POST https://kbin.spritesserver.nl/f/inbox

SharedInboxController

Request

GET Parameters

None

POST Parameters

None

Uploaded Files

None

Request Attributes

Key Value
_controller
"App\Controller\ActivityPub\SharedInboxController"
_firewall_context
"security.firewall.map.context.main"
_route
"ap_shared_inbox"
_route_params
[]
_security_firewall_run
"_security_main"
_stopwatch_token
"0938a2"

Request Headers

Header Value
accept
"*/*"
accept-encoding
"gzip"
content-length
"4378"
content-type
"application/activity+json"
date
"Tue, 16 Sep 2025 01:41:19 GMT"
digest
"SHA-256=1vui+BS6HE58rDaTFP03OyWwY0Ipv5WFaEBjD1bqBDI="
host
"kbin.spritesserver.nl"
signature
"keyId="https://lemmy.world/c/selfhosted#main-key",algorithm="hs2019",headers="(request-target) content-type date digest host",signature="cZvzDWegxaLDKQ/HlnVGnrn/n+UgRrfFte9UtMz9F0UlMY0q8Lj4N09Jo/GkknDrviWD7qBf4GQHiwyDubz3v4i5pVueV7EOHs2CwsvhY3nwXBIXHdc49hnlg1DixgwIkJPJuh9CEeS9/MwrA2zFR3wvJ/pXD4cyOB8BaTfpiNQTDCC0y1UDzD1uFr8jBg3EB+LgcOh5uoATXQ4Us+dfTFtr8PfBMJknThPE5MN399xIEMfsJnTdMG7IT2q/eEioEpaGFhrquJCvxkn1n1SExjAIdr5H1+1icpb6hEL5I2KWz5cDBCBhW3nCjxETsw0sXwZkReWZZqaWY/h6SC/T2w==""
traceparent
"00-77876f1dce9419c0ddcb1e0885fd4e5c-f38a23b71efd1a13-01"
tracestate
""
user-agent
"Lemmy/0.19.12-4-gd8445881a; +https://lemmy.world"
x-php-ob-level
"1"

Request Content

Pretty

{
    "@context": [
        "https:\/\/join-lemmy.org\/context.json",
        "https:\/\/www.w3.org\/ns\/activitystreams"
    ],
    "actor": "https:\/\/lemmy.world\/c\/selfhosted",
    "to": [
        "https:\/\/www.w3.org\/ns\/activitystreams#Public"
    ],
    "object": {
        "id": "https:\/\/lemmy.dbzer0.com\/activities\/create\/7ac98185-c49b-4aea-8329-6c8098059599",
        "actor": "https:\/\/lemmy.dbzer0.com\/u\/mic_check_one_two",
        "@context": [
            "https:\/\/join-lemmy.org\/context.json",
            "https:\/\/www.w3.org\/ns\/activitystreams"
        ],
        "to": [
            "https:\/\/www.w3.org\/ns\/activitystreams#Public"
        ],
        "object": {
            "type": "Note",
            "id": "https:\/\/lemmy.dbzer0.com\/comment\/21410638",
            "attributedTo": "https:\/\/lemmy.dbzer0.com\/u\/mic_check_one_two",
            "to": [
                "https:\/\/www.w3.org\/ns\/activitystreams#Public"
            ],
            "cc": [
                "https:\/\/lemmy.world\/c\/selfhosted",
                "https:\/\/lemmy.blahaj.zone\/u\/Lyra_Lycan"
            ],
            "content": "<p>That\u2019s called <a href=\"https:\/\/en.m.wikipedia.org\/wiki\/Split-horizon_DNS\" rel=\"nofollow\">split DNS<\/a>. You can probably use that term to figure out if a particular router supports it. Basically, you would tell the router \u201cif a DNS request for a specific URL is coming from a local IP, use a different (usually local) DNS table\u201d. So like you can tell it \u201cif a device asks for this URL, route it to this local IP instead.\u201d So the DNS request never actually leaves your network.<\/p>\n<p>It can be handy for cases where you don\u2019t always want to be reliant on an external DNS server. For instance, if your internet is spotty. You don\u2019t want your Jellyfin to stop working just because your internet went out; Everything is local, so it <em>should<\/em> be able to connect. But if you\u2019re only using an external DNS provider, it won\u2019t be able to connect without internet. So split DNS will allow you to connect to local services even when your internet is out.<\/p>\n<p>The big downside to split DNS is that you often run into DNSSEC (DNS over https) warnings. Since the URL was intercepted before it actually reached an external DNS server, the traffic isn\u2019t taking the path that the service \u201cexpected\u201d it to take. So it may throw some warnings, or refuse to connect because it thinks your traffic is being intercepted, (because\u2026 Well\u2026 <em>It is being intercepted<\/em>\u2026 By you.)<\/p>\n",
            "inReplyTo": "https:\/\/lemmy.blahaj.zone\/comment\/16393409",
            "mediaType": "text\/html",
            "source": {
                "content": "That\u2019s called [split DNS](https:\/\/en.m.wikipedia.org\/wiki\/Split-horizon_DNS). You can probably use that term to figure out if a particular router supports it. Basically, you would tell the router \u201cif a DNS request for a specific URL is coming from a local IP, use a different (usually local) DNS table\u201d. So like you can tell it \u201cif a device asks for this URL, route it to this local IP instead.\u201d So the DNS request never actually leaves your network. \n\nIt can be handy for cases where you don\u2019t always want to be reliant on an external DNS server. For instance, if your internet is spotty. You don\u2019t want your Jellyfin to stop working just because your internet went out; Everything is local, so it _should_ be able to connect. But if you\u2019re only using an external DNS provider, it won\u2019t be able to connect without internet. So split DNS will allow you to connect to local services even when your internet is out.\n\nThe big downside to split DNS is that you often run into DNSSEC (DNS over https) warnings. Since the URL was intercepted before it actually reached an external DNS server, the traffic isn\u2019t taking the path that the service \u201cexpected\u201d it to take. So it may throw some warnings, or refuse to connect because it thinks your traffic is being intercepted, (because\u2026 Well\u2026 *It is being intercepted*\u2026 By you.)",
                "mediaType": "text\/markdown"
            },
            "published": "2025-09-16T01:40:35.792881Z",
            "tag": [
                {
                    "href": "https:\/\/lemmy.blahaj.zone\/u\/Lyra_Lycan",
                    "name": "@Lyra_Lycan@lemmy.blahaj.zone",
                    "type": "Mention"
                }
            ],
            "distinguished": false,
            "language": {
                "identifier": "en",
                "name": "English"
            },
            "audience": "https:\/\/lemmy.world\/c\/selfhosted",
            "attachment": []
        },
        "cc": [
            "https:\/\/lemmy.world\/c\/selfhosted",
            "https:\/\/lemmy.blahaj.zone\/u\/Lyra_Lycan"
        ],
        "tag": [
            {
                "href": "https:\/\/lemmy.blahaj.zone\/u\/Lyra_Lycan",
                "name": "@Lyra_Lycan@lemmy.blahaj.zone",
                "type": "Mention"
            }
        ],
        "type": "Create",
        "audience": "https:\/\/lemmy.world\/c\/selfhosted"
    },
    "cc": [
        "https:\/\/lemmy.world\/c\/selfhosted\/followers"
    ],
    "type": "Announce",
    "id": "https:\/\/lemmy.world\/activities\/announce\/create\/e60e49f6-4b16-4854-b767-cf4bbfc5e5ee"
}

Raw

{"@context":["https://join-lemmy.org/context.json","https://www.w3.org/ns/activitystreams"],"actor":"https://lemmy.world/c/selfhosted","to":["https://www.w3.org/ns/activitystreams#Public"],"object":{"id":"https://lemmy.dbzer0.com/activities/create/7ac98185-c49b-4aea-8329-6c8098059599","actor":"https://lemmy.dbzer0.com/u/mic_check_one_two","@context":["https://join-lemmy.org/context.json","https://www.w3.org/ns/activitystreams"],"to":["https://www.w3.org/ns/activitystreams#Public"],"object":{"type":"Note","id":"https://lemmy.dbzer0.com/comment/21410638","attributedTo":"https://lemmy.dbzer0.com/u/mic_check_one_two","to":["https://www.w3.org/ns/activitystreams#Public"],"cc":["https://lemmy.world/c/selfhosted","https://lemmy.blahaj.zone/u/Lyra_Lycan"],"content":"<p>That’s called <a href=\"https://en.m.wikipedia.org/wiki/Split-horizon_DNS\" rel=\"nofollow\">split DNS</a>. You can probably use that term to figure out if a particular router supports it. Basically, you would tell the router “if a DNS request for a specific URL is coming from a local IP, use a different (usually local) DNS table”. So like you can tell it “if a device asks for this URL, route it to this local IP instead.” So the DNS request never actually leaves your network.</p>\n<p>It can be handy for cases where you don’t always want to be reliant on an external DNS server. For instance, if your internet is spotty. You don’t want your Jellyfin to stop working just because your internet went out; Everything is local, so it <em>should</em> be able to connect. But if you’re only using an external DNS provider, it won’t be able to connect without internet. So split DNS will allow you to connect to local services even when your internet is out.</p>\n<p>The big downside to split DNS is that you often run into DNSSEC (DNS over https) warnings. Since the URL was intercepted before it actually reached an external DNS server, the traffic isn’t taking the path that the service “expected” it to take. So it may throw some warnings, or refuse to connect because it thinks your traffic is being intercepted, (because… Well… <em>It is being intercepted</em>… By you.)</p>\n","inReplyTo":"https://lemmy.blahaj.zone/comment/16393409","mediaType":"text/html","source":{"content":"That’s called [split DNS](https://en.m.wikipedia.org/wiki/Split-horizon_DNS). You can probably use that term to figure out if a particular router supports it. Basically, you would tell the router “if a DNS request for a specific URL is coming from a local IP, use a different (usually local) DNS table”. So like you can tell it “if a device asks for this URL, route it to this local IP instead.” So the DNS request never actually leaves your network. \n\nIt can be handy for cases where you don’t always want to be reliant on an external DNS server. For instance, if your internet is spotty. You don’t want your Jellyfin to stop working just because your internet went out; Everything is local, so it _should_ be able to connect. But if you’re only using an external DNS provider, it won’t be able to connect without internet. So split DNS will allow you to connect to local services even when your internet is out.\n\nThe big downside to split DNS is that you often run into DNSSEC (DNS over https) warnings. Since the URL was intercepted before it actually reached an external DNS server, the traffic isn’t taking the path that the service “expected” it to take. So it may throw some warnings, or refuse to connect because it thinks your traffic is being intercepted, (because… Well… *It is being intercepted*… By you.)","mediaType":"text/markdown"},"published":"2025-09-16T01:40:35.792881Z","tag":[{"href":"https://lemmy.blahaj.zone/u/Lyra_Lycan","name":"@Lyra_Lycan@lemmy.blahaj.zone","type":"Mention"}],"distinguished":false,"language":{"identifier":"en","name":"English"},"audience":"https://lemmy.world/c/selfhosted","attachment":[]},"cc":["https://lemmy.world/c/selfhosted","https://lemmy.blahaj.zone/u/Lyra_Lycan"],"tag":[{"href":"https://lemmy.blahaj.zone/u/Lyra_Lycan","name":"@Lyra_Lycan@lemmy.blahaj.zone","type":"Mention"}],"type":"Create","audience":"https://lemmy.world/c/selfhosted"},"cc":["https://lemmy.world/c/selfhosted/followers"],"type":"Announce","id":"https://lemmy.world/activities/announce/create/e60e49f6-4b16-4854-b767-cf4bbfc5e5ee"}

Response

Response Headers

Header Value
cache-control
"no-cache, private"
content-type
"application/activity+json"
date
"Tue, 16 Sep 2025 01:41:19 GMT"
x-debug-token
"e08ff9"

Cookies

Request Cookies

No request cookies

Response Cookies

No response cookies

Session 1

Session Metadata

No session metadata

Session Attributes

No session attributes

Session Usage

1 Usages
Stateless check enabled
Usage
Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage:41
[
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/security-core/Authentication/Token/Storage/UsageTrackingTokenStorage.php"
    "line" => 41
    "function" => "getMetadataBag"
    "class" => "Symfony\Component\HttpFoundation\Session\Session"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Authenticator/RememberMeAuthenticator.php"
    "line" => 69
    "function" => "getToken"
    "class" => "Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Authentication/AuthenticatorManager.php"
    "line" => 111
    "function" => "supports"
    "class" => "Symfony\Component\Security\Http\Authenticator\RememberMeAuthenticator"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Firewall/AuthenticatorManagerListener.php"
    "line" => 34
    "function" => "supports"
    "class" => "Symfony\Component\Security\Http\Authentication\AuthenticatorManager"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Authenticator/Debug/TraceableAuthenticatorManagerListener.php"
    "line" => 40
    "function" => "supports"
    "class" => "Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/security-bundle/Debug/WrappedLazyListener.php"
    "line" => 38
    "function" => "supports"
    "class" => "Symfony\Component\Security\Http\Authenticator\Debug\TraceableAuthenticatorManagerListener"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Firewall/AbstractListener.php"
    "line" => 25
    "function" => "supports"
    "class" => "Symfony\Bundle\SecurityBundle\Debug\WrappedLazyListener"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/security-bundle/Security/LazyFirewallContext.php"
    "line" => 60
    "function" => "__invoke"
    "class" => "Symfony\Component\Security\Http\Firewall\AbstractListener"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/security-bundle/Debug/TraceableFirewallListener.php"
    "line" => 80
    "function" => "__invoke"
    "class" => "Symfony\Bundle\SecurityBundle\Security\LazyFirewallContext"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Firewall.php"
    "line" => 95
    "function" => "callListeners"
    "class" => "Symfony\Bundle\SecurityBundle\Debug\TraceableFirewallListener"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/Debug/WrappedListener.php"
    "line" => 116
    "function" => "onKernelRequest"
    "class" => "Symfony\Component\Security\Http\Firewall"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/EventDispatcher.php"
    "line" => 220
    "function" => "__invoke"
    "class" => "Symfony\Component\EventDispatcher\Debug\WrappedListener"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/EventDispatcher.php"
    "line" => 56
    "function" => "callListeners"
    "class" => "Symfony\Component\EventDispatcher\EventDispatcher"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/Debug/TraceableEventDispatcher.php"
    "line" => 139
    "function" => "dispatch"
    "class" => "Symfony\Component\EventDispatcher\EventDispatcher"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/http-kernel/HttpKernel.php"
    "line" => 157
    "function" => "dispatch"
    "class" => "Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/http-kernel/HttpKernel.php"
    "line" => 76
    "function" => "handleRaw"
    "class" => "Symfony\Component\HttpKernel\HttpKernel"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/http-kernel/Kernel.php"
    "line" => 197
    "function" => "handle"
    "class" => "Symfony\Component\HttpKernel\HttpKernel"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/symfony/runtime/Runner/Symfony/HttpKernelRunner.php"
    "line" => 35
    "function" => "handle"
    "class" => "Symfony\Component\HttpKernel\Kernel"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/vendor/autoload_runtime.php"
    "line" => 29
    "function" => "run"
    "class" => "Symfony\Component\Runtime\Runner\Symfony\HttpKernelRunner"
    "type" => "->"
  ]
  [
    "file" => "/var/www/kbin/kbin/public/index.php"
    "line" => 7
    "args" => [
      "/var/www/kbin/kbin/vendor/autoload_runtime.php"
    ]
    "function" => "require_once"
  ]
]

Flashes

Flashes

No flash messages were created.

Server Parameters

Server Parameters

Defined in .env

Key Value
APP_ENV
"dev"
APP_SECRET
"82ce1339a6c267e28d1f1dcb37a7454c"
CORS_ALLOW_ORIGIN
"^https?://(kbin.localhost|127\.0\.0\.1)(:[0-9]+)?$"
DATABASE_URL
"postgresql://kbin:917eaa3d703f19d123@127.0.0.1:5433/kbin?serverVersion=15&charset=utf8"
HCAPTCHA_SECRET
""
HCAPTCHA_SITE_KEY
""
JWT_PASSPHRASE
""
JWT_PUBLIC_KEY
"%kernel.project_dir%/config/jwt/public.pem"
JWT_SECRET_KEY
"%kernel.project_dir%/config/jwt/private.pem"
KBIN_ADMIN_ONLY_OAUTH_CLIENTS
"false"
KBIN_API_ITEMS_PER_PAGE
"25"
KBIN_CAPTCHA_ENABLED
"false"
KBIN_CONTACT_EMAIL
"kbin@j0h.nl"
KBIN_DEFAULT_LANG
"en"
KBIN_DOMAIN
"kbin.spritesserver.nl"
KBIN_FEDERATION_ENABLED
"true"
KBIN_FEDERATION_PAGE_ENABLED
"true"
KBIN_HEADER_LOGO
"false"
KBIN_JS_ENABLED
"true"
KBIN_META_DESCRIPTION
"a private kbin install"
KBIN_META_KEYWORDS
"kbin, content agregator, open source, fediverse"
KBIN_META_TITLE
"Sprites kbin instance"
KBIN_REGISTRATIONS_ENABLED
"true"
KBIN_SENDER_EMAIL
"kbin@j0h.nl"
KBIN_STORAGE_URL
"https://kbin.spritesserver.nl/media/"
KBIN_TITLE
"/kbin"
LOCK_DSN
"flock"
MAILER_DSN
"smtp://spritesmods.com"
MERCURE_JWT_SECRET
"231e9a1277f5585d52aa0b1e34c0f984xxxx"
MERCURE_PUBLIC_URL
"https://kbin.spritesserver.nl/.well-known/mercure"
MERCURE_URL
"http://localhost:3000/.well-known/mercure"
MESSENGER_TRANSPORT_DSN
"doctrine://default"
OAUTH_FACEBOOK_ID
""
OAUTH_FACEBOOK_SECRET
""
OAUTH_GITHUB_ID
""
OAUTH_GITHUB_SECRET
""
OAUTH_GOOGLE_ID
""
OAUTH_GOOGLE_SECRET
""
POSTGRES_DB
"kbin"
POSTGRES_PASSWORD
"917eaa3d703f19d123"
POSTGRES_USER
"kbin"
POSTGRES_VERSION
"15"
REDIS_DNS
"redis://uSJBDOQfuOMgt8kyGhpUzViTnQSEdEJTsOIsYSsg3v40v@localhost"
REDIS_PASSWORD
"uSJBDOQfuOMgt8kyGhpUzViTnQSEdEJTsOIsYSsg3v40v"
S3_BUCKET
"media.karab.in"
S3_KEY
""
S3_REGION
"eu-central-1"
S3_SECRET
""
S3_VERSION
"latest"

Defined as regular env variables

Key Value
APP_DEBUG
"1"
CONTENT_LENGTH
"4378"
CONTENT_TYPE
"application/activity+json"
CONTEXT_DOCUMENT_ROOT
"/var/www/kbin/kbin/public"
CONTEXT_PREFIX
""
DOCUMENT_ROOT
"/var/www/kbin/kbin/public"
GATEWAY_INTERFACE
"CGI/1.1"
HTTPS
"on"
HTTP_ACCEPT
"*/*"
HTTP_ACCEPT_ENCODING
"gzip"
HTTP_DATE
"Tue, 16 Sep 2025 01:41:19 GMT"
HTTP_DIGEST
"SHA-256=1vui+BS6HE58rDaTFP03OyWwY0Ipv5WFaEBjD1bqBDI="
HTTP_HOST
"kbin.spritesserver.nl"
HTTP_SIGNATURE
"keyId="https://lemmy.world/c/selfhosted#main-key",algorithm="hs2019",headers="(request-target) content-type date digest host",signature="cZvzDWegxaLDKQ/HlnVGnrn/n+UgRrfFte9UtMz9F0UlMY0q8Lj4N09Jo/GkknDrviWD7qBf4GQHiwyDubz3v4i5pVueV7EOHs2CwsvhY3nwXBIXHdc49hnlg1DixgwIkJPJuh9CEeS9/MwrA2zFR3wvJ/pXD4cyOB8BaTfpiNQTDCC0y1UDzD1uFr8jBg3EB+LgcOh5uoATXQ4Us+dfTFtr8PfBMJknThPE5MN399xIEMfsJnTdMG7IT2q/eEioEpaGFhrquJCvxkn1n1SExjAIdr5H1+1icpb6hEL5I2KWz5cDBCBhW3nCjxETsw0sXwZkReWZZqaWY/h6SC/T2w==""
HTTP_TRACEPARENT
"00-77876f1dce9419c0ddcb1e0885fd4e5c-f38a23b71efd1a13-01"
HTTP_TRACESTATE
""
HTTP_USER_AGENT
"Lemmy/0.19.12-4-gd8445881a; +https://lemmy.world"
PATH
"/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
PHP_SELF
"/index.php"
QUERY_STRING
""
REDIRECT_HTTPS
"on"
REDIRECT_SSL_CIPHER
"TLS_AES_256_GCM_SHA384"
REDIRECT_SSL_CIPHER_ALGKEYSIZE
"256"
REDIRECT_SSL_CIPHER_EXPORT
"false"
REDIRECT_SSL_CIPHER_USEKEYSIZE
"256"
REDIRECT_SSL_CLIENT_VERIFY
"NONE"
REDIRECT_SSL_COMPRESS_METHOD
"NULL"
REDIRECT_SSL_PROTOCOL
"TLSv1.3"
REDIRECT_SSL_SECURE_RENEG
"true"
REDIRECT_SSL_SERVER_A_KEY
"rsaEncryption"
REDIRECT_SSL_SERVER_A_SIG
"sha256WithRSAEncryption"
REDIRECT_SSL_SERVER_I_DN
"CN=R11,O=Let's Encrypt,C=US"
REDIRECT_SSL_SERVER_I_DN_C
"US"
REDIRECT_SSL_SERVER_I_DN_CN
"R11"
REDIRECT_SSL_SERVER_I_DN_O
"Let's Encrypt"
REDIRECT_SSL_SERVER_M_SERIAL
"05810C9E80363EEC654D4CF67BDD9E360F0C"
REDIRECT_SSL_SERVER_M_VERSION
"3"
REDIRECT_SSL_SERVER_SAN_DNS_0
"kbin.spritesserver.nl"
REDIRECT_SSL_SERVER_S_DN
"CN=kbin.spritesserver.nl"
REDIRECT_SSL_SERVER_S_DN_CN
"kbin.spritesserver.nl"
REDIRECT_SSL_SERVER_V_END
"Oct 26 21:01:51 2025 GMT"
REDIRECT_SSL_SERVER_V_START
"Jul 28 21:01:52 2025 GMT"
REDIRECT_SSL_SESSION_ID
"d837e4edbcf5d12173950c04087a9375862b3c1000a94bf42bc520949dd6ee0e"
REDIRECT_SSL_SESSION_RESUMED
"Resumed"
REDIRECT_SSL_TLS_SNI
"kbin.spritesserver.nl"
REDIRECT_SSL_VERSION_INTERFACE
"mod_ssl/2.4.62"
REDIRECT_SSL_VERSION_LIBRARY
"OpenSSL/3.0.16"
REDIRECT_STATUS
"200"
REDIRECT_URL
"/f/inbox"
REMOTE_ADDR
"135.181.143.221"
REMOTE_PORT
"40678"
REQUEST_METHOD
"POST"
REQUEST_SCHEME
"https"
REQUEST_TIME
1757986879
REQUEST_TIME_FLOAT
1757986879.292
REQUEST_URI
"/f/inbox"
SCRIPT_FILENAME
"/var/www/kbin/kbin/public/index.php"
SCRIPT_NAME
"/index.php"
SERVER_ADDR
"5.9.62.165"
SERVER_ADMIN
"webmaster@spritesmods.com"
SERVER_NAME
"kbin.spritesserver.nl"
SERVER_PORT
"443"
SERVER_PROTOCOL
"HTTP/1.1"
SERVER_SIGNATURE
""
SERVER_SOFTWARE
"Apache"
SSL_CIPHER
"TLS_AES_256_GCM_SHA384"
SSL_CIPHER_ALGKEYSIZE
"256"
SSL_CIPHER_EXPORT
"false"
SSL_CIPHER_USEKEYSIZE
"256"
SSL_CLIENT_VERIFY
"NONE"
SSL_COMPRESS_METHOD
"NULL"
SSL_PROTOCOL
"TLSv1.3"
SSL_SECURE_RENEG
"true"
SSL_SERVER_A_KEY
"rsaEncryption"
SSL_SERVER_A_SIG
"sha256WithRSAEncryption"
SSL_SERVER_I_DN
"CN=R11,O=Let's Encrypt,C=US"
SSL_SERVER_I_DN_C
"US"
SSL_SERVER_I_DN_CN
"R11"
SSL_SERVER_I_DN_O
"Let's Encrypt"
SSL_SERVER_M_SERIAL
"05810C9E80363EEC654D4CF67BDD9E360F0C"
SSL_SERVER_M_VERSION
"3"
SSL_SERVER_SAN_DNS_0
"kbin.spritesserver.nl"
SSL_SERVER_S_DN
"CN=kbin.spritesserver.nl"
SSL_SERVER_S_DN_CN
"kbin.spritesserver.nl"
SSL_SERVER_V_END
"Oct 26 21:01:51 2025 GMT"
SSL_SERVER_V_START
"Jul 28 21:01:52 2025 GMT"
SSL_SESSION_ID
"d837e4edbcf5d12173950c04087a9375862b3c1000a94bf42bc520949dd6ee0e"
SSL_SESSION_RESUMED
"Resumed"
SSL_TLS_SNI
"kbin.spritesserver.nl"
SSL_VERSION_INTERFACE
"mod_ssl/2.4.62"
SSL_VERSION_LIBRARY
"OpenSSL/3.0.16"
SYMFONY_DOTENV_VARS
"KBIN_DOMAIN,KBIN_TITLE,KBIN_DEFAULT_LANG,KBIN_FEDERATION_ENABLED,KBIN_CONTACT_EMAIL,KBIN_SENDER_EMAIL,KBIN_JS_ENABLED,KBIN_REGISTRATIONS_ENABLED,KBIN_API_ITEMS_PER_PAGE,KBIN_STORAGE_URL,KBIN_META_TITLE,KBIN_META_DESCRIPTION,KBIN_META_KEYWORDS,KBIN_HEADER_LOGO,KBIN_CAPTCHA_ENABLED,KBIN_FEDERATION_PAGE_ENABLED,REDIS_PASSWORD,REDIS_DNS,S3_KEY,S3_SECRET,S3_BUCKET,S3_REGION,S3_VERSION,OAUTH_FACEBOOK_ID,OAUTH_FACEBOOK_SECRET,OAUTH_GOOGLE_ID,OAUTH_GOOGLE_SECRET,OAUTH_GITHUB_ID,OAUTH_GITHUB_SECRET,KBIN_ADMIN_ONLY_OAUTH_CLIENTS,APP_ENV,APP_SECRET,POSTGRES_DB,POSTGRES_USER,POSTGRES_PASSWORD,POSTGRES_VERSION,DATABASE_URL,MESSENGER_TRANSPORT_DSN,MAILER_DSN,MERCURE_URL,MERCURE_PUBLIC_URL,MERCURE_JWT_SECRET,CORS_ALLOW_ORIGIN,LOCK_DSN,JWT_SECRET_KEY,JWT_PUBLIC_KEY,JWT_PASSPHRASE,HCAPTCHA_SITE_KEY,HCAPTCHA_SECRET"