Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
tectonic-cdn-redirect
curl -v -L https://purl.org/net/pkgwpub/tectonic-default -o tlextras-2016.0r4.tar
> GET /net/pkgwpub/tectonic-default HTTP/1.1
> Host: purl.org
> User-Agent: curl/7.54.1
> Accept: */*
>
{ [5 bytes data]
< HTTP/1.1 302 FOUND
< Server: nginx/1.4.6 (Ubuntu)
< Date: Wed, 09 Aug 2017 05:07:28 GMT
< Content-Type: text/html; charset=utf-8
< Content-Length: 243
< Connection: keep-alive
< Location: https://dl.bintray.com/pkgw/tectonic/tl2016extras/2016.0r4/tlextras-2016.0r4.tar
< Access-Control-Allow-Origin: *
<
* Ignoring the response-body
{ [243 bytes data]
100 243 100 243 0 0 189 0 0:00:01 0:00:01 --:--:-- 189
* Connection #0 to host purl.org left intact
* Issue another request to this URL: 'https://dl.bintray.com/pkgw/tectonic/tl2016extras/2016.0r4/tlextras-2016.0r4.tar'
* Trying 159.122.18.156...
* TCP_NODELAY set
* Connected to dl.bintray.com (159.122.18.156) port 443 (#1)
* ALPN, offering h2
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: none
} [5 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS handshake, Server hello (2):
{ [106 bytes data]
* NPN, negotiated HTTP1.1
{ [5 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [2394 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [333 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS handshake, Unknown (67):
} [36 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server did not agree to a protocol
* Server certificate:
* subject: C=US; ST=California; L=Santa Clara; O=JFrog Inc.; OU=JFrog Inc.; CN=*.bintray.com
* start date: Oct 7 00:00:00 2015 GMT
* expire date: Dec 5 23:59:59 2017 GMT
* subjectAltName: host "dl.bintray.com" matched cert's "*.bintray.com"
* issuer: C=US; O=GeoTrust Inc.; CN=GeoTrust SSL CA - G3
* SSL certificate verify ok.
0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0} [5 bytes data]
> GET /pkgw/tectonic/tl2016extras/2016.0r4/tlextras-2016.0r4.tar HTTP/1.1
> Host: dl.bintray.com
> User-Agent: curl/7.54.1
> Accept: */*
>
{ [5 bytes data]
< HTTP/1.1 302
< Server: nginx
< Date: Wed, 09 Aug 2017 05:07:29 GMT
< Content-Length: 0
< Connection: keep-alive
< Location: https://akamai.bintray.com/59/59eecf9d49e259191ef66cb68b274c7c50fa20a75f593130d2603176418422eb?__gda__=exp=1502255969~hmac=1ac7fe1a543b1efa03eb93bd19e971e78821874a5b70fb31ae46f5f5154f60c8&response-content-disposition=attachment%3Bfilename%3D%22tlextras-2016.0r4.tar%22&response-content-type=application%2Fx-tar&requestInfo=U2FsdGVkX18TPOqeBp2hj-_eFus_XHQm2QqMOh8dPEi5472R4czHls9YzFcNZzHkRV7KGPKM9coGCxeJkMFczwwa3ShkRLa3ip-z-RGRaUbec_xRB7xFIEODZJHiV51E_myQkUvPaI9tkjhxLmQ7KQ
<
0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0
* Connection #1 to host dl.bintray.com left intact
* Issue another request to this URL: 'https://akamai.bintray.com/59/59eecf9d49e259191ef66cb68b274c7c50fa20a75f593130d2603176418422eb?__gda__=exp=1502255969~hmac=1ac7fe1a543b1efa03eb93bd19e971e78821874a5b70fb31ae46f5f5154f60c8&response-content-disposition=attachment%3Bfilename%3D%22tlextras-2016.0r4.tar%22&response-content-type=application%2Fx-tar&requestInfo=U2FsdGVkX18TPOqeBp2hj-_eFus_XHQm2QqMOh8dPEi5472R4czHls9YzFcNZzHkRV7KGPKM9coGCxeJkMFczwwa3ShkRLa3ip-z-RGRaUbec_xRB7xFIEODZJHiV51E_myQkUvPaI9tkjhxLmQ7KQ'
* Trying 23.54.112.159...
* TCP_NODELAY set
* Connected to akamai.bintray.com (23.54.112.159) port 443 (#2)
* ALPN, offering h2
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: none
} [5 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS handshake, Server hello (2):
{ [104 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [4116 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [333 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: C=US; ST=California; L=Sunnyvale; O=JFrog Inc.; OU=IT; CN=*.bintray.com
* start date: Apr 28 00:00:00 2017 GMT
* expire date: Apr 28 23:59:59 2018 GMT
* subjectAltName: host "akamai.bintray.com" matched cert's "*.bintray.com"
* issuer: C=US; O=Symantec Corporation; OU=Symantec Trust Network; CN=Symantec Class 3 Secure Server CA - G4
* SSL certificate verify ok.
} [5 bytes data]
> GET /59/59eecf9d49e259191ef66cb68b274c7c50fa20a75f593130d2603176418422eb?__gda__=exp=1502255969~hmac=1ac7fe1a543b1efa03eb93bd19e971e78821874a5b70fb31ae46f5f5154f60c8&response-content-disposition=attachment%3Bfilename%3D%22tlextras-2016.0r4.tar%22&response-content-type=application%2Fx-tar&requestInfo=U2FsdGVkX18TPOqeBp2hj-_eFus_XHQm2QqMOh8dPEi5472R4czHls9YzFcNZzHkRV7KGPKM9coGCxeJkMFczwwa3ShkRLa3ip-z-RGRaUbec_xRB7xFIEODZJHiV51E_myQkUvPaI9tkjhxLmQ7KQ HTTP/1.1
> Host: akamai.bintray.com
> User-Agent: curl/7.54.1
> Accept: */*
>
{ [5 bytes data]
< HTTP/1.1 200 OK
< Accept-Ranges: bytes
< Server: AkamaiNetStorage
< Last-Modified: Wed, 31 May 2017 13:28:41 GMT
< ETag: "9d095fdae757beeac8a1bb8e2b2f13b4:1496241497"
< Content-Length: 1805571584
< Date: Wed, 09 Aug 2017 05:07:30 GMT
< Connection: keep-alive
< Content-Type: application/x-tar
< content-disposition: attachment;filename="tlextras-2016.0r4.tar"
<
{ [16030 bytes data]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.