~# curl -v 'https://lic.miko.ru/protect/v1/ping'
* Trying 34.252.21.106:443...
* Connected to lic.miko.ru (34.252.21.106) port 443 (#0)
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /etc/curl/cacert.pem
* CApath: none
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=lic.miko.ru
* start date: Apr 27 00:00:00 2021 GMT
* expire date: May 26 23:59:59 2022 GMT
* subjectAltName: host "lic.miko.ru" matched cert's "lic.miko.ru"
* issuer: C=US; O=Amazon; OU=Server CA 1B; CN=Amazon
* SSL certificate verify ok.
> GET /protect/v1/ping HTTP/1.1
> Host: lic.miko.ru
> User-Agent: curl/7.74.0
> Accept: */*
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Mon, 10 Jan 2022 10:09:52 GMT
< Content-Type: text/html; charset=UTF-8
< Transfer-Encoding: chunked
< Connection: keep-alive
< Server: nginx/1.20.0
< X-Powered-By: PHP/7.4.21
< RESP_HASH: 125bbb42d5e2036a3cf68c4b4142e737
< RESP_TIME: 1641809392
< X-Cached: MISS
<
* Connection #0 to host lic.miko.ru left intact