sudo curl --verbose --location --output-dir /tmp --output webmin-current.tar.gz \ https://www.webmin.com/download/webmin-current.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Host www.webmin.com:443 was resolved. * IPv6: (none) * IPv4: 216.105.38.11 * Trying 216.105.38.11:443... * Connected to www.webmin.com (216.105.38.11) port 443 * ALPN: curl offers h2,http/1.1 } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [25 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [3513 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / RSASSA-PSS * ALPN: server accepted http/1.1 * Server certificate: * subject: CN=secureprojects.sourceforge.net * start date: Apr 1 18:29:42 2024 GMT * expire date: Jun 30 18:29:41 2024 GMT * subjectAltName: host "www.webmin.com" matched cert's "www.webmin.com" * issuer: C=US; O=Let's Encrypt; CN=R3 * SSL certificate verify ok. * Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha256WithRSAEncryption * using HTTP/1.x } [5 bytes data] > GET /download/webmin-current.tar.gz HTTP/1.1 > Host: www.webmin.com > User-Agent: curl/8.7.1 > Accept: */* > * Request completely sent off { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [281 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [281 bytes data] * old SSL session ID is stale, removing { [5 bytes data] < HTTP/1.1 301 Moved Permanently < Server: nginx < Date: Mon, 06 May 2024 21:18:55 GMT < Content-Type: text/html; charset=iso-8859-1 < Content-Length: 257 < Connection: keep-alive < location: https://webmin.com/download/webmin-current.tar.gz < cache-control: max-age=3600 < expires: Mon, 06 May 2024 22:18:53 GMT < vary: Accept-Encoding < * Ignoring the response-body 100 257 100 257 0 0 903 0 --:--:-- --:--:-- --:--:-- 904 * Connection #0 to host www.webmin.com left intact * Issue another request to this URL: 'https://webmin.com/download/webmin-current.tar.gz' * Host webmin.com:443 was resolved. * IPv6: (none) * IPv4: 216.105.38.11 * Trying 216.105.38.11:443... * Connected to webmin.com (216.105.38.11) port 443 * ALPN: curl offers h2,http/1.1 } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [25 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [3513 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / RSASSA-PSS * ALPN: server accepted http/1.1 * Server certificate: * subject: CN=secureprojects.sourceforge.net * start date: Apr 1 18:29:42 2024 GMT * expire date: Jun 30 18:29:41 2024 GMT * subjectAltName: host "webmin.com" matched cert's "webmin.com" * issuer: C=US; O=Let's Encrypt; CN=R3 * SSL certificate verify ok. * Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha256WithRSAEncryption * using HTTP/1.x } [5 bytes data] > GET /download/webmin-current.tar.gz HTTP/1.1 > Host: webmin.com > User-Agent: curl/8.7.1 > Accept: */* > * Request completely sent off { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [265 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [265 bytes data] * old SSL session ID is stale, removing { [5 bytes data] < HTTP/1.1 302 Found < Server: nginx < Date: Mon, 06 May 2024 21:18:55 GMT < Content-Type: text/html; charset=iso-8859-1 < Content-Length: 248 < Connection: keep-alive < location: https://prdownloads.sourceforge.net/webadmin/webmin-2.110.tar.gz < cache-control: max-age=3600 < expires: Mon, 06 May 2024 22:18:53 GMT < vary: Accept-Encoding < * Ignoring the response-body 100 248 100 248 0 0 422 0 --:--:-- --:--:-- --:--:-- 422 * Connection #1 to host webmin.com left intact * Issue another request to this URL: 'https://prdownloads.sourceforge.net/webadmin/webmin-2.110.tar.gz' * Host prdownloads.sourceforge.net:443 was resolved. * IPv6: (none) * IPv4: 204.68.111.105 * Trying 204.68.111.105:443... * Connected to prdownloads.sourceforge.net (204.68.111.105) port 443 * ALPN: curl offers h2,http/1.1 } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [19 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2404 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [79 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / id-ecPublicKey * ALPN: server accepted h2 * Server certificate: * subject: CN=sourceforge.net * start date: May 2 03:40:15 2024 GMT * expire date: Jul 31 03:40:14 2024 GMT * subjectAltName: host "prdownloads.sourceforge.net" matched cert's "*.sourceforge.net" * issuer: C=US; O=Let's Encrypt; CN=R3 * SSL certificate verify ok. * Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha256WithRSAEncryption } [5 bytes data] * using HTTP/2 * [HTTP/2] [1] OPENED stream for https://prdownloads.sourceforge.net/webadmin/webmin-2.110.tar.gz * [HTTP/2] [1] [:method: GET] * [HTTP/2] [1] [:scheme: https] * [HTTP/2] [1] [:authority: prdownloads.sourceforge.net] * [HTTP/2] [1] [:path: /webadmin/webmin-2.110.tar.gz] * [HTTP/2] [1] [user-agent: curl/8.7.1] * [HTTP/2] [1] [accept: */*] } [5 bytes data] > GET /webadmin/webmin-2.110.tar.gz HTTP/2 > Host: prdownloads.sourceforge.net > User-Agent: curl/8.7.1 > Accept: */* > * Request completely sent off { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [281 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [281 bytes data] * old SSL session ID is stale, removing { [5 bytes data] < HTTP/2 301 < server: nginx < date: Mon, 06 May 2024 21:18:55 GMT < content-type: text/html; charset=UTF-8 < content-length: 378 < location: https://downloads.sourceforge.net/project/webadmin/webmin/2.110/webmin-2.110.tar.gz < * Ignoring the response-body 100 378 100 378 0 0 426 0 --:--:-- --:--:-- --:--:-- 426 * Connection #2 to host prdownloads.sourceforge.net left intact * Issue another request to this URL: 'https://downloads.sourceforge.net/project/webadmin/webmin/2.110/webmin-2.110.tar.gz' * Host downloads.sourceforge.net:443 was resolved. * IPv6: (none) * IPv4: 204.68.111.105 * Trying 204.68.111.105:443... * Connected to downloads.sourceforge.net (204.68.111.105) port 443 * ALPN: curl offers h2,http/1.1 } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [19 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2404 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [80 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / id-ecPublicKey * ALPN: server accepted h2 * Server certificate: * subject: CN=sourceforge.net * start date: May 2 03:40:15 2024 GMT * expire date: Jul 31 03:40:14 2024 GMT * subjectAltName: host "downloads.sourceforge.net" matched cert's "*.sourceforge.net" * issuer: C=US; O=Let's Encrypt; CN=R3 * SSL certificate verify ok. * Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha256WithRSAEncryption } [5 bytes data] * using HTTP/2 * [HTTP/2] [1] OPENED stream for https://downloads.sourceforge.net/project/webadmin/webmin/2.110/webmin-2.110.tar.gz * [HTTP/2] [1] [:method: GET] * [HTTP/2] [1] [:scheme: https] * [HTTP/2] [1] [:authority: downloads.sourceforge.net] * [HTTP/2] [1] [:path: /project/webadmin/webmin/2.110/webmin-2.110.tar.gz] * [HTTP/2] [1] [user-agent: curl/8.7.1] * [HTTP/2] [1] [accept: */*] } [5 bytes data] > GET /project/webadmin/webmin/2.110/webmin-2.110.tar.gz HTTP/2 > Host: downloads.sourceforge.net > User-Agent: curl/8.7.1 > Accept: */* > * Request completely sent off { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [281 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [281 bytes data] * old SSL session ID is stale, removing { [5 bytes data] 0 0 0 0 0 0 0 0 --:--:-- 0:00:02 --:--:-- 0< HTTP/2 302 < server: nginx < date: Mon, 06 May 2024 21:18:57 GMT < content-type: text/html; charset=UTF-8 < content-length: 373 < location: https://phoenixnap.dl.sourceforge.net/project/webadmin/webmin/2.110/webmin-2.110.tar.gz?viasf=1 < content-disposition: attachment; filename="webmin-2.110.tar.gz" < set-cookie: sf_mirror_attempt=webadmin:phoenixnap:webmin/2.110/webmin-2.110.tar.gz; Max-Age=120; Path=/; expires=Mon, 06-May-2024 21:20:57 GMT < * Ignoring the response-body 100 373 100 373 0 0 129 0 0:00:02 0:00:02 --:--:-- 196 * Connection #3 to host downloads.sourceforge.net left intact * Issue another request to this URL: 'https://phoenixnap.dl.sourceforge.net/project/webadmin/webmin/2.110/webmin-2.110.tar.gz?viasf=1' * Host phoenixnap.dl.sourceforge.net:443 was resolved. * IPv6: (none) * IPv4: 184.164.141.26 * Trying 184.164.141.26:443... * Connected to phoenixnap.dl.sourceforge.net (184.164.141.26) port 443 * ALPN: curl offers h2,http/1.1 } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] 0 0 0 0 0 0 0 0 --:--:-- 0:00:02 --:--:-- 0* TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [25 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [4886 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / RSASSA-PSS * ALPN: server accepted http/1.1 * Server certificate: * subject: CN=phoenixnap.dl.sourceforge.net * start date: Mar 5 00:00:00 2024 GMT * expire date: Jun 3 23:59:59 2024 GMT * subjectAltName: host "phoenixnap.dl.sourceforge.net" matched cert's "phoenixnap.dl.sourceforge.net" * issuer: C=AT; O=ZeroSSL; CN=ZeroSSL RSA Domain Secure Site CA * SSL certificate verify ok. * Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha384WithRSAEncryption * Certificate level 1: Public key type RSA (4096/152 Bits/secBits), signed using sha384WithRSAEncryption * Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha384WithRSAEncryption * using HTTP/1.x } [5 bytes data] > GET /project/webadmin/webmin/2.110/webmin-2.110.tar.gz?viasf=1 HTTP/1.1 > Host: phoenixnap.dl.sourceforge.net > User-Agent: curl/8.7.1 > Accept: */* > * Request completely sent off { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [297 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [297 bytes data] * old SSL session ID is stale, removing { [5 bytes data] < HTTP/1.1 200 OK < Server: nginx < Date: Mon, 06 May 2024 21:18:58 GMT < Content-Type: application/x-gzip < Content-Length: 46518197 < Connection: close < last-modified: Mon, 15 Apr 2024 17:31:33 GMT < etag: "661d6475-2c5cfb5" < X-Cache-Status: REVALIDATED < { [16133 bytes data] 100 44.3M 100 44.3M 0 0 3953k 0 0:00:11 0:00:11 --:--:-- 5690k * Closing connection { [5 bytes data] * TLSv1.3 (IN), TLS alert, close notify (256): { [2 bytes data]