Created
March 10, 2025 19:41
-
-
Save oluceps/8e144df23bf431fac129d20f641d0d72 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Mar 11 03:38:26 yidhra systemd[1]: Starting caddy.service... | |
Mar 11 03:38:26 yidhra caddy[48809]: {"level":"warn","ts":1741635506.7620099,"msg":"unable to determine directory for user configuration; falling back to current directory","error":"neither $XDG_CONFIG_HOME nor $HOME are defined"} | |
Mar 11 03:38:26 yidhra caddy[48809]: {"level":"info","ts":1741635506.7627752,"msg":"using config from file","file":"/etc/caddy/config.json"} | |
Mar 11 03:38:26 yidhra caddy[48809]: {"level":"info","ts":1741635506.7653472,"logger":"caddy.storage.s3","msg":"use secret_key and access_id for credentials"} | |
Mar 11 03:38:26 yidhra caddy[48809]: {"level":"info","ts":1741635506.7653472,"logger":"caddy.storage.s3","msg":"use secret_key and access_id for credentials"} | |
Mar 11 03:38:26 yidhra caddy[48809]: {"level":"info","ts":1741635506.766122,"logger":"tls.cache.maintenance","msg":"started background certificate maintenance","cache":"0xc00096a580"} | |
Mar 11 03:38:26 yidhra caddy[48809]: {"level":"info","ts":1741635506.766122,"logger":"tls.cache.maintenance","msg":"started background certificate maintenance","cache":"0xc00096a580"} | |
Mar 11 03:38:27 yidhra caddy[48809]: {"level":"debug","ts":1741635507.3779426,"logger":"caddy.storage.s3","msg":"Check exists: ssl/ech/configs/configs/key.bin, false"} | |
Mar 11 03:38:27 yidhra caddy[48809]: {"level":"debug","ts":1741635507.377972,"logger":"caddy.storage.s3","msg":"Delete key: ssl/ech/configs/configs"} | |
Mar 11 03:38:27 yidhra caddy[48809]: {"level":"warn","ts":1741635507.511985,"logger":"tls","msg":"could not load ECH private key; deleting its config folder","config_id":"configs","error":"file does not exist"} | |
Mar 11 03:38:27 yidhra caddy[48809]: {"level":"warn","ts":1741635507.511985,"logger":"tls","msg":"could not load ECH private key; deleting its config folder","config_id":"configs","error":"file does not exist"} | |
Mar 11 03:38:27 yidhra caddy[48809]: {"level":"debug","ts":1741635507.6020503,"logger":"caddy.storage.s3","msg":"Check exists: ssl/ech/configs/9, false"} | |
Mar 11 03:38:27 yidhra caddy[48809]: {"level":"debug","ts":1741635507.6021693,"logger":"caddy.storage.s3","msg":"Store: ssl/ech/configs/9/key.bin, 32 bytes"} | |
Mar 11 03:38:27 yidhra caddy[48809]: {"level":"debug","ts":1741635507.9942846,"logger":"caddy.storage.s3","msg":"Store: ssl/ech/configs/9/config.bin, 67 bytes"} | |
Mar 11 03:38:28 yidhra caddy[48809]: {"level":"debug","ts":1741635508.3532736,"logger":"caddy.storage.s3","msg":"Store: ssl/ech/configs/9/meta.json, 69 bytes"} | |
Mar 11 03:38:28 yidhra caddy[48809]: {"level":"debug","ts":1741635508.7828672,"logger":"tls.ech","msg":"generated new ECH config","public_name":"nyaw.xyz","id":9} | |
Mar 11 03:38:28 yidhra caddy[48809]: {"level":"info","ts":1741635508.7830198,"logger":"http.auto_https","msg":"enabling automatic HTTP->HTTPS redirects","server_name":"srv0"} | |
Mar 11 03:38:28 yidhra caddy[48809]: {"level":"info","ts":1741635508.7830198,"logger":"http.auto_https","msg":"enabling automatic HTTP->HTTPS redirects","server_name":"srv0"} | |
Mar 11 03:38:28 yidhra caddy[48809]: {"level":"debug","ts":1741635508.7830708,"logger":"http.auto_https","msg":"adjusted config","tls":{"automation":{"policies":[{"subjects":["*.nyaw.xyz","nyaw.xyz"]},{}]},"encrypted_client_hello":{"configs":[{"public_name":"nyaw.xyz"}]}},"http":{"grace_period":1000000000,"servers":{"remaining_auto_https_redirects":{"listen":[":80"],"routes":[{},{}]},"srv0":{"listen":[":443"],"routes":[{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:3001"}]}],"match":[{"path":["/share/*","/share"]}]},{"handle":[{"handler":"authentication","providers":{"http_basic":{"accounts":[{"password":"$2b$05$9CaXvrYtguDwi190/llO9.qytgqCyPp1wqyO0.umxsTEfKkhpwr4q","username":"immich"}]}}},{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:2283"}]}]}]}],"match":[{"host":["photo.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:9000"}]}]}]}],"match":[{"host":["s3.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:8003"}]}],"match":[{"host":["vault.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"rate_limit","log_key":true,"rate_limits":{"dynamic":{"key":"{http.request.remote.host}","max_events":5,"window":"5s"},"static":{"key":"static","match":[{"method":["GET"]}],"max_events":10,"window":"1m"}}},{"handler":"reverse_proxy","upstreams":[{"dial":"localhost:8004"}]}],"match":[{"host":["subs.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"reverse_proxy","headers":{"request":{"set":{"X-Scheme":["https"]}}},"upstreams":[{"dial":"[fdcc::3]:8083"}]}],"match":[{"host":["book.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:6167"}]}],"match":[{"path":["/_matrix/*"]}],"terminal":true}]},{"handler":"headers","response":{"set":{"Content-Security-Policy":["frame-ancestors 'self'"],"X-Content-Type-Options":["nosniff"],"X-Frame-Options":["SAMEORIGIN"],"X-XSS-Protection":["1; mode=block"]}}},{"handler":"file_server","root":"/nix/store/fvrmjnp9xcb6h825l4xvmil4xdv0cjjf-element-web-wrapped-1.11.91"}],"match":[{"host":["matrix.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::1]:5000"}]}]}]}],"match":[{"host":["cache.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:7700"}]}]}]}],"match":[{"host":["ms.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"rate_limit","log_key":true,"rate_limits":{"dynamic":{"key":"{http.request.remote.host}","max_events":5,"window":"5s"},"static":{"key":"static","match":[{"method":["GET"]}],"max_events":60,"window":"1m"}}},{"handler":"reverse_proxy","upstreams":[{"dial":"127.0.0.1:3999"}]}],"match":[{"host":["pb.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"static_response","headers":{"Location":["https://{http.request.host}{http.request.uri}"]},"status_code":302}],"match":[{"method":["GET"],"path_regexp":{"pattern":"^/([-_a-z0-9]{0,64}$|docs/|static/)"},"protocol":"http"}]},{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"127.0.0.1:2586"}]}]}]}],"match":[{"host":["ntfy.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:8084"}]}],"match":[{"host":["seed.nyaw.xyz"]}],"terminal":true}]}]},{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:8888"}]}],"terminal":true},{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"headers","response":{"set":{"Access-Control-Allow-Origin":["*"]}}}],"match":[{"path":["/.well-known/matrix/*"]}]},{"handle":[{"body":"{\"m.server\":\"matrix.nyaw.xyz:443\"}","handler":"static_response"}],"match":[{"path":["/.well-known/matrix/server"]}]},{"handle":[{"body":"{\"m.homeserver\":{\"base_url\":\"https://matrix.nyaw.xyz\"},\"m.server\":{\"base_url\":\"https://matrix.nyaw.xyz\"},\"org.matrix.msc3575.proxy\":{\"url\":\"https://matrix.nyaw.xyz\"}}","handler":"static_response"}],"match":[{"path":["/.well-known/matrix/client"]}]},{"handle":[{"handler":"reverse_proxy","transport":{"protocol":"http","tls":{"server_name":"nyaw.xyz"}},"upstreams":[{"dial":"[fdcc::3]:443"}]}]}]}],"terminal":true},{"handle":[{"handler":"authentication","providers":{"http_basic":{"accounts":[{"password":"$2b$05$9CaXvrYtguDwi190/llO9.qytgqCyPp1wqyO0.umxsTEfKkhpwr4q","username":"prometheus"}]}}},{"handler":"metrics"}]},{"handle":[{"handler":"authentication","providers":{"http_basic":{"accounts":[{"password":"$2b$05$9CaXvrYtguDwi190/llO9.qytgqCyPp1wqyO0.umxsTEfKkhpwr4q","username":"prometheus"}]}}},{"handler":"reverse_proxy","upstreams":[{"dial":"[::]:9100"}]}]},{"handle":[{"handler":"authentication","providers":{"http_basic":{"accounts":[{"password":"$2b$05$9CaXvrYtguDwi190/llO9.qytgqCyPp1wqyO0.umxsTEfKkhpwr4q","username":"prometheus"}]}}},{"handler":"reverse_proxy","upstreams":[{"dial":"[::]:9115"}]}]}],"tls_connection_policies":[{"match":{"sni":["*.nyaw.xyz","nyaw.xyz"]},"protocol_min":"tls1.3"}],"automatic_https":{"prefer_wildcard":true},"strict_sni_host":false,"metrics":{}}}}} | |
Mar 11 03:38:28 yidhra caddy[48809]: {"level":"warn","ts":1741635508.7833633,"logger":"http.log","msg":"per-server 'metrics' is deprecated; use 'metrics' in the root 'http' app instead"} | |
Mar 11 03:38:28 yidhra caddy[48809]: {"level":"warn","ts":1741635508.7833633,"logger":"http.log","msg":"per-server 'metrics' is deprecated; use 'metrics' in the root 'http' app instead"} | |
Mar 11 03:38:28 yidhra caddy[48809]: {"level":"info","ts":1741635508.785825,"logger":"tls.cache.maintenance","msg":"stopped background certificate maintenance","cache":"0xc00096a580"} | |
Mar 11 03:38:28 yidhra caddy[48809]: {"level":"info","ts":1741635508.785825,"logger":"tls.cache.maintenance","msg":"stopped background certificate maintenance","cache":"0xc00096a580"} | |
Mar 11 03:38:28 yidhra caddy[48809]: Valid configuration | |
Mar 11 03:38:28 yidhra caddy[48818]: {"level":"warn","ts":1741635508.8684464,"msg":"unable to determine directory for user configuration; falling back to current directory","error":"neither $XDG_CONFIG_HOME nor $HOME are defined"} | |
Mar 11 03:38:28 yidhra caddy[48818]: {"level":"info","ts":1741635508.8698742,"msg":"maxprocs: Leaving GOMAXPROCS=2: CPU quota undefined"} | |
Mar 11 03:38:28 yidhra caddy[48818]: {"level":"info","ts":1741635508.8701744,"msg":"GOMEMLIMIT is updated","package":"github.com/KimMachineGun/automemlimit/memlimit","GOMEMLIMIT":1783926374,"previous":9223372036854775807} | |
Mar 11 03:38:28 yidhra caddy[48818]: {"level":"info","ts":1741635508.8702478,"msg":"using config from file","file":"/etc/caddy/config.json"} | |
Mar 11 03:38:28 yidhra caddy[48818]: {"level":"info","ts":1741635508.8743832,"logger":"admin","msg":"admin endpoint started","address":"localhost:2019","enforce_origin":false,"origins":["//localhost:2019","//[::1]:2019","//127.0.0.1:2019"]} | |
Mar 11 03:38:28 yidhra caddy[48818]: {"level":"info","ts":1741635508.874492,"logger":"caddy.storage.s3","msg":"use secret_key and access_id for credentials"} | |
Mar 11 03:38:28 yidhra caddy[48818]: {"level":"info","ts":1741635508.874492,"logger":"caddy.storage.s3","msg":"use secret_key and access_id for credentials"} | |
Mar 11 03:38:28 yidhra caddy[48818]: {"level":"info","ts":1741635508.8751109,"logger":"tls.cache.maintenance","msg":"started background certificate maintenance","cache":"0xc0000c0400"} | |
Mar 11 03:38:28 yidhra caddy[48818]: {"level":"info","ts":1741635508.8751109,"logger":"tls.cache.maintenance","msg":"started background certificate maintenance","cache":"0xc0000c0400"} | |
Mar 11 03:38:29 yidhra caddy[48818]: {"level":"debug","ts":1741635509.4498255,"logger":"caddy.storage.s3","msg":"Check exists: ssl/ech/configs/configs/key.bin, false"} | |
Mar 11 03:38:29 yidhra caddy[48818]: {"level":"debug","ts":1741635509.4498522,"logger":"caddy.storage.s3","msg":"Delete key: ssl/ech/configs/configs"} | |
Mar 11 03:38:29 yidhra caddy[48818]: {"level":"warn","ts":1741635509.5723755,"logger":"tls","msg":"could not load ECH private key; deleting its config folder","config_id":"configs","error":"file does not exist"} | |
Mar 11 03:38:29 yidhra caddy[48818]: {"level":"warn","ts":1741635509.5723755,"logger":"tls","msg":"could not load ECH private key; deleting its config folder","config_id":"configs","error":"file does not exist"} | |
Mar 11 03:38:29 yidhra caddy[48818]: {"level":"debug","ts":1741635509.6535277,"logger":"caddy.storage.s3","msg":"Check exists: ssl/ech/configs/24, false"} | |
Mar 11 03:38:29 yidhra caddy[48818]: {"level":"debug","ts":1741635509.6536324,"logger":"caddy.storage.s3","msg":"Store: ssl/ech/configs/24/key.bin, 32 bytes"} | |
Mar 11 03:38:29 yidhra caddy[48818]: {"level":"debug","ts":1741635509.8875723,"logger":"caddy.storage.s3","msg":"Store: ssl/ech/configs/24/config.bin, 67 bytes"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"debug","ts":1741635510.2930202,"logger":"caddy.storage.s3","msg":"Store: ssl/ech/configs/24/meta.json, 68 bytes"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"debug","ts":1741635510.5686944,"logger":"tls.ech","msg":"generated new ECH config","public_name":"nyaw.xyz","id":24} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"info","ts":1741635510.5688615,"logger":"http.auto_https","msg":"enabling automatic HTTP->HTTPS redirects","server_name":"srv0"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"info","ts":1741635510.5688615,"logger":"http.auto_https","msg":"enabling automatic HTTP->HTTPS redirects","server_name":"srv0"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"debug","ts":1741635510.568971,"logger":"http.auto_https","msg":"adjusted config","tls":{"automation":{"policies":[{"subjects":["*.nyaw.xyz","nyaw.xyz"]},{}]},"encrypted_client_hello":{"configs":[{"public_name":"nyaw.xyz"}]}},"http":{"grace_period":1000000000,"servers":{"remaining_auto_https_redirects":{"listen":[":80"],"routes":[{},{}]},"srv0":{"listen":[":443"],"routes":[{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:3001"}]}],"match":[{"path":["/share/*","/share"]}]},{"handle":[{"handler":"authentication","providers":{"http_basic":{"accounts":[{"password":"$2b$05$9CaXvrYtguDwi190/llO9.qytgqCyPp1wqyO0.umxsTEfKkhpwr4q","username":"immich"}]}}},{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:2283"}]}]}]}],"match":[{"host":["photo.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:9000"}]}]}]}],"match":[{"host":["s3.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:8003"}]}],"match":[{"host":["vault.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"rate_limit","log_key":true,"rate_limits":{"dynamic":{"key":"{http.request.remote.host}","max_events":5,"window":"5s"},"static":{"key":"static","match":[{"method":["GET"]}],"max_events":10,"window":"1m"}}},{"handler":"reverse_proxy","upstreams":[{"dial":"localhost:8004"}]}],"match":[{"host":["subs.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"reverse_proxy","headers":{"request":{"set":{"X-Scheme":["https"]}}},"upstreams":[{"dial":"[fdcc::3]:8083"}]}],"match":[{"host":["book.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:6167"}]}],"match":[{"path":["/_matrix/*"]}],"terminal":true}]},{"handler":"headers","response":{"set":{"Content-Security-Policy":["frame-ancestors 'self'"],"X-Content-Type-Options":["nosniff"],"X-Frame-Options":["SAMEORIGIN"],"X-XSS-Protection":["1; mode=block"]}}},{"handler":"file_server","root":"/nix/store/fvrmjnp9xcb6h825l4xvmil4xdv0cjjf-element-web-wrapped-1.11.91"}],"match":[{"host":["matrix.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::1]:5000"}]}]}]}],"match":[{"host":["cache.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:7700"}]}]}]}],"match":[{"host":["ms.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"rate_limit","log_key":true,"rate_limits":{"dynamic":{"key":"{http.request.remote.host}","max_events":5,"window":"5s"},"static":{"key":"static","match":[{"method":["GET"]}],"max_events":60,"window":"1m"}}},{"handler":"reverse_proxy","upstreams":[{"dial":"127.0.0.1:3999"}]}],"match":[{"host":["pb.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"static_response","headers":{"Location":["https://{http.request.host}{http.request.uri}"]},"status_code":302}],"match":[{"method":["GET"],"path_regexp":{"pattern":"^/([-_a-z0-9]{0,64}$|docs/|static/)"},"protocol":"http"}]},{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"127.0.0.1:2586"}]}]}]}],"match":[{"host":["ntfy.nyaw.xyz"]}],"terminal":true},{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:8084"}]}],"match":[{"host":["seed.nyaw.xyz"]}],"terminal":true}]}]},{"handle":[{"handler":"reverse_proxy","upstreams":[{"dial":"[fdcc::3]:8888"}]}],"terminal":true},{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"headers","response":{"set":{"Access-Control-Allow-Origin":["*"]}}}],"match":[{"path":["/.well-known/matrix/*"]}]},{"handle":[{"body":"{\"m.server\":\"matrix.nyaw.xyz:443\"}","handler":"static_response"}],"match":[{"path":["/.well-known/matrix/server"]}]},{"handle":[{"body":"{\"m.homeserver\":{\"base_url\":\"https://matrix.nyaw.xyz\"},\"m.server\":{\"base_url\":\"https://matrix.nyaw.xyz\"},\"org.matrix.msc3575.proxy\":{\"url\":\"https://matrix.nyaw.xyz\"}}","handler":"static_response"}],"match":[{"path":["/.well-known/matrix/client"]}]},{"handle":[{"handler":"reverse_proxy","transport":{"protocol":"http","tls":{"server_name":"nyaw.xyz"}},"upstreams":[{"dial":"[fdcc::3]:443"}]}]}]}],"terminal":true},{"handle":[{"handler":"authentication","providers":{"http_basic":{"accounts":[{"password":"$2b$05$9CaXvrYtguDwi190/llO9.qytgqCyPp1wqyO0.umxsTEfKkhpwr4q","username":"prometheus"}]}}},{"handler":"metrics"}]},{"handle":[{"handler":"authentication","providers":{"http_basic":{"accounts":[{"password":"$2b$05$9CaXvrYtguDwi190/llO9.qytgqCyPp1wqyO0.umxsTEfKkhpwr4q","username":"prometheus"}]}}},{"handler":"reverse_proxy","upstreams":[{"dial":"[::]:9100"}]}]},{"handle":[{"handler":"authentication","providers":{"http_basic":{"accounts":[{"password":"$2b$05$9CaXvrYtguDwi190/llO9.qytgqCyPp1wqyO0.umxsTEfKkhpwr4q","username":"prometheus"}]}}},{"handler":"reverse_proxy","upstreams":[{"dial":"[::]:9115"}]}]}],"tls_connection_policies":[{"match":{"sni":["*.nyaw.xyz","nyaw.xyz"]},"protocol_min":"tls1.3"}],"automatic_https":{"prefer_wildcard":true},"strict_sni_host":false,"metrics":{}}}}} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"warn","ts":1741635510.5691183,"logger":"http.log","msg":"per-server 'metrics' is deprecated; use 'metrics' in the root 'http' app instead"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"warn","ts":1741635510.5691183,"logger":"http.log","msg":"per-server 'metrics' is deprecated; use 'metrics' in the root 'http' app instead"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"debug","ts":1741635510.5716345,"logger":"http","msg":"starting server loop","address":"[::]:443","tls":true,"http3":false} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"info","ts":1741635510.5716624,"logger":"http","msg":"enabling HTTP/3 listener","addr":":443"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"info","ts":1741635510.5716624,"logger":"http","msg":"enabling HTTP/3 listener","addr":":443"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"info","ts":1741635510.5718317,"logger":"http.log","msg":"server running","name":"srv0","protocols":["h1","h2","h3"]} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"info","ts":1741635510.5718317,"logger":"http.log","msg":"server running","name":"srv0","protocols":["h1","h2","h3"]} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"debug","ts":1741635510.5718935,"logger":"http","msg":"starting server loop","address":"[::]:80","tls":false,"http3":false} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"warn","ts":1741635510.5719,"logger":"http","msg":"HTTP/2 skipped because it requires TLS","network":"tcp","addr":":80"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"warn","ts":1741635510.5719,"logger":"http","msg":"HTTP/2 skipped because it requires TLS","network":"tcp","addr":":80"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"warn","ts":1741635510.5719092,"logger":"http","msg":"HTTP/3 skipped because it requires TLS","network":"tcp","addr":":80"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"warn","ts":1741635510.5719092,"logger":"http","msg":"HTTP/3 skipped because it requires TLS","network":"tcp","addr":":80"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"info","ts":1741635510.5719168,"logger":"http.log","msg":"server running","name":"remaining_auto_https_redirects","protocols":["h1","h2","h3"]} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"info","ts":1741635510.5719168,"logger":"http.log","msg":"server running","name":"remaining_auto_https_redirects","protocols":["h1","h2","h3"]} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"info","ts":1741635510.5719247,"logger":"http","msg":"enabling automatic TLS certificate management","domains":["*.nyaw.xyz","api.atuin.nyaw.xyz","nyaw.xyz"]} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"info","ts":1741635510.5719247,"logger":"http","msg":"enabling automatic TLS certificate management","domains":["*.nyaw.xyz","api.atuin.nyaw.xyz","nyaw.xyz"]} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"debug","ts":1741635510.6601639,"logger":"caddy.storage.s3","msg":"Check exists: ssl/certificates/acme-v02.api.letsencrypt.org-directory/wildcard_.nyaw.xyz/wildcard_.nyaw.xyz.key, true"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"debug","ts":1741635510.6601906,"logger":"caddy.storage.s3","msg":"Load key: ssl/certificates/acme-v02.api.letsencrypt.org-directory/wildcard_.nyaw.xyz/wildcard_.nyaw.xyz.key"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"debug","ts":1741635510.8473957,"logger":"caddy.storage.s3","msg":"Check exists: ssl/certificates/acme-v02.api.letsencrypt.org-directory/wildcard_.nyaw.xyz/wildcard_.nyaw.xyz.crt, true"} | |
Mar 11 03:38:30 yidhra caddy[48818]: {"level":"debug","ts":1741635510.8474216,"logger":"caddy.storage.s3","msg":"Load key: ssl/certificates/acme-v02.api.letsencrypt.org-directory/wildcard_.nyaw.xyz/wildcard_.nyaw.xyz.crt"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.0250037,"logger":"caddy.storage.s3","msg":"Check exists: ssl/certificates/acme-v02.api.letsencrypt.org-directory/wildcard_.nyaw.xyz/wildcard_.nyaw.xyz.json, true"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.0250297,"logger":"caddy.storage.s3","msg":"Load key: ssl/certificates/acme-v02.api.letsencrypt.org-directory/wildcard_.nyaw.xyz/wildcard_.nyaw.xyz.json"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.2031717,"logger":"caddy.storage.s3","msg":"Check exists: ssl/ocsp/wildcard_.nyaw.xyz-154d0a2f, true"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.2031972,"logger":"caddy.storage.s3","msg":"Load key: ssl/ocsp/wildcard_.nyaw.xyz-154d0a2f"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.287216,"logger":"tls.cache","msg":"added certificate to cache","subjects":["*.nyaw.xyz"],"expiration":1749225035,"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5","cache_size":1,"cache_capacity":10000} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.2872622,"logger":"events","msg":"event","name":"cached_managed_cert","id":"93dc64cc-d8f0-4ccf-b6c5-b5debf2989b6","origin":"tls","data":{"sans":["*.nyaw.xyz"]}} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.3788588,"logger":"caddy.storage.s3","msg":"Check exists: ssl/certificates/acme-v02.api.letsencrypt.org-directory/nyaw.xyz/nyaw.xyz.key, true"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.378884,"logger":"caddy.storage.s3","msg":"Load key: ssl/certificates/acme-v02.api.letsencrypt.org-directory/nyaw.xyz/nyaw.xyz.key"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.5452957,"logger":"caddy.storage.s3","msg":"Check exists: ssl/certificates/acme-v02.api.letsencrypt.org-directory/nyaw.xyz/nyaw.xyz.crt, true"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.5453374,"logger":"caddy.storage.s3","msg":"Load key: ssl/certificates/acme-v02.api.letsencrypt.org-directory/nyaw.xyz/nyaw.xyz.crt"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.7361653,"logger":"caddy.storage.s3","msg":"Check exists: ssl/certificates/acme-v02.api.letsencrypt.org-directory/nyaw.xyz/nyaw.xyz.json, true"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.7361975,"logger":"caddy.storage.s3","msg":"Load key: ssl/certificates/acme-v02.api.letsencrypt.org-directory/nyaw.xyz/nyaw.xyz.json"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.7604532,"logger":"events","msg":"event","name":"tls_get_certificate","id":"717c9c0a-b379-4a55-b70e-ca2fd26c567b","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":37178,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.7605581,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.760567,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.760574,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.760584,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"37178","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.9037147,"logger":"caddy.storage.s3","msg":"Check exists: ssl/ocsp/nyaw.xyz-49019f84, true"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.9037402,"logger":"caddy.storage.s3","msg":"Load key: ssl/ocsp/nyaw.xyz-49019f84"} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.922445,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.9957693,"logger":"tls.cache","msg":"added certificate to cache","subjects":["nyaw.xyz"],"expiration":1749225035,"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"1a8935862ac1ecb6163d6c499e62ab4e447bc76c716491b0400973ee9554957f","cache_size":2,"cache_capacity":10000} | |
Mar 11 03:38:31 yidhra caddy[48818]: {"level":"debug","ts":1741635511.9958136,"logger":"events","msg":"event","name":"cached_managed_cert","id":"a7734633-6837-4edd-8939-54af03e09634","origin":"tls","data":{"sans":["nyaw.xyz"]}} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.071865,"logger":"caddy.storage.s3","msg":"Check exists: ssl/certificates/acme-v02.api.letsencrypt.org-directory/api.atuin.nyaw.xyz/api.atuin.nyaw.xyz.key, true"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.0718896,"logger":"caddy.storage.s3","msg":"Load key: ssl/certificates/acme-v02.api.letsencrypt.org-directory/api.atuin.nyaw.xyz/api.atuin.nyaw.xyz.key"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.167495,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.244985297,"request":{"remote_ip":"<REDACTED>","remote_port":"37178","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1741164449443","headers":{"Authorization":["REDACTED"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"Content-Length":["205"],"User-Agent":["Synapse/1.125.0"],"Content-Type":["application/json"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Frame-Options":["DENY"],"X-Xss-Protection":["0"],"Date":["Mon, 10 Mar 2025 19:38:32 GMT"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"X-Content-Type-Options":["nosniff"],"Origin-Agent-Cluster":["?1"]},"status":200} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.2430758,"logger":"caddy.storage.s3","msg":"Check exists: ssl/certificates/acme-v02.api.letsencrypt.org-directory/api.atuin.nyaw.xyz/api.atuin.nyaw.xyz.crt, true"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.2431245,"logger":"caddy.storage.s3","msg":"Load key: ssl/certificates/acme-v02.api.letsencrypt.org-directory/api.atuin.nyaw.xyz/api.atuin.nyaw.xyz.crt"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.4230363,"logger":"caddy.storage.s3","msg":"Check exists: ssl/certificates/acme-v02.api.letsencrypt.org-directory/api.atuin.nyaw.xyz/api.atuin.nyaw.xyz.json, true"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.4230623,"logger":"caddy.storage.s3","msg":"Load key: ssl/certificates/acme-v02.api.letsencrypt.org-directory/api.atuin.nyaw.xyz/api.atuin.nyaw.xyz.json"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.6428485,"logger":"caddy.storage.s3","msg":"Check exists: ssl/ocsp/api.atuin.nyaw.xyz-f5936160, true"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.642878,"logger":"caddy.storage.s3","msg":"Load key: ssl/ocsp/api.atuin.nyaw.xyz-f5936160"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.7320962,"logger":"tls.cache","msg":"added certificate to cache","subjects":["api.atuin.nyaw.xyz"],"expiration":1749225024,"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"2cfee38f9d5cb174af6b6aa3daffe770108b769f6076ab8c3396700f8cbd91d2","cache_size":3,"cache_capacity":10000} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.732147,"logger":"events","msg":"event","name":"cached_managed_cert","id":"d2de9030-7d8e-4cae-81d6-c4d8d2f196b3","origin":"tls","data":{"sans":["api.atuin.nyaw.xyz"]}} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.732365,"logger":"tls.ech","msg":"publishing ECH config list","domains":["*.nyaw.xyz","api.atuin.nyaw.xyz","nyaw.xyz"],"config_ids":[24]} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"info","ts":1741635512.732422,"msg":"serving initial configuration"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"warn","ts":1741635512.732432,"msg":"$HOME environment variable is empty - please fix; some assets might be stored in ./caddy"} | |
Mar 11 03:38:32 yidhra systemd[1]: Started caddy.service. | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.7332916,"logger":"tls.soa_lookup","msg":"fetched SOA","msg":";; opcode: QUERY, status: NOERROR, id: 23680\n;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1\n\n;; OPT PSEUDOSECTION:\n; EDNS: version 0; flags:; udp: 1232\n\n;; QUESTION SECTION:\n;*.nyaw.xyz.\tIN\t SOA\n\n;; AUTHORITY SECTION:\nnyaw.xyz.\t1084\tIN\tSOA\tlaila.ns.cloudflare.com. dns.cloudflare.com. 2367108763 10000 2400 604800 1800\n"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.7338092,"logger":"tls.soa_lookup","msg":"fetched SOA","msg":";; opcode: QUERY, status: NOERROR, id: 62369\n;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1\n\n;; OPT PSEUDOSECTION:\n; EDNS: version 0; flags:; udp: 1232\n\n;; QUESTION SECTION:\n;nyaw.xyz.\tIN\t SOA\n\n;; ANSWER SECTION:\nnyaw.xyz.\t1078\tIN\tSOA\tlaila.ns.cloudflare.com. dns.cloudflare.com. 2367108763 10000 2400 604800 1800\n"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.8073344,"logger":"caddy.storage.s3","msg":"Check exists: ssl/last_clean.json, true"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.807356,"logger":"caddy.storage.s3","msg":"Load key: ssl/last_clean.json"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"info","ts":1741635512.8902738,"logger":"tls","msg":"storage cleaning happened too recently; skipping for now","storage":"S3 Storage Host: ad73318a13b24f38bd07b54222ad9e02.r2.cloudflarestorage.com, Bucket: cert, Prefix: ssl","instance":"48d61c42-f78e-4448-be9d-59410408bac0","try_again":1741721912.8902717,"try_again_in":86399.999999589} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"info","ts":1741635512.8902738,"logger":"tls","msg":"storage cleaning happened too recently; skipping for now","storage":"S3 Storage Host: ad73318a13b24f38bd07b54222ad9e02.r2.cloudflarestorage.com, Bucket: cert, Prefix: ssl","instance":"48d61c42-f78e-4448-be9d-59410408bac0","try_again":1741721912.8902717,"try_again_in":86399.999999589} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"info","ts":1741635512.8903043,"logger":"tls","msg":"finished cleaning storage units"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"info","ts":1741635512.8903043,"logger":"tls","msg":"finished cleaning storage units"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.9701748,"logger":"events","msg":"event","name":"tls_get_certificate","id":"cf0bbb7f-b0fb-49a8-90bd-f3fcd5b3fa20","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":56264,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.9702332,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.9702432,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.970251,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:32 yidhra caddy[48818]: {"level":"debug","ts":1741635512.9702594,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"56264","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:33 yidhra caddy[48818]: {"level":"debug","ts":1741635513.2007594,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:33 yidhra caddy[48818]: {"level":"debug","ts":1741635513.512987,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.31214726,"request":{"remote_ip":"<REDACTED>","remote_port":"56264","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1740186115706","headers":{"Authorization":["REDACTED"],"Content-Length":["225"],"User-Agent":["Synapse/1.123.0"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"Content-Type":["application/json"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"Content-Type":["application/json"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Date":["Mon, 10 Mar 2025 19:38:33 GMT"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"X-Frame-Options":["DENY"],"Origin-Agent-Cluster":["?1"]},"status":200} | |
Mar 11 03:38:33 yidhra caddy[48818]: {"level":"debug","ts":1741635513.659623,"logger":"events","msg":"event","name":"tls_get_certificate","id":"30be4fc7-2e5f-4b4d-a6cf-ace8f97f5871","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":59150,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:33 yidhra caddy[48818]: {"level":"debug","ts":1741635513.659686,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:33 yidhra caddy[48818]: {"level":"debug","ts":1741635513.6596944,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:33 yidhra caddy[48818]: {"level":"debug","ts":1741635513.6597002,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:33 yidhra caddy[48818]: {"level":"debug","ts":1741635513.6597097,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"59150","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:33 yidhra caddy[48818]: {"level":"debug","ts":1741635513.9709003,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.0581312,"logger":"events","msg":"event","name":"tls_get_certificate","id":"53b42ac4-6341-4512-af26-f72a32904f28","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":53750,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.0581944,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.0582073,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.0582137,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.058222,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"53750","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.2201686,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.2418435,"logger":"tls.soa_lookup","msg":"fetched SOA","msg":";; opcode: QUERY, status: NOERROR, id: 21633\n;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1\n\n;; OPT PSEUDOSECTION:\n; EDNS: version 0; flags:; udp: 1232\n\n;; QUESTION SECTION:\n;api.atuin.nyaw.xyz.\tIN\t SOA\n\n;; AUTHORITY SECTION:\nnyaw.xyz.\t1076\tIN\tSOA\tlaila.ns.cloudflare.com. dns.cloudflare.com. 2367108763 10000 2400 604800 1800\n"} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.2420695,"logger":"tls.soa_lookup","msg":"fetched SOA","msg":";; opcode: QUERY, status: NOERROR, id: 47379\n;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1\n\n;; OPT PSEUDOSECTION:\n; EDNS: version 0; flags:; udp: 1232\n\n;; QUESTION SECTION:\n;atuin.nyaw.xyz.\tIN\t SOA\n\n;; AUTHORITY SECTION:\nnyaw.xyz.\t1076\tIN\tSOA\tlaila.ns.cloudflare.com. dns.cloudflare.com. 2367108763 10000 2400 604800 1800\n"} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.2423453,"logger":"tls.soa_lookup","msg":"fetched SOA","msg":";; opcode: QUERY, status: NOERROR, id: 41710\n;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1\n\n;; OPT PSEUDOSECTION:\n; EDNS: version 0; flags:; udp: 1232\n\n;; QUESTION SECTION:\n;nyaw.xyz.\tIN\t SOA\n\n;; ANSWER SECTION:\nnyaw.xyz.\t1076\tIN\tSOA\tlaila.ns.cloudflare.com. dns.cloudflare.com. 2367108763 10000 2400 604800 1800\n"} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.3574724,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.386502832,"request":{"remote_ip":"<REDACTED>","remote_port":"59150","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1731873396775","headers":{"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"Content-Length":["202"],"User-Agent":["Synapse/1.119.0"],"Content-Type":["application/json"],"Authorization":["REDACTED"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"Content-Type":["application/json"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Origin-Agent-Cluster":["?1"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Access-Control-Allow-Origin":["*"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Frame-Options":["DENY"],"Date":["Mon, 10 Mar 2025 19:38:33 GMT"]},"status":200} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.4644933,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.244258924,"request":{"remote_ip":"<REDACTED>","remote_port":"53750","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1741212774716","headers":{"Content-Type":["application/json"],"Authorization":["REDACTED"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"Content-Length":["238"],"User-Agent":["Synapse/1.125.0"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"X-Content-Type-Options":["nosniff"],"Origin-Agent-Cluster":["?1"],"Date":["Mon, 10 Mar 2025 19:38:34 GMT"],"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Frame-Options":["DENY"],"Access-Control-Allow-Origin":["*"],"X-Xss-Protection":["0"]},"status":200} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.9192884,"logger":"events","msg":"event","name":"tls_get_certificate","id":"7721f77b-0ce0-41ca-8c10-aa82c8efee80","origin":"tls","data":{"client_hello":{"CipherSuites":[49195,49199,49196,49200,52393,52392,49161,49171,49162,49172,49170,4865,4866,4867],"ServerName":"vault.nyaw.xyz","SupportedCurves":[29,23,24,25],"SupportedPoints":"AA==","SignatureSchemes":[2052,1027,2055,2053,2054,1025,1281,1537,1283,1539,513,515],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":57788,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.9193661,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"vault.nyaw.xyz"} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.9193776,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.9193833,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.9193914,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"57788","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:34 yidhra caddy[48818]: {"level":"debug","ts":1741635514.9803622,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:8003","total_upstreams":1} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.0684557,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:8003","duration":0.088027078,"request":{"remote_ip":"<REDACTED>","remote_port":"57788","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"GET","host":"vault.nyaw.xyz","uri":"/","headers":{"User-Agent":["Blackbox Exporter/0.26.0"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["vault.nyaw.xyz"],"Via":["2.0 Caddy"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"vault.nyaw.xyz"}},"headers":{"Permissions-Policy":["accelerometer=(), ambient-light-sensor=(), autoplay=(), battery=(), camera=(), display-capture=(), document-domain=(), encrypted-media=(), execution-while-not-rendered=(), execution-while-out-of-viewport=(), fullscreen=(), geolocation=(), gyroscope=(), keyboard-map=(), magnetometer=(), microphone=(), midi=(), payment=(), picture-in-picture=(), screen-wake-lock=(), sync-xhr=(), usb=(), web-share=(), xr-spatial-tracking=()"],"X-Frame-Options":["SAMEORIGIN"],"X-Robots-Tag":["noindex, nofollow"],"Cross-Origin-Resource-Policy":["same-origin"],"Content-Security-Policy":["default-src 'none'; font-src 'self'; manifest-src 'self'; base-uri 'self'; form-action 'self'; object-src 'self' blob:; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-ancestors 'self' chrome-extension://nngceckbapebfimnlniiiahkandclblb chrome-extension://jbkfoedolllekgbhcbcoahefnbanhhlh moz-extension://* ; img-src 'self' data: https://haveibeenpwned.com ; connect-src 'self' https://api.pwnedpasswords.com https://api.2fa.directory https://app.simplelogin.io/api/ https://app.addy.io/api/ https://api.fastmail.com/ https://api.forwardemail.net ;"],"Content-Length":["1347"],"Content-Type":["text/html; charset=utf-8"],"Cache-Control":["public, max-age=600"],"Server":["Rocket"],"X-Content-Type-Options":["nosniff"],"Referrer-Policy":["same-origin"],"X-Xss-Protection":["0"],"Date":["Mon, 10 Mar 2025 19:38:35 GMT"],"Expires":["Mon, 10 Mar 2025 19:48:35 GMT"]},"status":200} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.1599948,"logger":"tls.soa_lookup","msg":"fetched SOA","msg":";; opcode: QUERY, status: NOERROR, id: 601\n;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1\n\n;; OPT PSEUDOSECTION:\n; EDNS: version 0; flags:; udp: 1232\n\n;; QUESTION SECTION:\n;nyaw.xyz.\tIN\t SOA\n\n;; ANSWER SECTION:\nnyaw.xyz.\t1075\tIN\tSOA\tlaila.ns.cloudflare.com. dns.cloudflare.com. 2367108763 10000 2400 604800 1800\n"} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.3679688,"logger":"events","msg":"event","name":"tls_get_certificate","id":"f2442fb2-2b4c-40e4-86ab-f8fad432f44e","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":49716,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.3680313,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.3680394,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.3680456,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.3680556,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"49716","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.652974,"logger":"events","msg":"event","name":"tls_get_certificate","id":"b541d39a-ea09-4633-b3c7-12883201b311","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4865,4867,49196,49195,52393,49200,49199,52392,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,24],"SupportedPoints":"AA==","SignatureSchemes":[1283,1027,2055,2054,2053,2052,1537,1281,1025],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":38722,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.6530375,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.6530454,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.6530511,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.6530612,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"38722","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.6665568,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.6911178,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.71067,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.044036806,"request":{"remote_ip":"<REDACTED>","remote_port":"38722","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"PUT","host":"matrix.nyaw.xyz","uri":"/_matrix/federation/v1/send/47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU","headers":{"X-Forwarded-For":["<REDACTED>"],"Accept":["*/*"],"Content-Length":["62"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz"],"Via":["2.0 Caddy"],"Content-Type":["application/json"],"Authorization":["REDACTED"],"User-Agent":["Conduwuit/0.5.0 (01d2aee)"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"matrix.nyaw.xyz"}},"headers":{"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Frame-Options":["DENY"],"Access-Control-Allow-Origin":["*"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Origin-Agent-Cluster":["?1"],"Date":["Mon, 10 Mar 2025 19:38:35 GMT"],"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"]},"status":200} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"error","ts":1741635515.9315786,"logger":"tls","msg":"unable to publish ECH data to HTTPS DNS record","domain":"nyaw.xyz","error":"got error status: HTTP 400: [{Code:9000 Message:DNS name is invalid. ErrorChain:[]}]"} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"error","ts":1741635515.9315786,"logger":"tls","msg":"unable to publish ECH data to HTTPS DNS record","domain":"nyaw.xyz","error":"got error status: HTTP 400: [{Code:9000 Message:DNS name is invalid. ErrorChain:[]}]"} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.9316323,"logger":"caddy.storage.s3","msg":"Store: ssl/ech/configs/24/meta.json, 253 bytes"} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.996368,"logger":"events","msg":"event","name":"tls_get_certificate","id":"57e17266-9cf5-4a01-ba76-73a8af4e9dc4","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,159,52393,52392,52394,49195,49199,158,49188,49192,107,49187,49191,103,49162,49172,57,49161,49171,51,157,156,61,60,53,47,255],"ServerName":"nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771,770,769],"RemoteAddr":{"IP":"<REDACTED>","Port":39120,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.996446,"logger":"tls.handshake","msg":"choosing certificate","identifier":"nyaw.xyz","num_choices":1} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.996454,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"nyaw.xyz","subjects":["nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"1a8935862ac1ecb6163d6c499e62ab4e447bc76c716491b0400973ee9554957f"} | |
Mar 11 03:38:35 yidhra caddy[48818]: {"level":"debug","ts":1741635515.9964633,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"39120","subjects":["nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"1a8935862ac1ecb6163d6c499e62ab4e447bc76c716491b0400973ee9554957f"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.0690057,"logger":"events","msg":"event","name":"tls_get_certificate","id":"f5d6826c-2321-4dbe-8b52-59f1d1fa8fce","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4865,4867,49196,49195,52393,49200,49199,52392,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,24],"SupportedPoints":"AA==","SignatureSchemes":[1283,1027,2055,2054,2053,2052,1537,1281,1025],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":56990,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.0690682,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.0690827,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.069095,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.0691025,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"56990","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.0965235,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.405349378,"request":{"remote_ip":"<REDACTED>","remote_port":"49716","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1740942565056","headers":{"Via":["1.1 Caddy"],"Content-Length":["258"],"User-Agent":["Synapse/1.125.0"],"Content-Type":["application/json"],"Authorization":["REDACTED"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"X-Xss-Protection":["0"],"Date":["Mon, 10 Mar 2025 19:38:36 GMT"],"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"X-Frame-Options":["DENY"],"X-Content-Type-Options":["nosniff"],"Origin-Agent-Cluster":["?1"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"]},"status":200} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.1603107,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:443","total_upstreams":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.1768878,"logger":"events","msg":"event","name":"tls_get_certificate","id":"0764aad0-93c8-4752-a306-93e56a19b096","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4865,4867,49196,49195,52393,49200,49199,52392,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,24],"SupportedPoints":"AA==","SignatureSchemes":[1283,1027,2055,2054,2053,2052,1537,1281,1025],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":52452,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.176941,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.176952,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.1769578,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.1769655,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"52452","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.2213824,"logger":"events","msg":"event","name":"tls_get_certificate","id":"3141dfa6-90eb-43b2-bd1a-5ca666c56eec","origin":"tls","data":{"client_hello":{"CipherSuites":[4865,4866,4867,49195,49196,49199,49200,49171,49192,156,157,47,53,10],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,24,25,4588,25497,65074],"SupportedPoints":"AA==","SignatureSchemes":[1027,2052,1025,1283,2053,1281,2054,1537,513,1539],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771,770,769],"RemoteAddr":{"IP":"<REDACTED>","Port":13434,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.2214293,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.221435,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.2214396,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.2214465,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"13434","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.22993,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.2347803,"logger":"events","msg":"event","name":"tls_get_certificate","id":"cae70097-3b39-499c-955b-245c8bcb3ac4","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4865,4867,49196,49195,52393,49200,49199,52392,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,24],"SupportedPoints":"AA==","SignatureSchemes":[1283,1027,2055,2054,2053,2052,1537,1281,1025],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":52460,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.2348177,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.2348254,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.2348306,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.2348385,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"52460","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.2755108,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.045521161,"request":{"remote_ip":"<REDACTED>","remote_port":"56990","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"PUT","host":"matrix.nyaw.xyz","uri":"/_matrix/federation/v1/send/47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU","headers":{"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz"],"Content-Length":["57"],"Content-Type":["application/json"],"Authorization":["REDACTED"],"X-Forwarded-For":["<REDACTED>"],"Via":["2.0 Caddy"],"Accept":["*/*"],"User-Agent":["Conduwuit/0.4.6 (8f7ade4)"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"matrix.nyaw.xyz"}},"headers":{"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Date":["Mon, 10 Mar 2025 19:38:36 GMT"],"Access-Control-Allow-Origin":["*"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"Origin-Agent-Cluster":["?1"],"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"X-Frame-Options":["DENY"]},"status":200} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.2958937,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:443","duration":0.135506846,"request":{"remote_ip":"<REDACTED>","remote_port":"39120","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"POST","host":"nyaw.xyz","uri":"/inbox","headers":{"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"Via":["1.1 Caddy"],"Date":["Mon, 10 Mar 2025 19:38:35 GMT"],"Digest":["SHA-256=JULt41IImceh345buUj9gnV/yvoI8g4ztXCQiwGBcD0="],"User-Agent":["Mastodon/4.4.0-nightly.2025-03-10 (http.rb/5.2.0; +https://mastodon.social/)"],"Accept-Encoding":["gzip"],"Content-Type":["application/activity+json"],"X-Forwarded-Host":["nyaw.xyz"],"Traceparent":["00-65a8601807ee94c2506c8ff2429871a8-638d32aba7b8a4ae-01"],"Content-Length":["800"],"Signature":["keyId=\"https://mastodon.social/users/pavli_g#main-key\",algorithm=\"rsa-sha256\",headers=\"host date digest content-type (request-target)\",signature=\"Gqo72Mv81HEpCDMh4K4JgAag+BIc/6izjLR/hAA0pSLqrwcKRxYNb5k2qwcevAXr2JlviVTSf4jZD+72Xj/lzk3GlicR9fSRt+GCGzeOzP+RtrwQOJmcJGD5r3W7PD6f3vOs7wq4n4gFH6eQzcDnPZG8y7V8Ne2EIVkixKBrTIzkWr3s3GLSArEq7QukpCE4sgzdb3ce44E7k7CusYg8n4TOQTx2lFDnVRi0E9IuP853CNkKfkp7noABx5IwTxDOEwNLlZfEUOGXKDd1PEhycFFOrQGBkJGoutclB8IgQkYAGyQiPLVE0B1Hbkk0oQLD0xzj6vY/fJBbzxHjHK3Maw==\""]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"nyaw.xyz"}},"headers":{"Access-Control-Allow-Headers":["Accept"],"Access-Control-Expose-Headers":["Vary"],"Alt-Svc":["h3=\":443\"; ma=2592000"],"Content-Length":["0"],"Access-Control-Allow-Methods":["GET, OPTIONS"],"Access-Control-Allow-Origin":["*"],"Date":["Mon, 10 Mar 2025 19:38:36 GMT"],"Strict-Transport-Security":["max-age=15552000; preload"],"Via":["1.1 Caddy"]},"status":202} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.4315104,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.4330318,"logger":"events","msg":"event","name":"tls_get_certificate","id":"f9a2dd0b-28bb-470a-8c7c-59b52905ff65","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,159,52393,52392,52394,49195,49199,158,49188,49192,107,49187,49191,103,49162,49172,57,49161,49171,51,157,156,61,60,53,47,255],"ServerName":"nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771,770,769],"RemoteAddr":{"IP":"<REDACTED>","Port":35619,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.433082,"logger":"tls.handshake","msg":"choosing certificate","identifier":"nyaw.xyz","num_choices":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.4330995,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"nyaw.xyz","subjects":["nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"1a8935862ac1ecb6163d6c499e62ab4e447bc76c716491b0400973ee9554957f"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.4331102,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"35619","subjects":["nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"1a8935862ac1ecb6163d6c499e62ab4e447bc76c716491b0400973ee9554957f"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.4785318,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.046948617,"request":{"remote_ip":"<REDACTED>","remote_port":"52452","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"PUT","host":"matrix.nyaw.xyz","uri":"/_matrix/federation/v1/send/GjZVczHUqRcpikulvqRGxQ1yO3dCDaw-45gJMaKwkWs","headers":{"Content-Type":["application/json"],"Authorization":["REDACTED"],"User-Agent":["conduwuit/0.5.0"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz"],"Via":["2.0 Caddy"],"Accept":["*/*"],"Content-Length":["503"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"matrix.nyaw.xyz"}},"headers":{"Origin-Agent-Cluster":["?1"],"Date":["Mon, 10 Mar 2025 19:38:36 GMT"],"X-Frame-Options":["DENY"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"]},"status":200} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.4829288,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.5009556,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.5065174,"logger":"events","msg":"event","name":"tls_get_certificate","id":"e61da99e-abc2-472e-bc67-ce315b502f51","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4865,4867,49196,49195,52393,49200,49199,52392,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,24],"SupportedPoints":"AA==","SignatureSchemes":[1283,1027,2055,2054,2053,2052,1537,1281,1025],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":34814,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.5065703,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.5065782,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.5065918,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.5066,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"34814","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.5272048,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.044210021,"request":{"remote_ip":"<REDACTED>","remote_port":"13434","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"PUT","host":"matrix.nyaw.xyz","uri":"/_matrix/federation/v1/send/47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU","headers":{"Content-Type":["application/json"],"Cf-Ray":["91e545f40b244181-HAM"],"Accept":["*/*"],"X-Forwarded-Proto":["https"],"Authorization":["REDACTED"],"Via":["2.0 Caddy"],"Accept-Encoding":["gzip, br"],"Cf-Connecting-Ip":["<REDACTED>"],"X-Forwarded-For":["<REDACTED>"],"Content-Length":["54"],"User-Agent":["Conduwuit/0.4.6"],"Cdn-Loop":["cloudflare; loops=1"],"Cf-Visitor":["{\"scheme\":\"https\"}"],"Cf-Ipcountry":["RU"],"X-Forwarded-Host":["matrix.nyaw.xyz"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"matrix.nyaw.xyz"}},"headers":{"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Frame-Options":["DENY"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Origin-Agent-Cluster":["?1"],"Date":["Mon, 10 Mar 2025 19:38:35 GMT"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Access-Control-Allow-Origin":["*"],"Content-Type":["application/json"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"]},"status":200} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.5312681,"logger":"events","msg":"event","name":"tls_get_certificate","id":"61ac5377-683a-4fef-85c6-06552aa1cf9f","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4865,4867,49196,49195,52393,49200,49199,52392,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,24],"SupportedPoints":"AA==","SignatureSchemes":[1283,1027,2055,2054,2053,2052,1537,1281,1025],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":36928,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.531323,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.531337,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.5313423,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.5313494,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"36928","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.5475264,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.046458318,"request":{"remote_ip":"<REDACTED>","remote_port":"52460","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"PUT","host":"matrix.nyaw.xyz","uri":"/_matrix/federation/v1/send/3mFbF_DKt3rq_kAo0tMWOJOx4MJVPPKlNdTGUF3mdHE","headers":{"User-Agent":["conduwuit/0.5.0"],"Content-Type":["application/json"],"Authorization":["REDACTED"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz"],"Content-Length":["234"],"Via":["2.0 Caddy"],"Accept":["*/*"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"matrix.nyaw.xyz"}},"headers":{"X-Xss-Protection":["0"],"Origin-Agent-Cluster":["?1"],"Date":["Mon, 10 Mar 2025 19:38:35 GMT"],"Access-Control-Allow-Origin":["*"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Content-Type-Options":["nosniff"],"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"X-Frame-Options":["DENY"]},"status":200} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.6039517,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:443","total_upstreams":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.6325202,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.6517084,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:443","duration":0.047679098,"request":{"remote_ip":"<REDACTED>","remote_port":"35619","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"POST","host":"nyaw.xyz","uri":"/inbox","headers":{"Accept-Encoding":["gzip"],"Content-Type":["application/activity+json"],"Via":["1.1 Caddy"],"Traceparent":["00-b64a1109ee24db0e07d79de92c4e0094-b6b8a39c0b348e4a-01"],"Content-Length":["2933"],"Date":["Mon, 10 Mar 2025 19:38:36 GMT"],"Signature":["keyId=\"https://mastodon.social/users/nixCraft#main-key\",algorithm=\"rsa-sha256\",headers=\"host date digest content-type (request-target)\",signature=\"nxyBJWtOeHVY27ohkemoGp5lAeZ4Hhc+iFbXuubaKfnYtl2hoq8N3X64KZwhHMp9P7Yh0+8CKH8F3FYJapt+lNH4nxdFPV4b63e6jwBSghi2henXyXazX6tgg59hmt9wj5T+ZjeKRvaxCcd1iB3BNwYmiYQVSr+RblycEzvzOxOV1HRCIesP9ycL2GsJAlQc8TSSVpq541tD99LMXw/aYIYBwFcDXOM8RUIGX7p2KQUftduvyS4ejalLTqDvC2l54+UTj//xWFHZFMH2AfUoEEaic63Zxsg9c0dyzGW3FYEjy/N74Kwp8tx2Tm4gNA/SuV8AOlINYpA838BnfxaZUQ==\""],"User-Agent":["Mastodon/4.4.0-nightly.2025-03-10 (http.rb/5.2.0; +https://mastodon.social/)"],"Digest":["SHA-256=QryAquZZ7mmY02GItSylD4xkhFQ+jcoFLoCScGpro8o="],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["nyaw.xyz"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"nyaw.xyz"}},"headers":{"Access-Control-Allow-Origin":["*"],"Alt-Svc":["h3=\":443\"; ma=2592000"],"Strict-Transport-Security":["max-age=15552000; preload"],"Via":["1.1 Caddy"],"Content-Length":["0"],"Access-Control-Allow-Headers":["Accept"],"Access-Control-Allow-Methods":["GET, OPTIONS"],"Access-Control-Expose-Headers":["Vary"],"Date":["Mon, 10 Mar 2025 19:38:36 GMT"]},"status":202} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.652184,"logger":"events","msg":"event","name":"tls_get_certificate","id":"6aec5564-9124-4105-a09f-2498f41a0417","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4865,4867,49196,49195,52393,49200,49199,52392,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,24],"SupportedPoints":"AA==","SignatureSchemes":[1283,1027,2055,2054,2053,2052,1537,1281,1025],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":52464,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.6522415,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.652249,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.652254,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.6522622,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"52464","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.6784654,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.04588983,"request":{"remote_ip":"<REDACTED>","remote_port":"34814","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"PUT","host":"matrix.nyaw.xyz","uri":"/_matrix/federation/v1/send/47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU","headers":{"Accept":["*/*"],"User-Agent":["Conduwuit/0.4.6 (8f7ade4)"],"Content-Length":["63"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz"],"Authorization":["REDACTED"],"Via":["2.0 Caddy"],"Content-Type":["application/json"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"matrix.nyaw.xyz"}},"headers":{"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Frame-Options":["DENY"],"X-Xss-Protection":["0"],"Origin-Agent-Cluster":["?1"],"Access-Control-Allow-Origin":["*"],"X-Content-Type-Options":["nosniff"],"Date":["Mon, 10 Mar 2025 19:38:36 GMT"]},"status":200} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.7926106,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.8367941,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.044114663,"request":{"remote_ip":"<REDACTED>","remote_port":"36928","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"PUT","host":"matrix.nyaw.xyz","uri":"/_matrix/federation/v1/send/4-GEByYVkuTv4F5RZoIPwHtPagu43j9ehZN42tVifFs","headers":{"Accept":["*/*"],"User-Agent":["conduwuit/0.5.0 (e3b81f7)"],"Content-Length":["218"],"Content-Type":["application/json"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz"],"Via":["2.0 Caddy"],"Authorization":["REDACTED"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"matrix.nyaw.xyz"}},"headers":{"X-Content-Type-Options":["nosniff"],"Origin-Agent-Cluster":["?1"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Xss-Protection":["0"],"Date":["Mon, 10 Mar 2025 19:38:36 GMT"],"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"X-Frame-Options":["DENY"]},"status":200} | |
Mar 11 03:38:36 yidhra caddy[48818]: {"level":"debug","ts":1741635516.9761813,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:37 yidhra caddy[48818]: {"level":"debug","ts":1741635517.0202405,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.043985384,"request":{"remote_ip":"<REDACTED>","remote_port":"52464","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"PUT","host":"matrix.nyaw.xyz","uri":"/_matrix/federation/v1/send/47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU","headers":{"User-Agent":["Conduwuit/0.4.7 (16014e1)"],"Content-Length":["56"],"Content-Type":["application/json"],"Accept":["*/*"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz"],"Via":["2.0 Caddy"],"Authorization":["REDACTED"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"matrix.nyaw.xyz"}},"headers":{"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"Date":["Mon, 10 Mar 2025 19:38:36 GMT"],"Content-Type":["application/json"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"X-Frame-Options":["DENY"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Origin-Agent-Cluster":["?1"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"]},"status":200} | |
Mar 11 03:38:37 yidhra caddy[48818]: {"level":"debug","ts":1741635517.5521014,"logger":"http.stdlib","msg":"http: TLS handshake error from <REDACTED>:36106: no server TLS configuration available for ClientHello: &{CipherSuites:[4866 4865 4867 49196 49195 52393 49200 49199 52392 255] ServerName:api.atuin.nyaw.xyz SupportedCurves:[X25519 CurveP256 CurveP384] SupportedPoints:[0] SignatureSchemes:[ECDSAWithP384AndSHA384 ECDSAWithP256AndSHA256 Ed25519 PSSWithSHA512 PSSWithSHA384 PSSWithSHA256 PKCS1WithSHA512 PKCS1WithSHA384 PKCS1WithSHA256] SupportedProtos:[h2 http/1.1] SupportedVersions:[772 771] Extensions:[43 11 10 13 23 5 0 18 51 45 16 35] Conn:0xc000116e08 config:0xc00064cb40 ctx:0xc0002ab8b0}"} | |
Mar 11 03:38:37 yidhra caddy[48818]: {"level":"debug","ts":1741635517.7141395,"logger":"events","msg":"event","name":"tls_get_certificate","id":"f300ed45-7642-4c18-95df-11a69997f51d","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":25465,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:37 yidhra caddy[48818]: {"level":"debug","ts":1741635517.7142124,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:37 yidhra caddy[48818]: {"level":"debug","ts":1741635517.7142217,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:37 yidhra caddy[48818]: {"level":"debug","ts":1741635517.7142272,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:37 yidhra caddy[48818]: {"level":"debug","ts":1741635517.7142441,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"25465","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:37 yidhra caddy[48818]: {"level":"debug","ts":1741635517.9284737,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:38 yidhra caddy[48818]: {"level":"debug","ts":1741635518.2215185,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.292966843,"request":{"remote_ip":"<REDACTED>","remote_port":"25465","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1740629646380","headers":{"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"Content-Length":["214"],"User-Agent":["Synapse/1.121.1"],"Content-Type":["application/json"],"Authorization":["REDACTED"],"X-Forwarded-For":["<REDACTED>"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"Access-Control-Allow-Origin":["*"],"X-Xss-Protection":["0"],"Origin-Agent-Cluster":["?1"],"Date":["Mon, 10 Mar 2025 19:38:38 GMT"],"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Frame-Options":["DENY"],"X-Content-Type-Options":["nosniff"]},"status":200} | |
Mar 11 03:38:38 yidhra caddy[48818]: {"level":"debug","ts":1741635518.8167558,"logger":"events","msg":"event","name":"tls_get_certificate","id":"69f37cf2-a105-46b8-afe1-43eed62b4967","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49327,49325,49188,49192,49162,49172,49315,49311,107,57,49326,49324,49187,49191,49161,49171,49314,49310,103,51,157,156,49313,49309,49312,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":33720,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:38 yidhra caddy[48818]: {"level":"debug","ts":1741635518.8168325,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:38 yidhra caddy[48818]: {"level":"debug","ts":1741635518.8168423,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:38 yidhra caddy[48818]: {"level":"debug","ts":1741635518.8168552,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:38 yidhra caddy[48818]: {"level":"debug","ts":1741635518.816871,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"33720","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:38 yidhra caddy[48818]: {"level":"debug","ts":1741635518.981421,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.0257752,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.044274868,"request":{"remote_ip":"<REDACTED>","remote_port":"33720","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1734133385995","headers":{"User-Agent":["Synapse/1.121.1"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"Content-Type":["application/json"],"Authorization":["REDACTED"],"Content-Length":["241"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Frame-Options":["DENY"],"Origin-Agent-Cluster":["?1"],"Date":["Mon, 10 Mar 2025 19:38:39 GMT"],"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"]},"status":200} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.1361701,"logger":"events","msg":"event","name":"tls_get_certificate","id":"c2b2565d-8261-4d59-86b1-617086d13138","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49327,49325,49188,49192,49162,49172,49315,49311,107,57,49326,49324,49187,49191,49161,49171,49314,49310,103,51,157,156,49313,49309,49312,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,515,769,513,770,514,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771,770,769],"RemoteAddr":{"IP":"<REDACTED>","Port":36356,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.1362321,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.1362402,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.1362457,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.1362545,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"36356","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.1964066,"logger":"events","msg":"event","name":"tls_get_certificate","id":"b505a606-8912-45ff-a9b7-aeb578b38f01","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":39032,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.1964645,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.1964738,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.1964793,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.1964877,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"39032","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.3100643,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.354573,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.04441521,"request":{"remote_ip":"<REDACTED>","remote_port":"36356","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1741511294111","headers":{"Content-Type":["application/json"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"Authorization":["REDACTED"],"Content-Length":["330"],"User-Agent":["Synapse/1.66.0"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Access-Control-Allow-Origin":["*"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Xss-Protection":["0"],"Origin-Agent-Cluster":["?1"],"Date":["Mon, 10 Mar 2025 19:38:39 GMT"],"Content-Type":["application/json"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"X-Frame-Options":["DENY"],"X-Content-Type-Options":["nosniff"]},"status":200} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.3883615,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:39 yidhra caddy[48818]: {"level":"debug","ts":1741635519.6645517,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.276118833,"request":{"remote_ip":"<REDACTED>","remote_port":"39032","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1741454581585","headers":{"Content-Length":["213"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"User-Agent":["Synapse/1.124.0"],"Content-Type":["application/json"],"Authorization":["REDACTED"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Frame-Options":["DENY"],"X-Content-Type-Options":["nosniff"],"Origin-Agent-Cluster":["?1"],"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"X-Xss-Protection":["0"],"Date":["Mon, 10 Mar 2025 19:38:39 GMT"]},"status":200} | |
Mar 11 03:38:40 yidhra caddy[48818]: {"level":"debug","ts":1741635520.8484232,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:40 yidhra caddy[48818]: {"level":"debug","ts":1741635520.8929234,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.044391443,"request":{"remote_ip":"<REDACTED>","remote_port":"13434","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"PUT","host":"matrix.nyaw.xyz","uri":"/_matrix/federation/v1/send/47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU","headers":{"Via":["2.0 Caddy"],"Accept-Encoding":["gzip, br"],"Content-Type":["application/json"],"Content-Length":["54"],"User-Agent":["Conduwuit/0.4.6"],"Cdn-Loop":["cloudflare; loops=1"],"Cf-Connecting-Ip":["<REDACTED>"],"Cf-Ipcountry":["RU"],"Cf-Ray":["91e546141d834181-HAM"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"Accept":["*/*"],"Authorization":["REDACTED"],"Cf-Visitor":["{\"scheme\":\"https\"}"],"X-Forwarded-Host":["matrix.nyaw.xyz"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"matrix.nyaw.xyz"}},"headers":{"Content-Type":["application/json"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Frame-Options":["DENY"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Date":["Mon, 10 Mar 2025 19:38:40 GMT"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Origin-Agent-Cluster":["?1"]},"status":200} | |
Mar 11 03:38:41 yidhra caddy[48818]: {"level":"debug","ts":1741635521.049898,"logger":"events","msg":"event","name":"tls_get_certificate","id":"9cd69751-4bf8-45f7-98de-acfaa95369fa","origin":"tls","data":{"client_hello":{"CipherSuites":[49195,49199,49196,49200,52393,52392,49161,49171,49162,49172,49170,4865,4866,4867],"ServerName":"nyaw.xyz","SupportedCurves":[29,23,24,25],"SupportedPoints":"AA==","SignatureSchemes":[2052,1027,2055,2053,2054,1025,1281,1537,1283,1539,513,515],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":52692,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:41 yidhra caddy[48818]: {"level":"debug","ts":1741635521.0499752,"logger":"tls.handshake","msg":"choosing certificate","identifier":"nyaw.xyz","num_choices":1} | |
Mar 11 03:38:41 yidhra caddy[48818]: {"level":"debug","ts":1741635521.0499828,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"nyaw.xyz","subjects":["nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"1a8935862ac1ecb6163d6c499e62ab4e447bc76c716491b0400973ee9554957f"} | |
Mar 11 03:38:41 yidhra caddy[48818]: {"level":"debug","ts":1741635521.0499914,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"52692","subjects":["nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"1a8935862ac1ecb6163d6c499e62ab4e447bc76c716491b0400973ee9554957f"} | |
Mar 11 03:38:41 yidhra caddy[48818]: {"level":"debug","ts":1741635521.296914,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:443","total_upstreams":1} | |
Mar 11 03:38:41 yidhra caddy[48818]: {"level":"debug","ts":1741635521.3435943,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:443","duration":0.046580715,"request":{"remote_ip":"<REDACTED>","remote_port":"52692","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"POST","host":"nyaw.xyz","uri":"/inbox","headers":{"Accept-Encoding":["gzip"],"Signature":["keyId=\"https://relay.nya.one/actor\",algorithm=\"rsa-sha256\",headers=\"(request-target) host date digest content-type\",signature=\"FaRbGMujDxMLIk9hnjEwFI8j6AjGaZQJJNp3OKORDGmU8bH53y9GoI4NGCSnmpZ4XkAq2rWhs9rA6Z0DhwegeU3fkihmZJyw3ht8ui5OfQuu6AvLCDVk5IamCUCc3NvWoS60whyRXSRFN5YOo6UvTyGfNPWCRx3mW6DIs9klXHw4i63KBzfg4ZQLAZ/MJVM3fwEUNZOiYwxvemJJZIq0guib60zeFfEwEmEaq+YCEJ3uFOLrpioJDRZL75QUT2rSd9A7ELMRGAuoNqVvHy/FW/kDdfenPK94UQMAtJ6yE58xoilhluaVfqpxElurtCSD7ou+E51C9bXBUtJfNlYXyg==\""],"Content-Type":["application/activity+json"],"User-Agent":["NyaOne ActivityPub Relay (golang net/http; Activity-Relay 2.0.7; relay.nya.one)"],"Digest":["SHA-256=+ZdDNy2QX8dQovj72FeOALfRIxSfiDlY8C6fuwaQris="],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["nyaw.xyz"],"Via":["2.0 Caddy"],"Date":["Mon, 10 Mar 2025 19:38:40 GMT"],"Content-Length":["2454"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"nyaw.xyz"}},"headers":{"Access-Control-Allow-Headers":["Accept"],"Access-Control-Expose-Headers":["Vary"],"Strict-Transport-Security":["max-age=15552000; preload"],"Via":["1.1 Caddy"],"Access-Control-Allow-Methods":["GET, OPTIONS"],"Access-Control-Allow-Origin":["*"],"Alt-Svc":["h3=\":443\"; ma=2592000"],"Date":["Mon, 10 Mar 2025 19:38:41 GMT"],"Content-Length":["0"]},"status":202} | |
Mar 11 03:38:42 yidhra caddy[48818]: {"level":"debug","ts":1741635522.7090018,"logger":"events","msg":"event","name":"tls_get_certificate","id":"93e2410c-79d0-4511-984f-d9d58b4f552b","origin":"tls","data":{"client_hello":{"CipherSuites":[4865,4866,4867,49195,49196,49199,49200,49171,49192,156,157,47,53,10],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,24,25,4588,25497,65074],"SupportedPoints":"AA==","SignatureSchemes":[1027,2052,1025,1283,2053,1281,2054,1537,513,1539],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771,770,769],"RemoteAddr":{"IP":"<REDACTED>","Port":18354,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:42 yidhra caddy[48818]: {"level":"debug","ts":1741635522.7090626,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:42 yidhra caddy[48818]: {"level":"debug","ts":1741635522.7090712,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:42 yidhra caddy[48818]: {"level":"debug","ts":1741635522.7090783,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:42 yidhra caddy[48818]: {"level":"debug","ts":1741635522.709095,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"18354","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:42 yidhra caddy[48818]: {"level":"debug","ts":1741635522.9229314,"logger":"http.stdlib","msg":"http: TLS handshake error from <REDACTED>:39342: no server TLS configuration available for ClientHello: &{CipherSuites:[4866 4867 4865] ServerName:api.atuin.nyaw.xyz SupportedCurves:[X25519MLKEM768 X25519 CurveP256 CurveID(30) CurveP384 CurveP521 CurveID(256) CurveID(257)] SupportedPoints:[0 1 2] SignatureSchemes:[ECDSAWithP256AndSHA256 ECDSAWithP384AndSHA384 ECDSAWithP521AndSHA512 Ed25519 SignatureScheme(2056) SignatureScheme(2074) SignatureScheme(2075) SignatureScheme(2076) SignatureScheme(2057) SignatureScheme(2058) SignatureScheme(2059) PSSWithSHA256 PSSWithSHA384 PSSWithSHA512 PKCS1WithSHA256 PKCS1WithSHA384 PKCS1WithSHA512 SignatureScheme(2308) SignatureScheme(2309) SignatureScheme(2310)] SupportedProtos:[h2 http/1.1] SupportedVersions:[772] Extensions:[11 10 22 23 49 13 43 45 51 0 16 65037] Conn:0xc000117080 config:0xc00064cb40 ctx:0xc000434280}"} | |
Mar 11 03:38:42 yidhra caddy[48818]: {"level":"debug","ts":1741635522.9443305,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:42 yidhra caddy[48818]: {"level":"debug","ts":1741635522.944922,"logger":"events","msg":"event","name":"tls_get_certificate","id":"ee882de4-c501-465c-957f-4025f0eee25f","origin":"tls","data":{"client_hello":{"CipherSuites":[4865,4866,4867,49195,49196,49199,49200,49171,49192,156,157,47,53,10],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,24,25,4588,25497,65074],"SupportedPoints":"AA==","SignatureSchemes":[1027,2052,1025,1283,2053,1281,2054,1537,513,1539],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771,770,769],"RemoteAddr":{"IP":"<REDACTED>","Port":28720,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:42 yidhra caddy[48818]: {"level":"debug","ts":1741635522.9449873,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:42 yidhra caddy[48818]: {"level":"debug","ts":1741635522.9449964,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:42 yidhra caddy[48818]: {"level":"debug","ts":1741635522.9450011,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:42 yidhra caddy[48818]: {"level":"debug","ts":1741635522.9450102,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"28720","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:42 yidhra caddy[48818]: {"level":"debug","ts":1741635522.982568,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.038157319,"request":{"remote_ip":"<REDACTED>","remote_port":"18354","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"PUT","host":"matrix.nyaw.xyz","uri":"/_matrix/federation/v1/send/47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU","headers":{"Cf-Ray":["91e5461d1ec8c434-EWR"],"X-Forwarded-Host":["matrix.nyaw.xyz"],"Accept":["*/*"],"Cf-Ipcountry":["US"],"X-Forwarded-Proto":["https"],"Authorization":["REDACTED"],"Cf-Visitor":["{\"scheme\":\"https\"}"],"Via":["2.0 Caddy"],"Content-Length":["54"],"Cf-Connecting-Ip":["<REDACTED>"],"User-Agent":["Conduwuit/0.4.6 (8f7ade4c)"],"Cdn-Loop":["cloudflare; loops=1"],"Accept-Encoding":["gzip, br"],"X-Forwarded-For":["<REDACTED>"],"Content-Type":["application/json"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"matrix.nyaw.xyz"}},"headers":{"X-Content-Type-Options":["nosniff"],"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Xss-Protection":["0"],"Origin-Agent-Cluster":["?1"],"Date":["Mon, 10 Mar 2025 19:38:42 GMT"],"Access-Control-Allow-Origin":["*"],"X-Frame-Options":["DENY"]},"status":200} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.2032876,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.2416105,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.038244669,"request":{"remote_ip":"<REDACTED>","remote_port":"28720","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"PUT","host":"matrix.nyaw.xyz","uri":"/_matrix/federation/v1/send/47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU","headers":{"Via":["2.0 Caddy"],"Authorization":["REDACTED"],"User-Agent":["Conduwuit/0.4.6"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Host":["matrix.nyaw.xyz"],"X-Forwarded-Proto":["https"],"Accept":["*/*"],"Cf-Connecting-Ip":["<REDACTED>"],"Accept-Encoding":["gzip, br"],"Cf-Ipcountry":["CH"],"Cf-Visitor":["{\"scheme\":\"https\"}"],"Cdn-Loop":["cloudflare; loops=1"],"Content-Length":["62"],"Content-Type":["application/json"],"Cf-Ray":["91e5461e8c031e6d-ZRH"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"matrix.nyaw.xyz"}},"headers":{"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"X-Frame-Options":["DENY"],"Origin-Agent-Cluster":["?1"],"Date":["Mon, 10 Mar 2025 19:38:42 GMT"]},"status":200} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.5118792,"logger":"events","msg":"event","name":"tls_get_certificate","id":"f7013886-974a-4655-b908-818a084cc5e4","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":52926,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.5119429,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.5119507,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.511957,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.5119667,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"52926","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.5553272,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.6524289,"logger":"events","msg":"event","name":"tls_get_certificate","id":"06672d29-edee-460e-8b47-66a9ecd3893e","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":53718,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.6524897,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.652498,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.6525033,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.6525118,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"53718","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.6728458,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.11746089,"request":{"remote_ip":"<REDACTED>","remote_port":"52926","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1741403394718","headers":{"Authorization":["REDACTED"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"Content-Length":["215"],"User-Agent":["Synapse/1.123.0"],"Content-Type":["application/json"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"X-Frame-Options":["DENY"],"Origin-Agent-Cluster":["?1"],"Date":["Mon, 10 Mar 2025 19:38:42 GMT"],"Access-Control-Allow-Origin":["*"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"]},"status":200} | |
Mar 11 03:38:43 yidhra caddy[48818]: {"level":"debug","ts":1741635523.9649987,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:44 yidhra caddy[48818]: {"level":"debug","ts":1741635524.353469,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.388375156,"request":{"remote_ip":"<REDACTED>","remote_port":"53718","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1736249087293","headers":{"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"User-Agent":["Synapse/1.118.0"],"Content-Type":["application/json"],"Authorization":["REDACTED"],"Content-Length":["200"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Frame-Options":["DENY"],"X-Content-Type-Options":["nosniff"],"Origin-Agent-Cluster":["?1"],"X-Xss-Protection":["0"],"Date":["Mon, 10 Mar 2025 19:38:43 GMT"]},"status":200} | |
Mar 11 03:38:45 yidhra caddy[48818]: {"level":"debug","ts":1741635525.2557623,"logger":"http.stdlib","msg":"http: TLS handshake error from <REDACTED>:39344: no server TLS configuration available for ClientHello: &{CipherSuites:[4866 4867 4865] ServerName:api.atuin.nyaw.xyz SupportedCurves:[X25519MLKEM768 X25519 CurveP256 CurveID(30) CurveP384 CurveP521 CurveID(256) CurveID(257)] SupportedPoints:[0 1 2] SignatureSchemes:[ECDSAWithP256AndSHA256 ECDSAWithP384AndSHA384 ECDSAWithP521AndSHA512 Ed25519 SignatureScheme(2056) SignatureScheme(2074) SignatureScheme(2075) SignatureScheme(2076) SignatureScheme(2057) SignatureScheme(2058) SignatureScheme(2059) PSSWithSHA256 PSSWithSHA384 PSSWithSHA512 PKCS1WithSHA256 PKCS1WithSHA384 PKCS1WithSHA512 SignatureScheme(2308) SignatureScheme(2309) SignatureScheme(2310)] SupportedProtos:[h2 http/1.1] SupportedVersions:[772] Extensions:[11 10 22 23 49 13 43 45 51 0 16 65037] Conn:0xc000117180 config:0xc00064cb40 ctx:0xc0005ee9b0}"} | |
Mar 11 03:38:45 yidhra caddy[48818]: {"level":"debug","ts":1741635525.8991904,"logger":"events","msg":"event","name":"tls_get_certificate","id":"dfcb622f-2865-4dff-8d6c-9f6e59c8d916","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":48214,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:45 yidhra caddy[48818]: {"level":"debug","ts":1741635525.8992536,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:45 yidhra caddy[48818]: {"level":"debug","ts":1741635525.8992634,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:45 yidhra caddy[48818]: {"level":"debug","ts":1741635525.8992698,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:45 yidhra caddy[48818]: {"level":"debug","ts":1741635525.8992789,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"48214","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:46 yidhra caddy[48818]: {"level":"debug","ts":1741635526.1538115,"logger":"events","msg":"event","name":"tls_get_certificate","id":"404dcdff-2faa-4059-9ce1-062026346306","origin":"tls","data":{"client_hello":{"CipherSuites":[49195,49199,49196,49200,52393,52392,49161,49171,49162,49172,49170,4865,4866,4867],"ServerName":"ntfy.nyaw.xyz","SupportedCurves":[29,23,24,25],"SupportedPoints":"AA==","SignatureSchemes":[2052,1027,2055,2053,2054,1025,1281,1537,1283,1539,513,515],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":39354,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:46 yidhra caddy[48818]: {"level":"debug","ts":1741635526.1538682,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"ntfy.nyaw.xyz"} | |
Mar 11 03:38:46 yidhra caddy[48818]: {"level":"debug","ts":1741635526.153877,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:46 yidhra caddy[48818]: {"level":"debug","ts":1741635526.153882,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:46 yidhra caddy[48818]: {"level":"debug","ts":1741635526.1538916,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"39354","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:46 yidhra caddy[48818]: {"level":"debug","ts":1741635526.2095766,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:46 yidhra caddy[48818]: {"level":"debug","ts":1741635526.216576,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"127.0.0.1:2586","total_upstreams":1} | |
Mar 11 03:38:46 yidhra caddy[48818]: {"level":"debug","ts":1741635526.2172923,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"127.0.0.1:2586","duration":0.000655413,"request":{"remote_ip":"<REDACTED>","remote_port":"39354","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"GET","host":"ntfy.nyaw.xyz","uri":"/","headers":{"User-Agent":["Blackbox Exporter/0.26.0"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["ntfy.nyaw.xyz"],"Via":["2.0 Caddy"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"ntfy.nyaw.xyz"}},"headers":{"Content-Type":["text/html; charset=utf-8"],"Last-Modified":["Wed, 05 Mar 2025 17:18:12 GMT"],"Date":["Mon, 10 Mar 2025 19:38:46 GMT"],"Accept-Ranges":["bytes"]},"status":200} | |
Mar 11 03:38:46 yidhra caddy[48818]: {"level":"debug","ts":1741635526.2472217,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.037585832,"request":{"remote_ip":"<REDACTED>","remote_port":"48214","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1741291855493","headers":{"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"Authorization":["REDACTED"],"Content-Length":["272"],"User-Agent":["Synapse/1.123.0"],"Content-Type":["application/json"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"X-Frame-Options":["DENY"],"Origin-Agent-Cluster":["?1"],"Access-Control-Allow-Origin":["*"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Date":["Mon, 10 Mar 2025 19:38:46 GMT"]},"status":200} | |
Mar 11 03:38:47 yidhra caddy[48818]: {"level":"debug","ts":1741635527.7349274,"logger":"http.stdlib","msg":"http: TLS handshake error from <REDACTED>:39362: no server TLS configuration available for ClientHello: &{CipherSuites:[4866 4867 4865] ServerName:api.atuin.nyaw.xyz SupportedCurves:[X25519MLKEM768 X25519 CurveP256 CurveID(30) CurveP384 CurveP521 CurveID(256) CurveID(257)] SupportedPoints:[0 1 2] SignatureSchemes:[ECDSAWithP256AndSHA256 ECDSAWithP384AndSHA384 ECDSAWithP521AndSHA512 Ed25519 SignatureScheme(2056) SignatureScheme(2074) SignatureScheme(2075) SignatureScheme(2076) SignatureScheme(2057) SignatureScheme(2058) SignatureScheme(2059) PSSWithSHA256 PSSWithSHA384 PSSWithSHA512 PKCS1WithSHA256 PKCS1WithSHA384 PKCS1WithSHA512 SignatureScheme(2308) SignatureScheme(2309) SignatureScheme(2310)] SupportedProtos:[h2 http/1.1] SupportedVersions:[772] Extensions:[11 10 22 23 49 13 43 45 51 0 16 65037] Conn:0xc000117220 config:0xc00064cb40 ctx:0xc000435360}"} | |
Mar 11 03:38:48 yidhra caddy[48818]: {"level":"debug","ts":1741635528.1979632,"logger":"events","msg":"event","name":"tls_get_certificate","id":"08625836-a3d6-49bb-9953-e40d90d4102e","origin":"tls","data":{"client_hello":{"CipherSuites":[49195,49199,49196,49200,52393,52392,49161,49171,49162,49172,49170,4865,4866,4867],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,24,25],"SupportedPoints":"AA==","SignatureSchemes":[2052,1027,2055,2053,2054,1025,1281,1537,1283,1539,513,515],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":48344,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:48 yidhra caddy[48818]: {"level":"debug","ts":1741635528.198021,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:48 yidhra caddy[48818]: {"level":"debug","ts":1741635528.1980298,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:48 yidhra caddy[48818]: {"level":"debug","ts":1741635528.1980352,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:48 yidhra caddy[48818]: {"level":"debug","ts":1741635528.1980436,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"48344","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:49 yidhra caddy[48818]: {"level":"debug","ts":1741635529.745561,"logger":"http.stdlib","msg":"http: TLS handshake error from <REDACTED>:36034: no server TLS configuration available for ClientHello: &{CipherSuites:[4866 4867 4865] ServerName:api.atuin.nyaw.xyz SupportedCurves:[X25519MLKEM768 X25519 CurveP256 CurveID(30) CurveP384 CurveP521 CurveID(256) CurveID(257)] SupportedPoints:[0 1 2] SignatureSchemes:[ECDSAWithP256AndSHA256 ECDSAWithP384AndSHA384 ECDSAWithP521AndSHA512 Ed25519 SignatureScheme(2056) SignatureScheme(2074) SignatureScheme(2075) SignatureScheme(2076) SignatureScheme(2057) SignatureScheme(2058) SignatureScheme(2059) PSSWithSHA256 PSSWithSHA384 PSSWithSHA512 PKCS1WithSHA256 PKCS1WithSHA384 PKCS1WithSHA512 SignatureScheme(2308) SignatureScheme(2309) SignatureScheme(2310)] SupportedProtos:[h2 http/1.1] SupportedVersions:[772] Extensions:[11 10 22 23 49 13 43 45 51 0 16 65037] Conn:0xc000117228 config:0xc00064cb40 ctx:0xc0005eeb90}"} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.0246706,"logger":"events","msg":"event","name":"tls_get_certificate","id":"f5d2cf37-601a-494f-b9e3-14b2c533a880","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":60060,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.0247338,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.0247416,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.024748,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.0247564,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"60060","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.3105905,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.6712773,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.360615465,"request":{"remote_ip":"<REDACTED>","remote_port":"60060","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1740568517884","headers":{"Authorization":["REDACTED"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"Content-Length":["249"],"User-Agent":["Synapse/1.124.0"],"Content-Type":["application/json"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"Date":["Mon, 10 Mar 2025 19:38:50 GMT"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"X-Frame-Options":["DENY"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Content-Type":["application/json"],"Access-Control-Allow-Origin":["*"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"Origin-Agent-Cluster":["?1"]},"status":200} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.7536824,"logger":"events","msg":"event","name":"tls_get_certificate","id":"83663d6a-df55-473d-8a16-c14687508f3d","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":46308,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.7537434,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.7537515,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.7537575,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.753767,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"46308","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.9229653,"logger":"events","msg":"event","name":"tls_get_certificate","id":"05b516ec-b57d-44af-beed-4ae506a0275c","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":43058,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.9230282,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.9230366,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.923043,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.923051,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"43058","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:50 yidhra caddy[48818]: {"level":"debug","ts":1741635530.9955456,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:51 yidhra caddy[48818]: {"level":"debug","ts":1741635531.0762477,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:51 yidhra caddy[48818]: {"level":"debug","ts":1741635531.1143456,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.038019317,"request":{"remote_ip":"<REDACTED>","remote_port":"48344","client_ip":"<REDACTED>","proto":"HTTP/2.0","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1741635526635-137","headers":{"Authorization":["REDACTED"],"User-Agent":["Dendrite/0.14.1+40bef6a"],"Content-Length":["265"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Content-Type":["application/json"],"Accept-Encoding":["gzip"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"Via":["2.0 Caddy"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"matrix.nyaw.xyz"}},"headers":{"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Origin-Agent-Cluster":["?1"],"X-Frame-Options":["DENY"],"Date":["Mon, 10 Mar 2025 19:38:50 GMT"]},"status":200} | |
Mar 11 03:38:51 yidhra caddy[48818]: {"level":"debug","ts":1741635531.1589308,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:51 yidhra caddy[48818]: {"level":"debug","ts":1741635531.201258,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.042272974,"request":{"remote_ip":"<REDACTED>","remote_port":"43058","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1741584908464","headers":{"Content-Type":["application/json"],"Authorization":["REDACTED"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"Content-Length":["230"],"User-Agent":["Synapse/1.123.0"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"X-Content-Type-Options":["nosniff"],"Origin-Agent-Cluster":["?1"],"Content-Type":["application/json"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"Date":["Mon, 10 Mar 2025 19:38:51 GMT"],"X-Frame-Options":["DENY"],"X-Xss-Protection":["0"]},"status":200} | |
Mar 11 03:38:51 yidhra caddy[48818]: {"level":"debug","ts":1741635531.3132377,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.317631431,"request":{"remote_ip":"<REDACTED>","remote_port":"46308","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1737764412397","headers":{"Content-Type":["application/json"],"Authorization":["REDACTED"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"Content-Length":["201"],"User-Agent":["Synapse/1.122.0"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Origin-Agent-Cluster":["?1"],"Content-Type":["application/json"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"X-Frame-Options":["DENY"],"Date":["Mon, 10 Mar 2025 19:38:50 GMT"]},"status":200} | |
Mar 11 03:38:53 yidhra caddy[48818]: {"level":"debug","ts":1741635533.1307778,"logger":"events","msg":"event","name":"tls_get_certificate","id":"5f1a4d17-82a6-4beb-ba05-d5f15da4b855","origin":"tls","data":{"client_hello":{"CipherSuites":[49195,49199,49196,49200,52393,52392,49161,49171,49162,49172,49170,4865,4866,4867],"ServerName":"yidhra.nyaw.xyz","SupportedCurves":[29,23,24,25],"SupportedPoints":"AA==","SignatureSchemes":[2052,1027,2055,2053,2054,1025,1281,1537,1283,1539,513,515],"SupportedProtos":["h2","http/1.1"],"SupportedVersions":[772,771],"RemoteAddr":{"IP":"fdcc::1","Port":58768,"Zone":""},"LocalAddr":{"IP":"fdcc::4","Port":443,"Zone":""}}}} | |
Mar 11 03:38:53 yidhra caddy[48818]: {"level":"debug","ts":1741635533.1308458,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"yidhra.nyaw.xyz"} | |
Mar 11 03:38:53 yidhra caddy[48818]: {"level":"debug","ts":1741635533.1308537,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:53 yidhra caddy[48818]: {"level":"debug","ts":1741635533.130859,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:53 yidhra caddy[48818]: {"level":"debug","ts":1741635533.1308677,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"fdcc::1","remote_port":"58768","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:53 yidhra caddy[48818]: {"level":"debug","ts":1741635533.4850318,"logger":"events","msg":"event","name":"tls_get_certificate","id":"2f7c7ae5-5025-4b17-9eca-a4cfe20c2ab9","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,49195,49199,52393,52392,159,158,52394,49325,49188,49192,49162,49172,49311,107,57,49324,49187,49191,49161,49171,49310,103,51,157,156,49309,49308,61,60,53,47,255],"ServerName":"matrix.nyaw.xyz","SupportedCurves":[29,23,30,25,24,256,257,258,259,260],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2074,2075,2076,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,769,770,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771],"RemoteAddr":{"IP":"<REDACTED>","Port":35674,"Zone":""},"LocalAddr":{"IP":"10.2.63.39","Port":443,"Zone":""}}}} | |
Mar 11 03:38:53 yidhra caddy[48818]: {"level":"debug","ts":1741635533.4851031,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"matrix.nyaw.xyz"} | |
Mar 11 03:38:53 yidhra caddy[48818]: {"level":"debug","ts":1741635533.4851115,"logger":"tls.handshake","msg":"choosing certificate","identifier":"*.nyaw.xyz","num_choices":1} | |
Mar 11 03:38:53 yidhra caddy[48818]: {"level":"debug","ts":1741635533.4851182,"logger":"tls.handshake","msg":"default certificate selection results","identifier":"*.nyaw.xyz","subjects":["*.nyaw.xyz"],"managed":true,"issuer_key":"acme-v02.api.letsencrypt.org-directory","hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:53 yidhra caddy[48818]: {"level":"debug","ts":1741635533.4851272,"logger":"tls.handshake","msg":"matched certificate in cache","remote_ip":"<REDACTED>","remote_port":"35674","subjects":["*.nyaw.xyz"],"managed":true,"expiration":1749225035,"hash":"91dbd5929d65a7a5be61dfc1a3a2125df4619599ac4951e46fb40052fa29e8d5"} | |
Mar 11 03:38:53 yidhra caddy[48818]: {"level":"debug","ts":1741635533.735161,"logger":"http.handlers.reverse_proxy","msg":"selected upstream","dial":"[fdcc::3]:6167","total_upstreams":1} | |
Mar 11 03:38:53 yidhra caddy[48818]: {"level":"debug","ts":1741635533.773289,"logger":"http.handlers.reverse_proxy","msg":"upstream roundtrip","upstream":"[fdcc::3]:6167","duration":0.038048798,"request":{"remote_ip":"<REDACTED>","remote_port":"35674","client_ip":"<REDACTED>","proto":"HTTP/1.1","method":"PUT","host":"matrix.nyaw.xyz:443","uri":"/_matrix/federation/v1/send/1741582198299","headers":{"Content-Type":["application/json"],"Authorization":["REDACTED"],"X-Forwarded-For":["<REDACTED>"],"X-Forwarded-Proto":["https"],"X-Forwarded-Host":["matrix.nyaw.xyz:443"],"Via":["1.1 Caddy"],"Content-Length":["220"],"User-Agent":["Synapse/1.125.0"]},"tls":{"resumed":false,"version":772,"cipher_suite":4865,"proto":"","server_name":"matrix.nyaw.xyz"}},"headers":{"X-Frame-Options":["DENY"],"X-Xss-Protection":["0"],"X-Content-Type-Options":["nosniff"],"Content-Type":["application/json"],"Access-Control-Allow-Origin":["*"],"Content-Security-Policy":["default-src 'none';frame-ancestors 'none';form-action 'none';base-uri 'none';sandbox"],"Permissions-Policy":["interest-cohort=(),browsing-topics=()"],"Origin-Agent-Cluster":["?1"],"Date":["Mon, 10 Mar 2025 19:38:53 GMT"],"Vary":["origin, access-control-request-method, access-control-request-headers","accept-encoding"]},"status":200} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment