 93 53 8b 1d 75 d0 62 0d 26 3d 4c 74 41 ea 5f
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >> . u.b
&=LtA.P... 8b 1d 75 d0 62 0d 26 3d 4c 74 41 ea 50 90 9b d9
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >>
..S..{5JHYh.Kz. ab fa 53 ca d3 7b 35 7f 4a 48 59 68 1a 4b 7a 9f
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >>
...r..)..z...1jK 86 b1 92 72 ad 8d 29 ae 14 7a a8 97 a8 31 6a 4b
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >> ....Q...
.\L. 0d ae e2 9f d6 51 f7 1b 01 0a e0 5c 4c ff 7f
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][196] Event set [w]
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec -
ex-0000000001: produce request data
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec -
ex-0000000001: produce request data, len 102 bytes
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG frame - c-0000000000 >>
stream 1 frame: DATA (0x0); flags: (0x0); length: 102
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
{"method": "exec 7b 22 6d 65 74 68 6f 64 22 3a 20 22 65 78 65 63
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
","params":[{"da 22 2c 22 70 61 72 61 6d 73 22 3a 5b 7b 22 64 61
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
ta":{"user":"adm 74 61 22 3a 7b 22 75 73 65 72 22 3a 22 61 64 6d
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
in","passwd":"cl 69 6e 22 2c 22 70 61 73 73 77 64 22 3a 22 63 6c
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
oudmylab"},"url" 6f 75 64 6d 79 6c 61 62 22 7d 2c 22 75 72 6c 22
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
: "/sys/login/us 3a 20 22 2f 73 79 73 2f 6c 6f 67 69 6e 2f 75 73
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >>
er"}]} 65 72 22 7d 5d 7d
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG flow - c-0000000000 >>
stream 0 flow control -102 -> 2147483545
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG flow - c-0000000000 >>
stream 1 flow control -102 -> 65433
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] 111 bytes
written
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >>
..f......{"metho 00 00 66 00 00 00 00 00 01 7b 22 6d 65 74 68 6f
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >> d":
"exec","para 64 22 3a 20 22 65 78 65 63 22 2c 22 70 61 72 61
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >>
ms":[{"data":{"u 6d 73 22 3a 5b 7b 22 64 61 74 61 22 3a 7b 22 75
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >>
ser":"admin","pa 73 65 72 22 3a 22 61 64 6d 69 6e 22 2c 22 70 61
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >>
sswd":"cloudmyla 73 73 77 64 22 3a 22 63 6c 6f 75 64 6d 79 6c 61
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >>
b"},"url": "/sys 62 22 7d 2c 22 75 72 6c 22 3a 20 22 2f 73 79 73
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >>
/login/user"}]} 2f 6c 6f 67 69 6e 2f 75 73 65 72 22 7d 5d 7d
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] Event set [w]
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec -
ex-0000000001: end of request data
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG frame - c-0000000000 >>
stream 1 frame: DATA (0x0); flags: END_STREAM (0x1); length: 0
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][392] 9 bytes
written
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][392] >> .........
00 00 00 00 01 00 00 00 01
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][392] Event set [w]
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][rw:rw][ACTIVE][rw][NOT_HANDSHAKING][31][0][0] << .........
00 00 00 04 01 00 00 00 00
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG frame - c-0000000000 <<
stream 0 frame: SETTINGS (0x4); flags: ACK (0x1); length: 0
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:rw][ACTIVE][rw][NOT_HANDSHAKING][31][9][0] Event set [w]
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][rw:rw][ACTIVE][rw][NOT_HANDSHAKING][31][9][0] 0 bytes read
2026-02-25 12:12:02.852 [httpclient-dispatch-1] DEBUG SSLIOSession -
c-0000000000[ACTIVE][r:rw][ACTIVE][r][NOT_HANDSHAKING][0][0][0] Event cleared
[w]
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << ..V......?.
.@<mailto:.@>.. 00 00 56 01 04 00 00 00 01 3f e1 1f 8c 40 8b f2
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] <<
.....z.c........ b4 b6 0e 92 ac 7a d2 63 d4 8f 89 dd 0e 8c 1a b6
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << ...O.
..._.I|... e4 c5 93 4f 0f 0d 82 10 9c 5f 95 49 7c a5 89 d3
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << M j.q....
.<.o. 4d 1f 6a 12 71 d8 82 a6 03 20 eb 3c f3 6f ac 1f
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] <<
a..Y>..ja,j..q@9 61 96 e4 59 3e 94 13 6a 61 2c 6a 08 02 71 40 39
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] <<
q.\.*b..v....r.. 71 a1 5c 03 2a 62 d1 bf 76 85 86 b1 92 72 ff 00
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] <<
........<!DOCTYP 00 e2 00 01 00 00 00 01 3c 21 44 4f 43 54 59 50
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << E HTML
PUBLIC "- 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << //IETF//DTD
HTML 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << 2.0//EN">
<html 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << ><head>
<title>4 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << 00 Bad
Request</ 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << title>
</head><b 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << ody>
<h1>Bad Req 6f 64 79 3e 0a 3c 68 31 3e 42 61 64 20 52 65 71
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << uest</h1>
<p>You 75 65 73 74 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << r browser
sent a 72 20 62 72 6f 77 73 65 72 20 73 65 6e 74 20 61
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << request
that th 20 72 65 71 75 65 73 74 20 74 68 61 74 20 74 68
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << is server
could 69 73 20 73 65 72 76 65 72 20 63 6f 75 6c 64 20
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << not
understand.< 6e 6f 74 20 75 6e 64 65 72 73 74 61 6e 64 2e 3c
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << br /> </p>
</bod 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 2f 62 6f 64
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire -
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << y></html>
79 3e 3c 2f 68 74 6d 6c 3e 0a
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG frame - c-0000000000 <<
stream 1 frame: HEADERS (0x1); flags: END_HEADERS (0x4); length: 86
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
?. [email protected]<mailto:[email protected]>. 3f e1 1f 8c 40 8b f2 b4 b6 0e 92 ac 7a
d2 63 d4
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
..........O. ... 8f 89 dd 0e 8c 1a b6 e4 c5 93 4f 0f 0d 82 10 9c
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
_.I|...M j.q.... 5f 95 49 7c a5 89 d3 4d 1f 6a 12 71 d8 82 a6 03
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
.<.o. a..Y>..ja 20 eb 3c f3 6f ac 1f 61 96 e4 59 3e 94 13 6a 61
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
,j..q@9q.\.*b..v 2c 6a 08 02 71 40 39 71 a1 5c 03 2a 62 d1 bf 76
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
....r. 85 86 b1 92 72 ff
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG headers - c-0000000000 <<
:status: 400
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG headers - c-0000000000 <<
x-frame-options: SAMEORIGIN
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG headers - c-0000000000 <<
content-length: 226
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG headers - c-0000000000 <<
content-type: text/html; charset=iso-8859-1
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG headers - c-0000000000 <<
date: Wed, 25 Feb 2026 06:42:03 GMT
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG headers - c-0000000000 <<
server: Apache
2026-02-25 12:12:03.140 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec -
ex-0000000001: consume response 400, entity len -1
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG frame - c-0000000000 <<
stream 1 frame: DATA (0x0); flags: END_STREAM (0x1); length: 226
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
<!DOCTYPE HTML P 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
UBLIC "-//IETF// 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
DTD HTML 2.0//EN 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
"> <html><head> 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
<title>400 Bad R 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
equest</title> < 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 0a 3c
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
/head><body> <h1 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
>Bad Request</h1 3e 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
> <p>Your browse 3e 0a 3c 70 3e 59 6f 75 72 20 62 72 6f 77 73 65
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
r sent a request 72 20 73 65 6e 74 20 61 20 72 65 71 75 65 73 74
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
that this serve 20 74 68 61 74 20 74 68 69 73 20 73 65 72 76 65
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
r could not unde 72 20 63 6f 75 6c 64 20 6e 6f 74 20 75 6e 64 65
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
rstand.<br /> </ 72 73 74 61 6e 64 2e 3c 62 72 20 2f 3e 0a 3c 2f
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
p> </body></html 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG payload - c-0000000000 <<
> 3e 0a
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG flow - c-0000000000 <<
stream 1 flow control -226 -> 65309
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG flow - c-0000000000 <<
stream 0 flow control -226 -> 2147483421
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec -
ex-0000000001: consume response data, len 226 bytes
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec -
ex-0000000001: end of response data
simpleHttpResponse: 400 null HTTP/2.0
Response received: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>400 Bad Request</title>
</head><body>
<h1>Bad Request</h1>
<p>Your browser sent a request that this server could not understand.<br />
</p>
</body></html>
2026-02-25 12:12:03.149 [httpclient-dispatch-1] DEBUG
InternalAbstractHttpAsyncClient - ex-0000000001 message exchange successfully
completed
2026-02-25 12:12:03.149 [httpclient-dispatch-1] DEBUG InternalHttpAsyncClient -
ep-0000000001 releasing valid endpoint
Process finished with exit code 0