abdulsalam3105 commented on issue #12064:
URL: 
https://github.com/apache/trafficserver/issues/12064#issuecomment-2692558439

   sample curl output
   curl -v "https://Trafficserverurl.com/ccm";
   *   Trying xx.xx.xx.xx.:443...
   * Connected to Trafficserverurl.com (xx.xx.xx.x.) port 443 (#0)
   * ALPN, offering h2
   * ALPN, offering http/1.1
   *  CAfile: /etc/pki/tls/certs/ca-bundle.crt
   * TLSv1.0 (OUT), TLS header, Certificate Status (22):
   * TLSv1.3 (OUT), TLS handshake, Client hello (1):
   * TLSv1.2 (IN), TLS header, Certificate Status (22):
   * TLSv1.3 (IN), TLS handshake, Server hello (2):
   * TLSv1.2 (IN), TLS header, Certificate Status (22):
   * TLSv1.2 (IN), TLS handshake, Certificate (11):
   * TLSv1.2 (IN), TLS header, Certificate Status (22):
   * TLSv1.2 (IN), TLS handshake, Server key exchange (12):
   * TLSv1.2 (IN), TLS header, Certificate Status (22):
   * TLSv1.2 (IN), TLS handshake, Server finished (14):
   * TLSv1.2 (OUT), TLS header, Certificate Status (22):
   * TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
   * TLSv1.2 (OUT), TLS header, Finished (20):
   * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
   * TLSv1.2 (OUT), TLS header, Certificate Status (22):
   * TLSv1.2 (OUT), TLS handshake, Finished (20):
   * TLSv1.2 (IN), TLS header, Finished (20):
   * TLSv1.2 (IN), TLS header, Certificate Status (22):
   * TLSv1.2 (IN), TLS handshake, Finished (20):
   * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
   * ALPN, server accepted to use h2
   * Server certificate:
   *  subject: C=US; ST=XX; L=XXXX; O=compnay myurl; CN=Trafficserverurl.com
   *  start date: Nov  7 10:50:29 2024 GMT
   *  expire date: Nov  7 10:50:29 2026 GMT
   *  subjectAltName: host "Trafficserverurl.com" matched cert's 
"Trafficserverurl.com"
   *  issuer: C=US; O=compnay myurl; CN=ba IssuingCA
   *  SSL certificate verify ok.
   * Using HTTP2, server supports multi-use
   * Connection state changed (HTTP/2 confirmed)
   * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: 
len=0
   * TLSv1.2 (OUT), TLS header, Unknown (23):
   * TLSv1.2 (OUT), TLS header, Unknown (23):
   * TLSv1.2 (OUT), TLS header, Unknown (23):
   * Using Stream ID: 1 (easy handle 0x55e4c5b2b660)
   * TLSv1.2 (OUT), TLS header, Unknown (23):
   > GET /ccm HTTP/2
   > Host: Trafficserverurl.com
   > user-agent: curl/7.76.1
   > accept: */*
   >
   * TLSv1.2 (IN), TLS header, Unknown (23):
   * TLSv1.2 (OUT), TLS header, Unknown (23):
   * TLSv1.2 (IN), TLS header, Unknown (23):
   * TLSv1.2 (IN), TLS header, Unknown (23):
   < HTTP/2 401
   < date: Fri, 28 Feb 2025 17:51:08 GMT
   < vary: Host
   < x-powered-by: Servlet/3.0
   < www-authenticate: Basic realm="JSA"
   < www-authenticate: Bearer realm="JSA"
   < x-jsa-authorization-url: https://IHSurl.com/oidc/endpoint/jazzop
   < x-jsa-authorization-redirect: 
https://IHSurl.com/oidc/endpoint/jazzop/authorize?client_id=xxxxxxxxxx&response_type=code&state=security_token1%3DqubzMyXHqJkhCoVvX%2B1V4uXRQMJk6mJpx3AVPU879uQ%3D%26security_token2%3D5eA4KecA0eqxe4LlZ0z2cZW63baKS4bqXSMqAfk5sg8%3D%26return%3Dhttps%253A%252F%252FIHSurl.com%252Fccm%26scope%3Dopenid%2Bgeneral%2Bprofile%2Bemail%2B%26impersonation%3Dtrue&scope=openid+general+profile+email+&redirect_uri=https%3A%2F%2FIHSurl.com%2Fccm%2Fjsa
   < content-length: 0
   < set-cookie: 
JSA_CSRF_aa89488a-1e9c-46c6-a51f-37a125090265=0d4c3570-5b07-406c-9f03-3cc8dd6d25af;
 Path=/ccm; Secure; HttpOnly; SameSite=None
   < content-language: en-US
   < age: 0
   < strict-transport-security: max-age=63072000
   < via: https/1.1 Trafficserverurl.com (ATS)
   < server: ATS
   <
   * Connection #0 to host Trafficserverurl.com left intact
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to