Is there any other way to get debug information for you guys?
With curl I get this:
* Host $FQDN:8006 was resolved.
* IPv6: (none)
* IPv4: $IP
* Trying $IP:8006...
* ALPN: curl offers h2,http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / x25519 / RSASSA-PSS
* ALPN: server did not agree on a protocol. Uses default.
* Server certificate:
* subject: OU=PVE Cluster Node; O=Proxmox Virtual Environment; CN=$FQDN
* start date: Aug 10 03:45:25 2023 GMT
* expire date: Aug 9 03:45:25 2025 GMT
* issuer: CN=Proxmox Virtual Environment; OU=21a8709b-5a31-4b7a-8bc4-063604cbc734; O=PVE Cluster Manager CA
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to $FQDN ($IP) port 8006
* using HTTP/1.x
> GET / HTTP/1.1
> Host: $FQDN:8006
> User-Agent: curl/8.12.1
> Accept: */*
>
* Request completely sent off
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
< HTTP/1.1 200 OK
< Cache-Control: max-age=0
< Connection: Keep-Alive
< Date: Tue, 18 Mar 2025 05:27:32 GMT
< Pragma: no-cache
< Server: pve-api-daemon/3.0
< Content-Length: 2165
< Content-Type: text/html; charset=utf-8
< Expires: Tue, 18 Mar 2025 05:27:32 GMT
<