Created
September 6, 2019 11:49
-
-
Save richtera/663661767073f18ef756fbb86776c508 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ curl -v https://iars360.iars.org/.netlify/functions/token | |
* Trying 142.93.122.177... | |
* TCP_NODELAY set | |
* Connected to iars360.iars.org (142.93.122.177) port 443 (#0) | |
* ALPN, offering http/1.1 | |
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH | |
* successfully set certificate verify locations: | |
* CAfile: /Users/andy/anaconda3/ssl/cacert.pem | |
CApath: none | |
* TLSv1.2 (OUT), TLS header, Certificate Status (22): | |
* TLSv1.2 (OUT), TLS handshake, Client hello (1): | |
* TLSv1.2 (IN), TLS handshake, Server hello (2): | |
* TLSv1.2 (IN), TLS handshake, Certificate (11): | |
* TLSv1.2 (IN), TLS handshake, Server key exchange (12): | |
* TLSv1.2 (IN), TLS handshake, Server finished (14): | |
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16): | |
* TLSv1.2 (OUT), TLS change cipher, Client hello (1): | |
* TLSv1.2 (OUT), TLS handshake, Finished (20): | |
* TLSv1.2 (IN), TLS change cipher, Client hello (1): | |
* TLSv1.2 (IN), TLS handshake, Finished (20): | |
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 | |
* ALPN, server accepted to use http/1.1 | |
* Server certificate: | |
* subject: CN=iars360.iars.org | |
* start date: Sep 3 14:08:39 2019 GMT | |
* expire date: Dec 2 14:08:39 2019 GMT | |
* subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org" | |
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3 | |
* SSL certificate verify ok. | |
> GET /.netlify/functions/token HTTP/1.1 | |
> Host: iars360.iars.org | |
> User-Agent: curl/7.61.0 | |
> Accept: */* | |
> | |
< HTTP/1.1 503 Service Unavailable | |
< Date: Fri, 06 Sep 2019 11:44:11 GMT | |
< Content-Length: 0 | |
< Age: 28 | |
< Connection: keep-alive | |
< Server: Netlify | |
< X-NF-Request-ID: eadfb0e3-3a6b-48ef-ab4c-ae4e2c2aee4d-1541084 | |
< | |
* Connection #0 to host iars360.iars.org left intact | |
$ curl -v https://iars360.iars.org/.netlify/functions/token | |
* Trying 104.248.120.187... | |
* TCP_NODELAY set | |
* Connected to iars360.iars.org (104.248.120.187) port 443 (#0) | |
* ALPN, offering http/1.1 | |
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH | |
* successfully set certificate verify locations: | |
* CAfile: /Users/andy/anaconda3/ssl/cacert.pem | |
CApath: none | |
* TLSv1.2 (OUT), TLS header, Certificate Status (22): | |
* TLSv1.2 (OUT), TLS handshake, Client hello (1): | |
* TLSv1.2 (IN), TLS handshake, Server hello (2): | |
* TLSv1.2 (IN), TLS handshake, Certificate (11): | |
* TLSv1.2 (IN), TLS handshake, Server key exchange (12): | |
* TLSv1.2 (IN), TLS handshake, Server finished (14): | |
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16): | |
* TLSv1.2 (OUT), TLS change cipher, Client hello (1): | |
* TLSv1.2 (OUT), TLS handshake, Finished (20): | |
* TLSv1.2 (IN), TLS change cipher, Client hello (1): | |
* TLSv1.2 (IN), TLS handshake, Finished (20): | |
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 | |
* ALPN, server accepted to use http/1.1 | |
* Server certificate: | |
* subject: CN=iars360.iars.org | |
* start date: Sep 3 14:08:39 2019 GMT | |
* expire date: Dec 2 14:08:39 2019 GMT | |
* subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org" | |
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3 | |
* SSL certificate verify ok. | |
> GET /.netlify/functions/token HTTP/1.1 | |
> Host: iars360.iars.org | |
> User-Agent: curl/7.61.0 | |
> Accept: */* | |
> | |
< HTTP/1.1 503 Service Unavailable | |
< Date: Fri, 06 Sep 2019 11:47:14 GMT | |
< Content-Length: 0 | |
< Age: 28 | |
< Connection: keep-alive | |
< Server: Netlify | |
< X-NF-Request-ID: 3a5fd36d-3ec7-400e-842e-96f8329ddb23-1824051 | |
< | |
* Connection #0 to host iars360.iars.org left intact | |
andreas-mbp:IARS360-gatsby andy$ curl -v https://iars360.iars.org/.netlify/functions/token | |
* Trying 142.93.122.177... | |
* TCP_NODELAY set | |
* Connected to iars360.iars.org (142.93.122.177) port 443 (#0) | |
* ALPN, offering http/1.1 | |
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH | |
* successfully set certificate verify locations: | |
* CAfile: /Users/andy/anaconda3/ssl/cacert.pem | |
CApath: none | |
* TLSv1.2 (OUT), TLS header, Certificate Status (22): | |
* TLSv1.2 (OUT), TLS handshake, Client hello (1): | |
* TLSv1.2 (IN), TLS handshake, Server hello (2): | |
* TLSv1.2 (IN), TLS handshake, Certificate (11): | |
* TLSv1.2 (IN), TLS handshake, Server key exchange (12): | |
* TLSv1.2 (IN), TLS handshake, Server finished (14): | |
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16): | |
* TLSv1.2 (OUT), TLS change cipher, Client hello (1): | |
* TLSv1.2 (OUT), TLS handshake, Finished (20): | |
* TLSv1.2 (IN), TLS change cipher, Client hello (1): | |
* TLSv1.2 (IN), TLS handshake, Finished (20): | |
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 | |
* ALPN, server accepted to use http/1.1 | |
* Server certificate: | |
* subject: CN=iars360.iars.org | |
* start date: Sep 3 14:08:39 2019 GMT | |
* expire date: Dec 2 14:08:39 2019 GMT | |
* subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org" | |
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3 | |
* SSL certificate verify ok. | |
> GET /.netlify/functions/token HTTP/1.1 | |
> Host: iars360.iars.org | |
> User-Agent: curl/7.61.0 | |
> Accept: */* | |
> | |
< HTTP/1.1 503 Service Unavailable | |
< Date: Fri, 06 Sep 2019 11:47:48 GMT | |
< Content-Length: 0 | |
< Age: 28 | |
< Connection: keep-alive | |
< Server: Netlify | |
< X-NF-Request-ID: eadfb0e3-3a6b-48ef-ab4c-ae4e2c2aee4d-1646395 | |
< | |
* Connection #0 to host iars360.iars.org left intact | |
$ curl -v https://iars360.iars.org/.netlify/functions/token | |
* Trying 104.248.120.187... | |
* TCP_NODELAY set | |
* Connected to iars360.iars.org (104.248.120.187) port 443 (#0) | |
* ALPN, offering http/1.1 | |
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH | |
* successfully set certificate verify locations: | |
* CAfile: /Users/andy/anaconda3/ssl/cacert.pem | |
CApath: none | |
* TLSv1.2 (OUT), TLS header, Certificate Status (22): | |
* TLSv1.2 (OUT), TLS handshake, Client hello (1): | |
* TLSv1.2 (IN), TLS handshake, Server hello (2): | |
* TLSv1.2 (IN), TLS handshake, Certificate (11): | |
* TLSv1.2 (IN), TLS handshake, Server key exchange (12): | |
* TLSv1.2 (IN), TLS handshake, Server finished (14): | |
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16): | |
* TLSv1.2 (OUT), TLS change cipher, Client hello (1): | |
* TLSv1.2 (OUT), TLS handshake, Finished (20): | |
* TLSv1.2 (IN), TLS change cipher, Client hello (1): | |
* TLSv1.2 (IN), TLS handshake, Finished (20): | |
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 | |
* ALPN, server accepted to use http/1.1 | |
* Server certificate: | |
* subject: CN=iars360.iars.org | |
* start date: Sep 3 14:08:39 2019 GMT | |
* expire date: Dec 2 14:08:39 2019 GMT | |
* subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org" | |
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3 | |
* SSL certificate verify ok. | |
> GET /.netlify/functions/token HTTP/1.1 | |
> Host: iars360.iars.org | |
> User-Agent: curl/7.61.0 | |
> Accept: */* | |
> | |
< HTTP/1.1 403 Forbidden | |
< Access-Control-Allow-Headers: Authorization,Content-Type,x-version,x-pr,x-repo,x-owner,x-branch,x-course,x-site,x-email,x-name,x-token | |
< Access-Control-Allow-Methods: DELETE,PUT,POST,GET,PATCH | |
< Access-Control-Allow-Origin: * | |
< Cache-Control: no-cache | |
< Content-Type: application/json | |
< Set-Cookie: nf_jwt=; Path=/; Expires=Fri, 06 Sep 2019 11:47:52 GMT; HttpOnly | |
< Date: Fri, 06 Sep 2019 11:47:52 GMT | |
< Content-Length: 40 | |
< Age: 2 | |
< Connection: keep-alive | |
< Server: Netlify | |
< X-NF-Request-ID: 3a5fd36d-3ec7-400e-842e-96f8329ddb23-1859437 | |
< | |
{ | |
"error": "You have been logged off" | |
* Connection #0 to host iars360.iars.org left intact | |
} |
Author
richtera
commented
Sep 6, 2019
Another failure
$curl -v https://iars360.iars.org/.netlify/functions/token
* Trying 142.93.122.177...
* TCP_NODELAY set
* Connected to iars360.iars.org (142.93.122.177) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /Users/andy/anaconda3/ssl/cacert.pem
CApath: none
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=iars360.iars.org
* start date: Sep 3 14:08:39 2019 GMT
* expire date: Dec 2 14:08:39 2019 GMT
* subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org"
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
* SSL certificate verify ok.
> GET /.netlify/functions/token HTTP/1.1
> Host: iars360.iars.org
> User-Agent: curl/7.61.0
> Accept: */*
>
< HTTP/1.1 503 Service Unavailable
< Date: Fri, 06 Sep 2019 12:08:27 GMT
< Content-Length: 0
< Age: 28
< Connection: keep-alive
< Server: Netlify
< X-NF-Request-ID: eadfb0e3-3a6b-48ef-ab4c-ae4e2c2aee4d-2283452
<
* Connection #0 to host iars360.iars.org left intact
andreas-mbp:IARS360-gatsby andy$ dig -x 142.93.122.177
; <<>> DiG 9.10.6 <<>> -x 142.93.122.177
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30195
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;177.122.93.142.in-addr.arpa. IN PTR
;; AUTHORITY SECTION:
122.93.142.in-addr.arpa. 915 IN SOA ns1.digitalocean.com. hostmaster.122.93.142.in-addr.arpa. 1567699898 10800 3600 604800 1800
;; Query time: 23 msec
;; SERVER: 192.168.86.1#53(192.168.86.1)
;; WHEN: Fri Sep 06 08:08:51 EDT 2019
;; MSG SIZE rcvd: 123
Our review site is currently running on google cloud and is working right away
$ curl -v https://iars360-review.selfstudy.app/.netlify/functions/token
* Trying 35.231.152.169...
* TCP_NODELAY set
* Connected to iars360-review.selfstudy.app (35.231.152.169) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /Users/andy/anaconda3/ssl/cacert.pem
CApath: none
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=*.selfstudy.app
* start date: Aug 2 11:08:36 2019 GMT
* expire date: Oct 31 11:08:36 2019 GMT
* subjectAltName: host "iars360-review.selfstudy.app" matched cert's "*.selfstudy.app"
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
* SSL certificate verify ok.
> GET /.netlify/functions/token HTTP/1.1
> Host: iars360-review.selfstudy.app
> User-Agent: curl/7.61.0
> Accept: */*
>
< HTTP/1.1 403 Forbidden
< Access-Control-Allow-Headers: Authorization,Content-Type,x-version,x-pr,x-repo,x-owner,x-branch,x-course,x-site,x-email,x-name,x-token
< Access-Control-Allow-Methods: DELETE,PUT,POST,GET,PATCH
< Access-Control-Allow-Origin: *
< Cache-Control: no-cache
< Content-Type: application/json
< Set-Cookie: nf_jwt=; Path=/; Expires=Fri, 06 Sep 2019 12:06:51 GMT; HttpOnly
< Date: Fri, 06 Sep 2019 12:06:51 GMT
< Content-Length: 40
< Age: 12
< Connection: keep-alive
< Server: Netlify
< X-NF-Request-ID: 940ad471-3070-4fcc-839f-3322dea28c6d-22794351
<
{
"error": "You have been logged off"
* Connection #0 to host iars360-review.selfstudy.app left intact
}andreas-mbp:IARS360-gatsby andy$ dig -x 35.231.152.169
; <<>> DiG 9.10.6 <<>> -x 35.231.152.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42051
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;169.152.231.35.in-addr.arpa. IN PTR
;; ANSWER SECTION:
169.152.231.35.in-addr.arpa. 119 IN PTR 169.152.231.35.bc.googleusercontent.com.
;; Query time: 38 msec
;; SERVER: 192.168.86.1#53(192.168.86.1)
;; WHEN: Fri Sep 06 08:07:14 EDT 2019
;; MSG SIZE rcvd: 109
Another failure and associated info in log
$ curl -v https://iars360.iars.org/.netlify/functions/token
* Trying 167.99.4.63...
* TCP_NODELAY set
* Connected to iars360.iars.org (167.99.4.63) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /Users/andy/anaconda3/ssl/cacert.pem
CApath: none
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=iars360.iars.org
* start date: Sep 3 14:08:39 2019 GMT
* expire date: Dec 2 14:08:39 2019 GMT
* subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org"
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
* SSL certificate verify ok.
> GET /.netlify/functions/token HTTP/1.1
> Host: iars360.iars.org
> User-Agent: curl/7.61.0
> Accept: */*
>
< HTTP/1.1 503 Service Unavailable
< Date: Fri, 06 Sep 2019 12:19:07 GMT
< Content-Length: 0
< Age: 28
< Connection: keep-alive
< Server: Netlify
< X-NF-Request-ID: bc01104b-ed3f-4609-8471-e40f729a3de3-934209
<
* Connection #0 to host iars360.iars.org left intact
$ curl -v https://iars360.iars.org/.netlify/functions/token
* Trying 104.248.120.187...
* TCP_NODELAY set
* Connected to iars360.iars.org (104.248.120.187) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /Users/andy/anaconda3/ssl/cacert.pem
CApath: none
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=iars360.iars.org
* start date: Sep 3 14:08:39 2019 GMT
* expire date: Dec 2 14:08:39 2019 GMT
* subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org"
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
* SSL certificate verify ok.
> GET /.netlify/functions/token HTTP/1.1
> Host: iars360.iars.org
> User-Agent: curl/7.61.0
> Accept: */*
>
< HTTP/1.1 403 Forbidden
< Access-Control-Allow-Headers: Authorization,Content-Type,x-version,x-pr,x-repo,x-owner,x-branch,x-course,x-site,x-email,x-name,x-token
< Access-Control-Allow-Methods: DELETE,PUT,POST,GET,PATCH
< Access-Control-Allow-Origin: *
< Cache-Control: no-cache
< Content-Type: application/json
< Set-Cookie: nf_jwt=; Path=/; Expires=Fri, 06 Sep 2019 12:20:23 GMT; HttpOnly
< Date: Fri, 06 Sep 2019 12:20:23 GMT
< Content-Length: 40
< Age: 0
< Connection: keep-alive
< Server: Netlify
< X-NF-Request-ID: 3a5fd36d-3ec7-400e-842e-96f8329ddb23-2928139
<
{
"error": "You have been logged off"
* Connection #0 to host iars360.iars.org left intact
The last one is a success and shows up correctly in the log
8:05:21 AM: token invoked
8:05:22 AM: XRAY TraceId: 1-5d724b81-74723e592b7206efe3cdc3d4 SegmentId: 4fe0463b642aee0a Sampled: false
8:20:23 AM: token invoked
8:20:23 AM: XRAY TraceId: 1-5d724f07-6d840163b9c0b26ddb8e1fed SegmentId: 2bd0485022271833 Sampled: false
The failures happened between 8:05 and 8:20 and the 8:20 is the X-NF-Request-ID: 3a5fd36d-3ec7-400e-842e-96f8329ddb23-2928139 request.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment