$ curl -vs https://a.pomf.se/eqoghu.png | file -
* Trying 104.28.2.56...
* Connected to a.pomf.se (104.28.2.56) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: none
* TLSv1.2, TLS Unknown, Unknown (22):
} [5 bytes data]
* TLSv1.2, TLS handshake, Client hello (1):
} [512 bytes data]
* SSLv2, Unknown (22):
{ [5 bytes data]
* TLSv1.2, TLS handshake, Server hello (2):
{ [108 bytes data]
* SSLv2, Unknown (22):
{ [5 bytes data]
* TLSv1.2, TLS handshake, CERT (11):
{ [3701 bytes data]
* SSLv2, Unknown (22):
{ [5 bytes data]
* TLSv1.2, TLS handshake, Server key exchange (12):
{ [148 bytes data]
* SSLv2, Unknown (22):
{ [5 bytes data]
* TLSv1.2, TLS handshake, Server finished (14):
{ [4 bytes data]
* SSLv2, Unknown (22):
} [5 bytes data]
* TLSv1.2, TLS handshake, Client key exchange (16):
} [70 bytes data]
* SSLv2, Unknown (20):
} [5 bytes data]
* TLSv1.2, TLS change cipher, Client hello (1):
} [1 bytes data]
* SSLv2, Unknown (22):
} [5 bytes data]
* TLSv1.2, TLS handshake, Finished (20):
} [16 bytes data]
* SSLv2, Unknown (20):
{ [5 bytes data]
* TLSv1.2, TLS change cipher, Client hello (1):
{ [1 bytes data]
* SSLv2, Unknown (22):
{ [5 bytes data]
* TLSv1.2, TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-ECDSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: OU=Domain Control Validated; OU=PositiveSSL Multi-Domain; CN=sni31021.cloudflaressl.com
* start date: 2015-05-13 00:00:00 GMT
* expire date: 2015-09-30 23:59:59 GMT
* subjectAltName: a.pomf.se matched
* issuer: C=GB; ST=Greater Manchester; L=Salford; O=COMODO CA Limited; CN=COMODO ECC Domain Validation Secure Server CA 2
* SSL certificate verify ok.
* SSLv2, Unknown (23):
} [5 bytes data]
> GET /eqoghu.png HTTP/1.1
> Host: a.pomf.se
> User-Agent: curl/7.42.1
> Accept: */*
>
* SSLv2, Unknown (23):
{ [5 bytes data]
< HTTP/1.1 200 OK
< Server: cloudflare-nginx
< Date: Wed, 13 May 2015 20:47:43 GMT
< Content-Type: image/png
< Transfer-Encoding: chunked
< Connection: keep-alive
< Set-Cookie: __cfduid=d9e2c8058382d29ea4a51ca88c93244491431550063; expires=Thu, 12-May-16 20:47:43 GMT; path=/; domain=.pomf.se; HttpOnly
< Last-Modified: Sun, 03 May 2015 21:45:33 GMT
< Vary: Accept-Encoding
< ETag: W/"554696fd-526a"
< Expires: Thu, 12 May 2016 20:47:43 GMT
< Cache-Control: public, max-age=31536000
< X-Frame-Options: DENY
< CF-Cache-Status: HIT
< CF-RAY: 1e61385685280cd1-LHR
<
{ [3549 bytes data]
* SSLv2, Unknown (23):
{ [5 bytes data]
* SSLv2, Unknown (23):
{ [5 bytes data]
* SSLv2, Unknown (23):
{ [5 bytes data]
* SSLv2, Unknown (23):
{ [5 bytes data]
* SSLv2, Unknown (23):
{ [5 bytes data]
* SSLv2, Unknown (23):
{ [5 bytes data]
* SSLv2, Unknown (23):
{ [5 bytes data]
* Connection #0 to host a.pomf.se left intact
/dev/stdin: PNG image data, 300 x 200, 8-bit/color RGB, non-interlaced