No, I didn't get it working. Rather than trying to troubleshoot the Unix process, I may just pick up a hardware agent.
kentreuber
Track Internet disconnections, provider outages with historical data, and automated speed testing.
For Windows, Linux, ARM64, ARMa7. Learn more by visiting www.outagesio.com
Notice: If you created an account on app.outagesio.com, simply use the same credentials to log in here.
Posts
-
Curl malformed url -
Curl malformed urlMy ID is 127633. I looked over the pervious topic, but I don't think my problem is the same.
-
Curl malformed urlI'm a new user. I'm trying to install the program on system running Elementary Linux. I'm receiving the following when I .
Receiving binary location
Getting the OTM Package
curl: (3) malformed
I've created the /etc/agentid file as shown below. I've verified that the awk commands are extracting the correct fields from the file.
USERNAME
PASSWORD
If I run the command "curl -m 20 -s -u $USERNAME:$PASSWORD …" by hand (substituting the USERNAME and PASSWORD strings) it completes without error but without returning any data. I assume that's causing a problem for later curl commands. If I run the same command adding a -v, it looks like the HTTP succeeds. Any help would be appreciated.
curl -v -m 20 -s -u $USERNAME:$PASSWORD --connect-timeout 10 -X POST https://www.foxymon.com/receiver/receiver2.php -F function=receive_binary_location
-
Trying 184.164.141.219...
-
TCP_NODELAY set
-
Connected to www.foxymon.com (184.164.141.219) port 443 (#0)
-
ALPN, offering h2
-
ALPN, offering http/1.1
-
successfully set certificate verify locations:
-
CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: /etc/ssl/certs
-
TLSv1.3 (OUT), TLS handshake, Client hello (1):
-
TLSv1.3 (IN), TLS handshake, Server hello (2):
-
TLSv1.2 (IN), TLS handshake, Certificate (11):
-
TLSv1.2 (IN), TLS handshake, Server key exchange (12):
-
TLSv1.2 (IN), TLS handshake, Server finished (14):
-
TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
-
TLSv1.2 (OUT), TLS change cipher, Client hello (1):
-
TLSv1.2 (OUT), TLS handshake, Finished (20):
-
TLSv1.2 (IN), TLS handshake, Finished (20):
-
SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
-
ALPN, server accepted to use http/1.1
-
Server certificate:
-
subject: CN=foxymon.com
-
start date: Feb 8 16:10:48 2021 GMT
-
expire date: May 9 16:10:48 2021 GMT
-
subjectAltName: host "www.foxymon.com" matched cert's "www.foxymon.com"
-
issuer: C=US; O=Let's Encrypt; CN=R3
-
SSL certificate verify ok.
-
Server auth using Basic with user 'kentreuber'
POST /receiver/receiver2.php HTTP/1.1
Host: www.foxymon.com
Authorization: Basic a2VudHJldWJlcjpZQ1RWQzJaN21GYU45QWM=
User-Agent: curl/7.58.0
Accept: /
Content-Length: 166
Content-Type: multipart/form-data; boundary=------------------------a7fd3bd46d6c6b34
< HTTP/1.1 200 OK
< Date: Sun, 14 Feb 2021 20:21:04 GMT
< Server: Apache
< Cache-Control: max-age=2592000
< Expires: Tue, 16 Mar 2021 20:21:04 GMT
< Content-Length: 0
< Content-Type: text/html; charset=UTF-8
<
- Connection #0 to host www.foxymon.com left intact
-