Thank you for your help, really apricate it,

From: [email protected] <[email protected]> On Behalf Of Arturo 
Bernal
Sent: Wednesday, February 25, 2026 1:58 PM
To: HttpClient User Discussion <[email protected]>
Cc: Kotilinga Reddy Bhavanam <[email protected]>
Subject: [EXTERNAL] - Re: issue with client 5 with http version

CAUTION: This email originated from outside of the organization. Do not click 
links or open attachments unless you recognize the sender and know the content 
is safe. If you feel that the email is suspicious, please report it using 
PhishAlarm.


Hi Koti,

Your HttpClient 5 request is still going out as HTTP/2, which is why you get 
400 ... HTTP/2.0. The debug log confirms it sends the HTTP/2 preface (PRI * 
HTTP/2.0) and pseudo-headers. Setting builder.setVersion(HTTP_1_1) and 
setVersionPolicy(FORCE_HTTP_1) on the client builder is not enough, because the 
protocol is picked during TLS ALPN negotiation.

Fix: force HTTP/1.1 at the TLS level (ALPN) via TlsConfig on the connection 
manager:

final TlsConfig tlsConfig = TlsConfig.custom()
        .setVersionPolicy(HttpVersionPolicy.FORCE_HTTP_1)
        .build();

final PoolingAsyncClientConnectionManager connManager =
        PoolingAsyncClientConnectionManagerBuilder.create()
                .setTlsStrategy(tlsStrategy)
                .setDefaultTlsConfig(tlsConfig)
                .build();

Also: avoid hardcoding :443 in the URL if possible 
(https://host/jsonrpc<https://urldefense.com/v3/__https:/host/jsonrpc__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MTgZKm08$>
 instead of 
https://host:443/jsonrpc<https://urldefense.com/v3/__https:/host:443/jsonrpc__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MfoNcGzk$>).
 Including :443 changes the Host / :authority value (e.g. Host: x:443), and 
some servers/front-ends reject that and return the generic Apache 400 page.

Proof: I ran a public HTTP/2 echo endpoint test. Default negotiation uses 
HTTP/2, and the TLS-level TlsConfig(FORCE_HTTP_1) flips it to HTTP/1.1 as 
expected.

Once you apply the TLS TlsConfig change (and ideally remove :443), the same 
request should behave like curl/Postman.

Best regards,
Arturo


Arturo


On Wed, Feb 25, 2026 at 7:44 AM Kotilinga Reddy Bhavanam via httpclient-users 
<[email protected]<mailto:[email protected]>> wrote:
Hi All,

Im having issue with http client5 , same post call is working in postman , 
Bruno , client 4 and plain java http connection
Please find details

  1.  Code
  2.  Output
  3.  Debug message
  4.  Curl output


Best Regards,
Koti.


public class HttpClientExample {
    static String body= "{\"method\": 
\"exec\",\"params\":[{\"data\":{\"user\":\"admin\",\"passwd\":\"cloudmylab\"},\"url\":
 \"/sys/login/user\"}]}";
    static String url = 
"https://10.10.10.10:443/jsonrpc<https://urldefense.com/v3/__https:/10.10.10.10:443/jsonrpc__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19Mb0q7mR4$>";

    static Map<String, String> headers = new HashMap<>();
    static {
        headers.put("Accept", "application/json");
        headers.put("Content-Type", "application/json");
    }

    private static void callClient4() throws Exception {
        System.out.println("======call Client 4=======\n");
        SSLContext sslContext = 
SSLContextBuilder.create().loadTrustMaterial(null, (chain, authType) -> 
true).build();
        SSLConnectionSocketFactory socketFactory = new 
SSLConnectionSocketFactory(sslContext, NoopHostnameVerifier.INSTANCE);
        CloseableHttpClient client = 
HttpClients.custom().setSSLSocketFactory(socketFactory).build();

        HttpPost request = new HttpPost(url);
        headers.forEach(request::setHeader);
        request.setEntity(new StringEntity(body));
        client.execute(request, (ResponseHandler<CloseableHttpResponse>) 
response -> {
            System.out.println(response.getStatusLine());
            System.out.println(EntityUtils.toString(response.getEntity()));
            return null;
        });
    }

    private static void callClient5() throws Exception {
        System.out.println("======call Client 5=======\n");
        SSLContext sslContext = 
SSLContextBuilder.create().loadTrustMaterial(null, (chain, authType) -> 
true).build();
        TlsStrategy tlsStrategy = ClientTlsStrategyBuilder.create()
                
.setSslContext(sslContext).setHostnameVerifier(NoopHostnameVerifier.INSTANCE).buildAsync();

        PoolingAsyncClientConnectionManager connManager = 
PoolingAsyncClientConnectionManagerBuilder.create()
                
.setTlsStrategy(tlsStrategy).setMaxConnTotal(10).setMaxConnPerRoute(10).build();

        CloseableHttpAsyncClient httpClient = 
HttpAsyncClients.custom().setConnectionManager(connManager)
                .setVersionPolicy(HttpVersionPolicy.FORCE_HTTP_1) // Force 
HTTP/1.1 to avoid HTTP/2 issues
                .evictIdleConnections(TimeValue.ofSeconds(60)).build();

        httpClient.start();

        SimpleRequestBuilder builder = SimpleRequestBuilder.create("POST");
        headers.forEach(builder::setHeader);
        builder.setBody(body, ContentType.APPLICATION_JSON);
        builder.setUri(new URIBuilder(url).build());
        builder.setVersion(HttpVersion.HTTP_1_1); // Explicitly set HTTP/1.1 to 
avoid HTTP/2 issues
        Future<SimpleHttpResponse> future = httpClient.execute(builder.build(), 
new FutureCallback<>() {
            public void completed(SimpleHttpResponse simpleHttpResponse) {
                System.out.println("simpleHttpResponse: " + simpleHttpResponse);
                System.out.println("Response received: " + 
simpleHttpResponse.getBodyText());
            }

            public void failed(Exception e) {
            }
            public void cancelled() {
            }
        });
        future.get(1, TimeUnit.MINUTES);
    }

    public static void main(String[] args) {
        try {
            //callClient4();
            callClient5();
        } catch (Exception e) { e.printStackTrace(); }
    }
}

out put
=========
======call Client 4=======

HTTP/1.1 200 OK
{ "result": [ { "status": { "code": 0, "message": "OK" }, "url": 
"\/sys\/login\/user" } ], "session": 
"9GxQF4tFVoJcwyC2600mZ0v+QBwKnwpV541QQQD4vV789ExKhc8t+SMN9tWzuLwmEJ+PfUkP1KadCHyPwxtn1Q=="
 }
======call Client 5=======

simpleHttpResponse: 400 null HTTP/2.0
Response received: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>400 Bad Request</title>
</head><body>
<h1>Bad Request</h1>
<p>Your browser sent a request that this server could not understand.<br />
</p>
</body></html>

Curl output
============
curl -kv -X POST 
https://10.10.10.10/jsonrpc<https://urldefense.com/v3/__https:/10.10.10.10/jsonrpc__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MkgeCe1c$><https://172.16.14.130/jsonrpc<https://urldefense.com/v3/__https:/172.16.14.130/jsonrpc__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19M1opIHrs$>>
 -H "Content-Type: application/json" -d 
'{"method":"exec","params":[{"url":"sys/login/user","data":{"user":"admin","passwd":"cloudmylab"}}]}'
Note: Unnecessary use of -X or --request, POST is already inferred.
*   Trying 10.10.10.10:443...
* Connected to 10.10.10.10 (10.10.10.10) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS header, Certificate Status (22):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS header, Finished (20):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.2 (OUT), TLS header, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=FMGVMSTM24000898; O=Fortinet; OU=FortiManager; C=US; 
ST=California; L=Sunnyvale; 
[email protected]<mailto:[email protected]><mailto:emailAddress<mailto:emailAddress>[email protected]<mailto:[email protected]>>
*  start date: Mar 11 03:07:22 2024 GMT
*  expire date: Jan  2 07:59:59 2038 GMT
*  issuer: CN=FMGVMSTM24000898; O=Fortinet; OU=FortiManager; C=US; 
ST=California; L=Sunnyvale; 
[email protected]<mailto:[email protected]><mailto:emailAddress<mailto:emailAddress>[email protected]<mailto:[email protected]>>
*  SSL certificate verify result: self-signed certificate (18), continuing 
anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* Using Stream ID: 1 (easy handle 0x61e17b50b9f0)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
> POST /jsonrpc HTTP/2
> Host: 10.10.10.10
> user-agent: curl/7.81.0
> accept: */*
> content-type: application/json
> content-length: 99
>
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* We are completely uploaded and fine
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
< HTTP/2 200
< x-frame-options: SAMEORIGIN
< vary: Accept-Encoding
< strict-transport-security: max-age=63072000
< x-ua-compatible: IE=Edge
< x-xss-protection: 1; mode=block
< x-content-type-options: nosniff
< content-security-policy: frame-ancestors 'none'; object-src 'none'; 
script-src 'self';
< content-type: application/json
< date: Wed, 25 Feb 2026 04:12:10 GMT
< server: Apache
<
* Connection #0 to host 10.10.10.10 left intact
{ "result": [ { "status": { "code": 0, "message": "OK" }, "url": 
"sys\/login\/user" } ], "session": 
"MwLTkNa\/iP0HUC7EW1\/MRH7AY3BsCrgjqH20MRpjUT8bE9uWNd2r7v7NG1E3mQ32ZpeqjGS9gdk22USGHu8nQA=="
 }


Debug message
===============
2026-02-25 12:12:01.579 [main] DEBUG InternalAbstractHttpAsyncClient - 
ex-0000000001 preparing request execution
2026-02-25 12:12:01.592 [main] DEBUG AsyncProtocolExec - ex-0000000001 target 
auth state: UNCHALLENGED
2026-02-25 12:12:01.593 [main] DEBUG AsyncProtocolExec - ex-0000000001 proxy 
auth state: UNCHALLENGED
2026-02-25 12:12:01.594 [main] DEBUG AsyncConnectExec - ex-0000000001 acquiring 
connection with route 
{s}->[https://10.10.10.10:443<https://urldefense.com/v3/__https:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MoCXLsuU$>]
2026-02-25 12:12:01.594 [main] DEBUG InternalHttpAsyncClient - ex-0000000001 
acquiring endpoint (3 MINUTES)
2026-02-25 12:12:01.596 [main] DEBUG PoolingAsyncClientConnectionManager - 
ex-0000000001 endpoint lease request (3 MINUTES) [route: 
{s}->[https://10.10.10.10:443<https://urldefense.com/v3/__https:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MoCXLsuU$>]][total
 available: 0; route allocated: 0 of 10; total allocated: 0 of 10]
2026-02-25 12:12:01.604 [main] DEBUG PoolingAsyncClientConnectionManager - 
ex-0000000001 endpoint leased [route: 
{s}->[https://10.10.10.10:443<https://urldefense.com/v3/__https:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MoCXLsuU$>]][total
 available: 0; route allocated: 1 of 10; total allocated: 1 of 10]
2026-02-25 12:12:01.604 [main] DEBUG PoolingAsyncClientConnectionManager - 
ex-0000000001 acquired ep-0000000001
2026-02-25 12:12:01.604 [main] DEBUG InternalHttpAsyncClient - ex-0000000001 
acquired endpoint ep-0000000001
2026-02-25 12:12:01.604 [main] DEBUG InternalHttpAsyncClient - ep-0000000001 
connecting endpoint (null)
2026-02-25 12:12:01.605 [main] DEBUG PoolingAsyncClientConnectionManager - 
ep-0000000001 connecting endpoint to 
https://10.10.10.10:443<https://urldefense.com/v3/__https:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MoCXLsuU$><https://172.16.14.130:443<https://urldefense.com/v3/__https:/172.16.14.130:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MI2PjXtM$>>
 (3 MINUTES)
2026-02-25 12:12:01.605 [main] DEBUG DefaultAsyncClientConnectionOperator - 
https://10.10.10.10:443<https://urldefense.com/v3/__https:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MoCXLsuU$><https://172.16.14.130:443<https://urldefense.com/v3/__https:/172.16.14.130:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MI2PjXtM$>>
 connecting null->null (3 MINUTES)
2026-02-25 12:12:01.607 [main] DEBUG MultihomeIOSessionRequester - 10.10.10.10 
resolving remote address
2026-02-25 12:12:01.608 [main] DEBUG MultihomeIOSessionRequester - 10.10.10.10 
resolved to 
[/10.10.10.10:443<https://urldefense.com/v3/__http:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19Mci27AK4$>]
2026-02-25 12:12:01.609 [main] DEBUG MultihomeIOSessionRequester - 
10.10.10.10:443<https://urldefense.com/v3/__http:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19Mci27AK4$>
 connecting 
null->/10.10.10.10:443<https://urldefense.com/v3/__http:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19Mci27AK4$>
 (3 MINUTES)
2026-02-25 12:12:01.903 [httpclient-dispatch-1] DEBUG IOSessionImpl - 
c-0000000000[ACTIVE][rc:c] protocol upgrade class 
org.apache.hc.core5.http2.impl.nio.HttpProtocolNegotiator
2026-02-25 12:12:01.905 [httpclient-dispatch-1] DEBUG 
MultihomeIOSessionRequester - 
10.10.10.10:443<https://urldefense.com/v3/__http:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19Mci27AK4$>
 connected 
null->/10.10.10.10:443<https://urldefense.com/v3/__http:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19Mci27AK4$>
 as c-0000000000
2026-02-25 12:12:01.906 [httpclient-dispatch-1] DEBUG 
DefaultAsyncClientConnectionOperator - c-0000000000 
https://10.10.10.10:443<https://urldefense.com/v3/__https:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MoCXLsuU$><https://172.16.14.130:443<https://urldefense.com/v3/__https:/172.16.14.130:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MI2PjXtM$>>
 connected 
/10.147.17.239:59786->/10.10.10.10:443<https://urldefense.com/v3/__http:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19Mci27AK4$>
2026-02-25 12:12:01.906 [httpclient-dispatch-1] DEBUG 
DefaultAsyncClientConnectionOperator - c-0000000000 
https://10.10.10.10:443<https://urldefense.com/v3/__https:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MoCXLsuU$><https://172.16.14.130:443<https://urldefense.com/v3/__https:/172.16.14.130:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MI2PjXtM$>>
 upgrading to TLS
2026-02-25 12:12:01.908 [httpclient-dispatch-1] DEBUG 
DefaultManagedAsyncClientConnection - c-0000000000 start TLS
2026-02-25 12:12:01.919 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy 
- Enabled protocols: [TLSv1.3, TLSv1.2]
2026-02-25 12:12:01.919 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy 
- Enabled cipher suites: [TLS_AES_256_GCM_SHA384, TLS_AES_128_GCM_SHA256, 
TLS_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, 
TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_GCM_SHA256, 
TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, 
TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
2026-02-25 12:12:01.919 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy 
- Starting handshake (3 MINUTES)
2026-02-25 12:12:01.923 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:c][ACTIVE][r][NEED_UNWRAP][0][0][389] Event cleared [c]
2026-02-25 12:12:02.214 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy 
- Secure session established
2026-02-25 12:12:02.214 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy 
-  negotiated protocol: TLSv1.3
2026-02-25 12:12:02.214 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy 
-  negotiated cipher suite: TLS_AES_256_GCM_SHA384
2026-02-25 12:12:02.216 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy 
- Peer principal: 
1.2.840.113549.1.9.1=#1614737570706f727440666f7274696e65742e636f6d,L=Sunnyvale,ST=California,C=US,OU=FortiManager,O=Fortinet,CN=FMGVMSTM24000898
2026-02-25 12:12:02.219 [httpclient-dispatch-1] DEBUG AbstractClientTlsStrategy 
- Issuer principal: 
1.2.840.113549.1.9.1=#1614737570706f727440666f7274696e65742e636f6d,L=Sunnyvale,ST=California,C=US,OU=FortiManager,O=Fortinet,CN=FMGVMSTM24000898
2026-02-25 12:12:02.220 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][90] protocol 
upgrade class org.apache.hc.core5.http2.impl.nio.ClientH2PrefaceHandler
2026-02-25 12:12:02.220 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][90] Event set [w]
2026-02-25 12:12:02.221 [httpclient-dispatch-1] DEBUG 
PoolingAsyncClientConnectionManager - ep-0000000001 connected c-0000000000
2026-02-25 12:12:02.221 [httpclient-dispatch-1] DEBUG InternalHttpAsyncClient - 
ep-0000000001 endpoint connected
2026-02-25 12:12:02.221 [httpclient-dispatch-1] DEBUG AsyncConnectExec - 
ex-0000000001 connected to target
2026-02-25 12:12:02.221 [httpclient-dispatch-1] DEBUG AsyncConnectExec - 
ex-0000000001 route fully established
2026-02-25 12:12:02.221 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec - 
ex-0000000001 executing POST /jsonrpc
2026-02-25 12:12:02.223 [httpclient-dispatch-1] DEBUG InternalHttpAsyncClient - 
ep-0000000001 start execution ex-0000000001
2026-02-25 12:12:02.223 [httpclient-dispatch-1] DEBUG 
PoolingAsyncClientConnectionManager - ep-0000000001 executing exchange 
ex-0000000001 over c-0000000000
2026-02-25 12:12:02.224 [httpclient-dispatch-1] DEBUG 
DefaultManagedAsyncClientConnection - c-0000000000 RequestExecutionCommand with 
NORMAL priority
2026-02-25 12:12:02.225 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][90] Enqueued 
RequestExecutionCommand with priority IMMEDIATE
2026-02-25 12:12:02.225 [httpclient-dispatch-1] DEBUG 
DefaultAsyncClientConnectionOperator - c-0000000000 
https://10.10.10.10:443<https://urldefense.com/v3/__https:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MoCXLsuU$><https://172.16.14.130:443<https://urldefense.com/v3/__https:/172.16.14.130:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19MI2PjXtM$>>
 upgraded to TLS
2026-02-25 12:12:02.225 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][152] 24 bytes 
written
2026-02-25 12:12:02.225 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][152] >> PRI * 
HTTP/2.0    50 52 49 20 2a 20 48 54 54 50 2f 32 2e 30 0d 0a
2026-02-25 12:12:02.225 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][152] >>   SM      
        0d 0a 53 4d 0d 0a 0d 0a
2026-02-25 12:12:02.225 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][152] Event cleared 
[w]
2026-02-25 12:12:02.246 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][152] protocol 
upgrade class org.apache.hc.core5.http2.impl.nio.ClientH2IOEventHandler
2026-02-25 12:12:02.248 [httpclient-dispatch-1] DEBUG frame - c-0000000000 >> 
stream 0 frame: SETTINGS (0x4); flags: (0x0); length: 42
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
HEADER_TABLE_SIZE: 8192
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
ENABLE_PUSH: 1
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
MAX_CONCURRENT_STREAMS: 250
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
INITIAL_WINDOW_SIZE: 65535
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
MAX_FRAME_SIZE: 65536
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
MAX_HEADER_LIST_SIZE: 16777215
2026-02-25 12:12:02.249 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
SETTINGS_NO_RFC7540_PRIORITIES: 1
2026-02-25 12:12:02.251 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][241] 51 bytes 
written
2026-02-25 12:12:02.251 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][241] >> 
..*.......... ..  00 00 2a 04 00 00 00 00 00 00 01 00 00 20 00 00
2026-02-25 12:12:02.254 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][241] >> 
................  02 00 00 00 01 00 03 00 00 00 fa 00 04 00 00 ff
2026-02-25 12:12:02.254 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][241] >> 
.............. .  ff 00 05 00 01 00 00 00 06 00 ff ff ff 00 09 00
2026-02-25 12:12:02.254 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][241] >> ...        
       00 00 01
2026-02-25 12:12:02.254 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][241] Event set [w]
2026-02-25 12:12:02.254 [httpclient-dispatch-1] DEBUG frame - c-0000000000 >> 
stream 0 frame: WINDOW_UPDATE (0x8); flags: (0x0); length: 4
2026-02-25 12:12:02.254 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
Increment 2147418112
2026-02-25 12:12:02.255 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][292] 13 bytes 
written
2026-02-25 12:12:02.255 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][292] >> ......... 
...     00 00 04 08 00 00 00 00 00 7f ff 00 00
2026-02-25 12:12:02.255 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][292] Event set [w]
2026-02-25 12:12:02.255 [httpclient-dispatch-1] DEBUG flow - c-0000000000 << 
stream 0 flow control 2147483647 -> 2147483647
2026-02-25 12:12:02.255 [httpclient-dispatch-1] DEBUG flow - c-0000000000 >> 
stream 0 flow control 65535 -> 65535
2026-02-25 12:12:02.255 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][r:w][ACTIVE][r][NOT_HANDSHAKING][0][0][0] Event cleared [w]
2026-02-25 12:12:02.822 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][624][0][0] << 
..............d.  00 00 06 04 00 00 00 00 00 00 03 00 00 00 64 00
2026-02-25 12:12:02.823 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][624][0][0] << ........ 
...      00 04 08 00 00 00 00 00 7f ff 00 00
2026-02-25 12:12:02.823 [httpclient-dispatch-1] DEBUG frame - c-0000000000 << 
stream 0 frame: SETTINGS (0x4); flags: (0x0); length: 6
2026-02-25 12:12:02.823 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
MAX_CONCURRENT_STREAMS: 100
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG frame - c-0000000000 >> 
stream 0 frame: SETTINGS (0x4); flags: ACK (0x1); length: 0
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][624][28][47] 9 bytes 
written
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][624][28][47] >> ......... 
        00 00 00 04 01 00 00 00 00
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][624][28][47] Event set 
[w]
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG frame - c-0000000000 << 
stream 0 frame: WINDOW_UPDATE (0x8); flags: (0x0); length: 4
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
Increment 2147418112
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG flow - c-0000000000 >> 
stream 0 flow control 2147418112 -> 2147483647
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][624][28][47] Event set 
[w]
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][624][28][47] 0 bytes 
read
2026-02-25 12:12:02.824 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][47] Event cleared 
[w]
2026-02-25 12:12:02.831 [httpclient-dispatch-1] DEBUG flow - c-0000000000 << 
stream 1 flow control 65535 -> 65535
2026-02-25 12:12:02.831 [httpclient-dispatch-1] DEBUG flow - c-0000000000 >> 
stream 1 flow control 65535 -> 65535
2026-02-25 12:12:02.832 [httpclient-dispatch-1] DEBUG RequestUpgrade - 
Connection is upgradable: protocol version = HTTP/1.1
2026-02-25 12:12:02.832 [httpclient-dispatch-1] DEBUG RequestAddCookies - 
ex-0000000001 Cookie spec selected: strict
2026-02-25 12:12:02.842 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec - 
ex-0000000001 send request POST /jsonrpc, entity len 102
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >> 
:method: POST
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >> 
:scheme: https
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >> 
:authority: 
10.10.10.10:443<https://urldefense.com/v3/__http:/10.10.10.10:443__;!!Obbck6kTJA!c-3c4UCZjowBpytaVxxmNPPstMMyvlneKSU1OlmRRNEtUGi-EHxLGdkYV-TdVtzdZ0WqQuhzd19Mci27AK4$>
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >> 
:path: /jsonrpc
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >> 
accept: application/json
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >> 
content-type: application/json
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >> 
accept-encoding: gzip, x-gzip, deflate
2026-02-25 12:12:02.843 [httpclient-dispatch-1] DEBUG headers - c-0000000000 >> 
user-agent: Apache-HttpAsyncClient/5.6 (Java/11.0.23)
2026-02-25 12:12:02.846 [httpclient-dispatch-1] DEBUG frame - c-0000000000 >> 
stream 1 frame: HEADERS (0x1); flags: END_HEADERS (0x4); length: 102
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
..A. .\....  ..L  83 87 41 8d 0b a2 5c 2e 2e 16 97 0b 20 b8 d3 4c
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
.D.c..U..S. u.b   ff 44 86 63 a2 0f 55 95 93 53 8b 1d 75 d0 62 0d
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
&=LtA._. u.b &=L  26 3d 4c 74 41 ea 5f 8b 1d 75 d0 62 0d 26 3d 4c
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
tA.P.....S..{5 J  74 41 ea 50 90 9b d9 ab fa 53 ca d3 7b 35 7f 4a
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
HYh.Kz....r..)..  48 59 68 1a 4b 7a 9f 86 b1 92 72 ad 8d 29 ae 14
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
z...1jK ....Q...  7a a8 97 a8 31 6a 4b 0d ae e2 9f d6 51 f7 1b 01
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
 .\L.             0a e0 5c 4c ff 7f
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] 111 bytes 
written
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >> 
..f........A. .\  00 00 66 01 04 00 00 00 01 83 87 41 8d 0b a2 5c
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >> ....  
..L.D.c..U  2e 2e 16 97 0b 20 b8 d3 4c ff 44 86 63 a2 0f 55
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >> ..S. u.b 
&=LtA._  95 93 53 8b 1d 75 d0 62 0d 26 3d 4c 74 41 ea 5f
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >> . u.b 
&=LtA.P...  8b 1d 75 d0 62 0d 26 3d 4c 74 41 ea 50 90 9b d9
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >> ..S..{5 
JHYh.Kz.  ab fa 53 ca d3 7b 35 7f 4a 48 59 68 1a 4b 7a 9f
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >> 
...r..)..z...1jK  86 b1 92 72 ad 8d 29 ae 14 7a a8 97 a8 31 6a 4b
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][r][NOT_HANDSHAKING][0][0][196] >>  ....Q... 
.\L.    0d ae e2 9f d6 51 f7 1b 01 0a e0 5c 4c ff 7f
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][196] Event set [w]
2026-02-25 12:12:02.847 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec - 
ex-0000000001: produce request data
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec - 
ex-0000000001: produce request data, len 102 bytes
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG frame - c-0000000000 >> 
stream 1 frame: DATA (0x0); flags: (0x0); length: 102
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
{"method": "exec  7b 22 6d 65 74 68 6f 64 22 3a 20 22 65 78 65 63
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
","params":[{"da  22 2c 22 70 61 72 61 6d 73 22 3a 5b 7b 22 64 61
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
ta":{"user":"adm  74 61 22 3a 7b 22 75 73 65 72 22 3a 22 61 64 6d
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
in","passwd":"cl  69 6e 22 2c 22 70 61 73 73 77 64 22 3a 22 63 6c
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
oudmylab"},"url"  6f 75 64 6d 79 6c 61 62 22 7d 2c 22 75 72 6c 22
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
: "/sys/login/us  3a 20 22 2f 73 79 73 2f 6c 6f 67 69 6e 2f 75 73
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG payload - c-0000000000 >> 
er"}]}            65 72 22 7d 5d 7d
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG flow - c-0000000000 >> 
stream 0 flow control -102 -> 2147483545
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG flow - c-0000000000 >> 
stream 1 flow control -102 -> 65433
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] 111 bytes 
written
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >> 
..f......{"metho  00 00 66 00 00 00 00 00 01 7b 22 6d 65 74 68 6f
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >> d": 
"exec","para  64 22 3a 20 22 65 78 65 63 22 2c 22 70 61 72 61
2026-02-25 12:12:02.850 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >> 
ms":[{"data":{"u  6d 73 22 3a 5b 7b 22 64 61 74 61 22 3a 7b 22 75
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >> 
ser":"admin","pa  73 65 72 22 3a 22 61 64 6d 69 6e 22 2c 22 70 61
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >> 
sswd":"cloudmyla  73 73 77 64 22 3a 22 63 6c 6f 75 64 6d 79 6c 61
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >> 
b"},"url": "/sys  62 22 7d 2c 22 75 72 6c 22 3a 20 22 2f 73 79 73
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] >> 
/login/user"}]}   2f 6c 6f 67 69 6e 2f 75 73 65 72 22 7d 5d 7d
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][345] Event set [w]
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec - 
ex-0000000001: end of request data
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG frame - c-0000000000 >> 
stream 1 frame: DATA (0x0); flags: END_STREAM (0x1); length: 0
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][392] 9 bytes 
written
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][392] >> ......... 
        00 00 00 00 01 00 00 00 01
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][392] Event set [w]
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][rw:rw][ACTIVE][rw][NOT_HANDSHAKING][31][0][0] << ......... 
        00 00 00 04 01 00 00 00 00
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG frame - c-0000000000 << 
stream 0 frame: SETTINGS (0x4); flags: ACK (0x1); length: 0
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:rw][ACTIVE][rw][NOT_HANDSHAKING][31][9][0] Event set [w]
2026-02-25 12:12:02.851 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][rw:rw][ACTIVE][rw][NOT_HANDSHAKING][31][9][0] 0 bytes read
2026-02-25 12:12:02.852 [httpclient-dispatch-1] DEBUG SSLIOSession - 
c-0000000000[ACTIVE][r:rw][ACTIVE][r][NOT_HANDSHAKING][0][0][0] Event cleared 
[w]
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << ..V......?. 
.@<mailto:.@<mailto:.@%3cmailto:.@>>..  00 00 56 01 04 00 00 00 01 3f e1 1f 8c 
40 8b f2
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << 
.....z.c........  b4 b6 0e 92 ac 7a d2 63 d4 8f 89 dd 0e 8c 1a b6
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << ...O. 
..._.I|...  e4 c5 93 4f 0f 0d 82 10 9c 5f 95 49 7c a5 89 d3
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << M j.q.... 
.<.o.   4d 1f 6a 12 71 d8 82 a6 03 20 eb 3c f3 6f ac 1f
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << 
a..Y>..ja,j..q@9  61 96 e4 59 3e 94 13 6a 61 2c 6a 08 02 71 40 39
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << 
q.\.*b..v....r..  71 a1 5c 03 2a 62 d1 bf 76 85 86 b1 92 72 ff 00
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << 
........<!DOCTYP  00 e2 00 01 00 00 00 01 3c 21 44 4f 43 54 59 50
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << E HTML 
PUBLIC "-  45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << //IETF//DTD 
HTML  2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] <<  2.0//EN"> 
<html  20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << ><head> 
<title>4  3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << 00 Bad 
Request</  30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << title> 
</head><b  74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62
2026-02-25 12:12:03.135 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << ody> 
<h1>Bad Req  6f 64 79 3e 0a 3c 68 31 3e 42 61 64 20 52 65 71
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << uest</h1> 
<p>You  75 65 73 74 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << r browser 
sent a  72 20 62 72 6f 77 73 65 72 20 73 65 6e 74 20 61
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] <<  request 
that th  20 72 65 71 75 65 73 74 20 74 68 61 74 20 74 68
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << is server 
could   69 73 20 73 65 72 76 65 72 20 63 6f 75 6c 64 20
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << not 
understand.<  6e 6f 74 20 75 6e 64 65 72 73 74 61 6e 64 2e 3c
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << br /> </p> 
</bod  62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 2f 62 6f 64
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG wire - 
c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][352][0][0] << y></html>   
      79 3e 3c 2f 68 74 6d 6c 3e 0a
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG frame - c-0000000000 << 
stream 1 frame: HEADERS (0x1); flags: END_HEADERS (0x4); length: 86
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
?. 
[email protected]<mailto:[email protected]<mailto:[email protected]%3cmailto:[email protected]>>.  
3f e1 1f 8c 40 8b f2 b4 b6 0e 92 ac 7a d2 63 d4
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
..........O. ...  8f 89 dd 0e 8c 1a b6 e4 c5 93 4f 0f 0d 82 10 9c
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
_.I|...M j.q....  5f 95 49 7c a5 89 d3 4d 1f 6a 12 71 d8 82 a6 03
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
 .<.o. a..Y>..ja  20 eb 3c f3 6f ac 1f 61 96 e4 59 3e 94 13 6a 61
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
,j..q@9q.\.*b..v  2c 6a 08 02 71 40 39 71 a1 5c 03 2a 62 d1 bf 76
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
....r.            85 86 b1 92 72 ff
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG headers - c-0000000000 << 
:status: 400
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG headers - c-0000000000 << 
x-frame-options: SAMEORIGIN
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG headers - c-0000000000 << 
content-length: 226
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG headers - c-0000000000 << 
content-type: text/html; charset=iso-8859-1
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG headers - c-0000000000 << 
date: Wed, 25 Feb 2026 06:42:03 GMT
2026-02-25 12:12:03.136 [httpclient-dispatch-1] DEBUG headers - c-0000000000 << 
server: Apache
2026-02-25 12:12:03.140 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec - 
ex-0000000001: consume response 400, entity len -1
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG frame - c-0000000000 << 
stream 1 frame: DATA (0x0); flags: END_STREAM (0x1); length: 226
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
<!DOCTYPE HTML P  3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
UBLIC "-//IETF//  55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
DTD HTML 2.0//EN  44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
"> <html><head>   22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
<title>400 Bad R  3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
equest</title> <  65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 0a 3c
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
/head><body> <h1  2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
>Bad Request</h1  3e 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31
2026-02-25 12:12:03.145 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
> <p>Your browse  3e 0a 3c 70 3e 59 6f 75 72 20 62 72 6f 77 73 65
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
r sent a request  72 20 73 65 6e 74 20 61 20 72 65 71 75 65 73 74
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
 that this serve  20 74 68 61 74 20 74 68 69 73 20 73 65 72 76 65
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
r could not unde  72 20 63 6f 75 6c 64 20 6e 6f 74 20 75 6e 64 65
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
rstand.<br /> </  72 73 74 61 6e 64 2e 3c 62 72 20 2f 3e 0a 3c 2f
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
p> </body></html  70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG payload - c-0000000000 << 
>                 3e 0a
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG flow - c-0000000000 << 
stream 1 flow control -226 -> 65309
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG flow - c-0000000000 << 
stream 0 flow control -226 -> 2147483421
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec - 
ex-0000000001: consume response data, len 226 bytes
2026-02-25 12:12:03.146 [httpclient-dispatch-1] DEBUG HttpAsyncMainClientExec - 
ex-0000000001: end of response data
simpleHttpResponse: 400 null HTTP/2.0
Response received: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>400 Bad Request</title>
</head><body>
<h1>Bad Request</h1>
<p>Your browser sent a request that this server could not understand.<br />
</p>
</body></html>

2026-02-25 12:12:03.149 [httpclient-dispatch-1] DEBUG 
InternalAbstractHttpAsyncClient - ex-0000000001 message exchange successfully 
completed
2026-02-25 12:12:03.149 [httpclient-dispatch-1] DEBUG InternalHttpAsyncClient - 
ep-0000000001 releasing valid endpoint
Process finished with exit code 0

Reply via email to