-
Notifications
You must be signed in to change notification settings - Fork 18
Open
Description
According to the included documentation, whenever there is an error with the request that was made, the server should return status code 404 with the decoy page fake.html. When I access any URL on the web server, it does return status code 404, but it does not return any HTML. My config.json looks as follows:
{
"instances": [
{
"ServerHeaders": {
"Server": "NetDNA-cache/2.2",
"Cache-Control": "max-age=0, no-cache",
"Pragma": "no-cache",
"Connection": "keep-alive",
"Content-Type": "application/javascript; charset=utf-8"
},
"port": 443,
"key_path": "privkey.pem",
"cert_path": "fullchain.pem",
"debug": true,
"use_ssl": true,
"payloads": {}
}
]
}
The output of $ curl -k -v https://127.0.0.1 looks as follows:
* Trying 127.0.0.1:443...
* Connected to 127.0.0.1 (127.0.0.1) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS header, Certificate Status (22):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS header, Finished (20):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.2 (OUT), TLS header, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server did not agree to a protocol
* Server certificate:
* subject: C=US; ST=oVEgKyfzuDLL34NqZ9nH; L=eCdrCToZ; O=EZNa9X1lLIPG1NcrJ; OU=5iiODcL3W; CN=nxon9W6nh789Oqms3I; emailAddress=SMVKple
* start date: May 4 15:31:50 2022 GMT
* expire date: May 1 15:31:50 2032 GMT
* issuer: C=US; ST=oVEgKyfzuDLL34NqZ9nH; L=eCdrCToZ; O=EZNa9X1lLIPG1NcrJ; OU=5iiODcL3W; CN=nxon9W6nh789Oqms3I; emailAddress=SMVKple
* SSL certificate verify result: self-signed certificate (18), continuing anyway.
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
> GET / HTTP/1.1
> Host: 127.0.0.1
> User-Agent: curl/7.81.0
> Accept: */*
>
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* Mark bundle as not supporting multiuse
< HTTP/1.1 404 Not Found
< Server: NetDNA-cache/2.2
< Cache-Control: max-age=0, no-cache
< Pragma: no-cache
< connection: keep-alive
< Content-Type: application/javascript; charset=utf-8
< content-length: 0
<
* Connection #0 to host 127.0.0.1 left intact
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels