I have a Direct admin environment from my hosting company, So I can change PHP versions (sorry I don’t really know more that this creates a linux environment, Can I find out what linux distribution it creates?
I think i don’t have a error.log? only tar.gz files?
PimsAirBCG021:~ p.zwager$ curl -vvvLk bcg.support
- Trying 195.211.74.101…
- TCP_NODELAY set
- Connected to bcg.support (195.211.74.101) port 80 (#0)
GET / HTTP/1.1
Host: bcg.support
User-Agent: curl/7.64.1
Accept: /
< HTTP/1.1 302 Found
< Date: Fri, 13 Mar 2020 13:15:25 GMT
< Server: Apache
< Expires: Thu, 19 Nov 1981 08:52:00 GMT
< Cache-Control: no-store, no-cache, must-revalidate
< Pragma: no-cache
< Content-Security-Policy: default-src ‘self’; script-src ‘self’ ‘unsafe-eval’; style-src ‘self’ ‘unsafe-inline’; img-src ‘self’;frame-src ‘self’;
< strict-transport-security: max-age=31536000; includeSubDomains
< x-permitted-cross-domain-policies: all
< referrer-policy: same-origin
< x-frame-options: sameorigin
< x-xss-protection: 1; mode=block
< x-download-options: noopen
< x-content-type-options: nosniff
< X-GPGAuth-Version: 1.3.0
< X-GPGAuth-Login-URL: /auth/login
< X-GPGAuth-Logout-URL: /auth/logout
< X-GPGAuth-Verify-URL: /auth/verify
< X-GPGAuth-Pubkey-URL: /auth/verify.json
< Access-Control-Expose-Headers: X-GPGAuth-Verify-Response, X-GPGAuth-Progress, X-GPGAuth-User-Auth-Token, X-GPGAuth-Authenticated, X-GPGAuth-Refer, X-GPGAuth-Debug, X-GPGAuth-Error, X-GPGAuth-Pubkey, X-GPGAuth-Logout-Url, X-GPGAuth-Version
< Set-Cookie: CAKEPHP=57f6f0748eea4915f2a0fffb61a38e77; path=/; HttpOnly
< Set-Cookie: csrfToken=dfa8dc62d7a7cd85da0c1a20f9a30fec175eb0fd0f4a1aedc42a984b02fb61883e341d8c27db1626076b8b33bd03a1286ddd3fce771a121257ab23af73e0990b; path=/
< Vary: User-Agent
< Upgrade: h2c
< Connection: Upgrade
< Location: Passbolt | Open source password manager for teams
< Content-Length: 0
< Content-Type: text/html; charset=UTF-8
<
- Connection #0 to host bcg.support left intact
- Issue another request to this URL: ‘Passbolt | Open source password manager for teams’
- Trying 195.211.74.101…
- TCP_NODELAY set
- Connected to bcg.support (195.211.74.101) port 443 (#1)
- ALPN, offering h2
- ALPN, offering http/1.1
- successfully set certificate verify locations:
- CAfile: /etc/ssl/cert.pem
CApath: none - TLSv1.2 (OUT), TLS handshake, Client hello (1):
- TLSv1.2 (IN), TLS handshake, Server hello (2):
- TLSv1.2 (IN), TLS handshake, Certificate (11):
- TLSv1.2 (IN), TLS handshake, Server key exchange (12):
- TLSv1.2 (IN), TLS handshake, Server finished (14):
- TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
- TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
- TLSv1.2 (OUT), TLS handshake, Finished (20):
- TLSv1.2 (IN), TLS change cipher, Change cipher spec (1):
- TLSv1.2 (IN), TLS handshake, Finished (20):
- SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
- ALPN, server accepted to use h2
- Server certificate:
- subject: CN=www.bcg.support
- start date: Feb 28 20:25:14 2020 GMT
- expire date: May 28 20:25:14 2020 GMT
- issuer: C=US; O=Let’s Encrypt; CN=Let’s Encrypt Authority X3
- SSL certificate verify ok.
- Using HTTP2, server supports multi-use
- Connection state changed (HTTP/2 confirmed)
- Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
- Using Stream ID: 1 (easy handle 0x7faa71004200)
GET /auth/login HTTP/2
Host: bcg.support
User-Agent: curl/7.64.1
Accept: /
- Connection state changed (MAX_CONCURRENT_STREAMS == 100)!
< HTTP/2 200
< date: Fri, 13 Mar 2020 13:15:25 GMT
< server: Apache
< expires: Thu, 19 Nov 1981 08:52:00 GMT
< cache-control: no-store, no-cache, must-revalidate
< pragma: no-cache
< content-security-policy: default-src ‘self’; script-src ‘self’ ‘unsafe-eval’; style-src ‘self’ ‘unsafe-inline’; img-src ‘self’;frame-src ‘self’;
< strict-transport-security: max-age=31536000; includeSubDomains
< x-permitted-cross-domain-policies: all
< referrer-policy: same-origin
< x-frame-options: sameorigin
< x-xss-protection: 1; mode=block
< x-download-options: noopen
< x-content-type-options: nosniff
< x-gpgauth-version: 1.3.0
< x-gpgauth-login-url: /auth/login
< x-gpgauth-logout-url: /auth/logout
< x-gpgauth-verify-url: /auth/verify
< x-gpgauth-pubkey-url: /auth/verify.json
< access-control-expose-headers: X-GPGAuth-Verify-Response, X-GPGAuth-Progress, X-GPGAuth-User-Auth-Token, X-GPGAuth-Authenticated, X-GPGAuth-Refer, X-GPGAuth-Debug, X-GPGAuth-Error, X-GPGAuth-Pubkey, X-GPGAuth-Logout-Url, X-GPGAuth-Version
< set-cookie: CAKEPHP=5ac47cd8e657d7f18f2a92bbcc18e230; path=/; secure; HttpOnly
< set-cookie: csrfToken=8f26e037cd0c358cbf27d872c43fcb9a3a19ab8036a1d694090a000fccc6c6e6b137c6eb934d16a51ac7bf434960a9d9619f2840ec3d0aa5382c19d6e7d52f9f; path=/
< vary: User-Agent,Accept-Encoding
< content-type: text/html; charset=UTF-8
<
Download firefox!
Passbolt is not available for your browser. Try with Mozilla Firefox .
Don't worry, we aim at enabling more browsers and phones in the future..
Passbolt
Passbolt Cloud
Get passbolt in the cloud, hosted on our secure servers, while keeping 100% data ownership.
Passbolt Pro
Passbolt Pro provides premium features, and our team will help you setup and support your install.
We ♥ open source
Passbolt is open source and respects your privacy. It uses OpenPGP.js, CanJS, Cakephp and many more! Get involved!