Skip to content

Instantly share code, notes, and snippets.

@helb
Created May 27, 2019 14:11

Revisions

  1. helb revised this gist May 27, 2019. 1 changed file with 27 additions and 19 deletions.
    46 changes: 27 additions & 19 deletions curl
    Original file line number Diff line number Diff line change
    @@ -1,56 +1,64 @@
    * Trying 2001:148f:ffff::1:443...
    * Trying 2a00:1450:4014:800::200e:443...
    * TCP_NODELAY set
    * Connected to odvr.nic.cz (2001:148f:ffff::1) port 443 (#0)
    * Connected to dns.google.com (2a00:1450:4014:800::200e) port 443 (#0)
    * ALPN, offering h2
    * ALPN, offering http/1.1
    * successfully set certificate verify locations:
    * CAfile: /etc/ssl/certs/ca-certificates.crt
    CApath: /etc/ssl/certs
    } [5 bytes data]
    * TLSv1.2 (OUT), TLS handshake, Client hello (1):
    } [209 bytes data]
    } [212 bytes data]
    * TLSv1.2 (IN), TLS handshake, Server hello (2):
    { [102 bytes data]
    { [100 bytes data]
    * TLSv1.2 (IN), TLS handshake, Certificate (11):
    { [1456 bytes data]
    { [3217 bytes data]
    * TLSv1.2 (IN), TLS handshake, Server key exchange (12):
    { [333 bytes data]
    { [116 bytes data]
    * TLSv1.2 (IN), TLS handshake, Server finished (14):
    { [4 bytes data]
    * TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
    } [70 bytes data]
    } [37 bytes data]
    * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
    } [1 bytes data]
    * TLSv1.2 (OUT), TLS handshake, Finished (20):
    } [16 bytes data]
    * TLSv1.2 (IN), TLS handshake, Finished (20):
    { [16 bytes data]
    * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
    * SSL connection using TLSv1.2 / ECDHE-ECDSA-CHACHA20-POLY1305
    * ALPN, server accepted to use h2
    * Server certificate:
    * subject: CN=odvr.nic.cz
    * start date: Mar 8 00:00:00 2019 GMT
    * expire date: Mar 7 12:00:00 2020 GMT
    * issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=RapidSSL RSA CA 2018
    * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
    * subject: C=US; ST=California; L=Mountain View; O=Google LLC; CN=*.google.com
    * start date: May 7 11:29:56 2019 GMT
    * expire date: Jul 30 10:54:00 2019 GMT
    * issuer: C=US; O=Google Trust Services; CN=Google Internet Authority G3
    * SSL certificate verify ok.
    * Using HTTP2, server supports multi-use
    * Connection state changed (HTTP/2 confirmed)
    * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
    } [5 bytes data]
    * Using Stream ID: 1 (easy handle 0x55ed06ee52b0)
    * Using Stream ID: 1 (easy handle 0x56059560e2b0)
    } [5 bytes data]
    > GET /doh?dns=AAAAAAABAAAAAAAAA25pYwJjegAAAQAB HTTP/2
    > Host: odvr.nic.cz
    > GET /experimental?dns=AAAAAAABAAAAAAAAA25pYwJjegAAAQAB HTTP/2
    > Host: dns.google.com
    > User-Agent: curl/7.65.0
    > accept: application/dns-message
    >
    { [5 bytes data]
    * Connection state changed (MAX_CONCURRENT_STREAMS == 4294967295)!
    * Connection state changed (MAX_CONCURRENT_STREAMS == 100)!
    } [5 bytes data]
    < HTTP/2 200
    < strict-transport-security: max-age=31536000; includeSubDomains; preload
    < access-control-allow-origin: *
    < date: Mon, 27 May 2019 13:57:38 GMT
    < expires: Mon, 27 May 2019 13:57:38 GMT
    < cache-control: private, max-age=1595
    < content-type: application/dns-message
    < server: HTTP server (unknown)
    < content-length: 40
    < cache-control: max-age=912
    < x-xss-protection: 0
    < x-frame-options: SAMEORIGIN
    < alt-svc: quic=":443"; ma=2592000; v="46,44,43,39"
    <
    { [5 bytes data]
    * Connection #0 to host odvr.nic.cz left intact
    * Connection #0 to host dns.google.com left intact
  2. helb created this gist May 27, 2019.
    56 changes: 56 additions & 0 deletions curl
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,56 @@
    * Trying 2001:148f:ffff::1:443...
    * TCP_NODELAY set
    * Connected to odvr.nic.cz (2001:148f:ffff::1) port 443 (#0)
    * ALPN, offering h2
    * ALPN, offering http/1.1
    * successfully set certificate verify locations:
    * CAfile: /etc/ssl/certs/ca-certificates.crt
    CApath: /etc/ssl/certs
    } [5 bytes data]
    * TLSv1.2 (OUT), TLS handshake, Client hello (1):
    } [209 bytes data]
    * TLSv1.2 (IN), TLS handshake, Server hello (2):
    { [102 bytes data]
    * TLSv1.2 (IN), TLS handshake, Certificate (11):
    { [1456 bytes data]
    * TLSv1.2 (IN), TLS handshake, Server key exchange (12):
    { [333 bytes data]
    * TLSv1.2 (IN), TLS handshake, Server finished (14):
    { [4 bytes data]
    * TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
    } [70 bytes data]
    * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
    } [1 bytes data]
    * TLSv1.2 (OUT), TLS handshake, Finished (20):
    } [16 bytes data]
    * TLSv1.2 (IN), TLS handshake, Finished (20):
    { [16 bytes data]
    * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
    * ALPN, server accepted to use h2
    * Server certificate:
    * subject: CN=odvr.nic.cz
    * start date: Mar 8 00:00:00 2019 GMT
    * expire date: Mar 7 12:00:00 2020 GMT
    * issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=RapidSSL RSA CA 2018
    * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
    * Using HTTP2, server supports multi-use
    * Connection state changed (HTTP/2 confirmed)
    * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
    } [5 bytes data]
    * Using Stream ID: 1 (easy handle 0x55ed06ee52b0)
    } [5 bytes data]
    > GET /doh?dns=AAAAAAABAAAAAAAAA25pYwJjegAAAQAB HTTP/2
    > Host: odvr.nic.cz
    > User-Agent: curl/7.65.0
    > accept: application/dns-message
    >
    { [5 bytes data]
    * Connection state changed (MAX_CONCURRENT_STREAMS == 4294967295)!
    } [5 bytes data]
    < HTTP/2 200
    < content-type: application/dns-message
    < content-length: 40
    < cache-control: max-age=912
    <
    { [5 bytes data]
    * Connection #0 to host odvr.nic.cz left intact