@wfpeter ,
I’ve successfully received 301 responses when executing the curl commands a few times:
curl -v 'https://noc4.wordfence.com/?ticket=qtrinh2'
* Trying 35.83.41.128:443...
* Connected to noc4.wordfence.com (35.83.41.128) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* CAfile: /etc/pki/tls/certs/ca-bundle.crt
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS header, Certificate Status (22):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS header, Certificate Status (22):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS header, Certificate Status (22):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS header, Certificate Status (22):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS header, Finished (20):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS header, Finished (20):
* TLSv1.2 (IN), TLS header, Certificate Status (22):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use h2
* Server certificate:
* subject: CN=noc1.wordfence.com
* start date: Jun 12 00:00:00 2023 GMT
* expire date: Jul 10 23:59:59 2024 GMT
* subjectAltName: host "noc4.wordfence.com" matched cert's "noc4.wordfence.com"
* issuer: C=US; O=Amazon; CN=Amazon RSA 2048 M02
* SSL certificate verify ok.
* Using HTTP2, server supports multi-use
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Unknown (23):
* TLSv1.2 (OUT), TLS header, Unknown (23):
* TLSv1.2 (OUT), TLS header, Unknown (23):
* Using Stream ID: 1 (easy handle 0x55d9fab60900)
* TLSv1.2 (OUT), TLS header, Unknown (23):
> GET /?ticket=qtrinh2 HTTP/2
> Host: noc4.wordfence.com
> user-agent: curl/7.76.1
> accept: */*
>
* TLSv1.2 (IN), TLS header, Unknown (23):
* Connection state changed (MAX_CONCURRENT_STREAMS == 128)!
* TLSv1.2 (OUT), TLS header, Unknown (23):
* TLSv1.2 (IN), TLS header, Unknown (23):
* TLSv1.2 (IN), TLS header, Unknown (23):
< HTTP/2 301
< date: Tue, 20 Jun 2023 14:01:07 GMT
< content-type: text/html; charset=UTF-8
< server: nginx
< location: /v1.0/
< x-frame-options: SAMEORIGIN
< x-xss-protection: 1; mode=block
< x-content-type-options: nosniff
< strict-transport-security: max-age=31536000; includeSubDomains
<
* Connection #0 to host noc4.wordfence.com left intact
curl -I 'https://noc4.wordfence.com/?ticket=qtrinh2'
HTTP/2 301
date: Tue, 20 Jun 2023 14:03:07 GMT
content-type: text/html; charset=UTF-8
server: nginx
location: /v1.0/
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
x-content-type-options: nosniff
strict-transport-security: max-age=31536000; includeSubDomains
curl -I 'https://noc4.wordfence.com/?ticket=qtrinh2'
HTTP/2 301
date: Tue, 20 Jun 2023 14:05:05 GMT
content-type: text/html; charset=UTF-8
server: nginx
location: /v1.0/
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
x-content-type-options: nosniff
strict-transport-security: max-age=31536000; includeSubDomains
curl -I 'https://noc4.wordfence.com/?ticket=qtrinh2'
HTTP/2 301
date: Tue, 20 Jun 2023 14:10:05 GMT
content-type: text/html; charset=UTF-8
server: nginx
location: /v1.0/
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
x-content-type-options: nosniff
strict-transport-security: max-age=31536000; includeSubDomains
curl -I 'https://noc4.wordfence.com/?ticket=qtrinh2' -L
HTTP/2 301
date: Tue, 20 Jun 2023 14:20:07 GMT
content-type: text/html; charset=UTF-8
server: nginx
location: /v1.0/
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
x-content-type-options: nosniff
strict-transport-security: max-age=31536000; includeSubDomains
HTTP/2 200
date: Tue, 20 Jun 2023 14:20:07 GMT
content-type: application/json
server: nginx
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
x-content-type-options: nosniff
strict-transport-security: max-age=31536000; includeSubDomains
Would this mean I can rule out any firewall or network blocks?
-qtrinh2