OK, I have it now. For some reason the patch hunk against CHANGES and the docs fail to apply. I have removed those hunks and the patch applied cleanly now. Here is the output from curl: > + curl --verbose --http1.1 --anyauth -u : -f -s --upload-file target/lda-docgen-webapp-0.2-SNAPSHOT-backend-dev-anon.war -o manager-response.txt 'https://sitex-ldadw.ad001.siemens.net/backend-dev-anon/manager-1/text/deploy?path=/backend-dev-anon&update=false&version=009' > * Uses proxy env variable NO_PROXY == 'localhost .siemens.net .siemens.com .siemens.de' > * Trying 147.54.64.149... > * TCP_NODELAY set > * Connected to sitex-ldadw.ad001.siemens.net (147.54.64.149) port 443 (#0) > * ALPN, offering http/1.1 > * successfully set certificate verify locations: > * CAfile: /usr/local/etc/ssl/cert.pem > CApath: none > } [5 bytes data] > * TLSv1.3 (OUT), TLS handshake, Client hello (1): > } [512 bytes data] > * TLSv1.3 (IN), TLS handshake, Server hello (2): > { [122 bytes data] > * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): > { [25 bytes data] > * TLSv1.3 (IN), TLS handshake, Certificate (11): > { [6195 bytes data] > * TLSv1.3 (IN), TLS handshake, CERT verify (15): > { [520 bytes data] > * TLSv1.3 (IN), TLS handshake, Finished (20): > { [52 bytes data] > * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): > } [1 bytes data] > * TLSv1.3 (OUT), TLS handshake, Finished (20): > } [52 bytes data] > * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 > * ALPN, server accepted to use http/1.1 > * Server certificate: > * subject: C=DE; O=Siemens; OU=LDA DW; CN=sitex-ldadw.ad001.siemens.net > * start date: Mar 19 13:10:13 2019 GMT > * expire date: Mar 19 13:10:13 2020 GMT > * subjectAltName: host "sitex-ldadw.ad001.siemens.net" matched cert's "sitex-ldadw.ad001.siemens.net" > * issuer: C=DE; ST=Bayern; L=Muenchen; O=Siemens; serialNumber=ZZZZZZB7; OU=Siemens Trust Center; CN=Siemens Issuing CA Intranet Server 2017 > * SSL certificate verify ok. > } [5 bytes data] > > PUT /backend-dev-anon/manager-1/text/deploy?path=/backend-dev-anon&update=false&version=009 HTTP/1.1 > > Host: sitex-ldadw.ad001.siemens.net > > User-Agent: curl/7.64.1 > > Accept: */* > > Content-Length: 6501669 > > Expect: 100-continue > > > { [5 bytes data] > * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): > { [297 bytes data] > * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): > { [297 bytes data] > * old SSL session ID is stale, removing > { [5 bytes data] > < HTTP/1.1 401 > < Date: Wed, 03 Apr 2019 13:04:06 GMT > < Server: Apache/2.4.39 (FreeBSD) OpenSSL/1.1.1a-freebsd mod_auth_gssapi/1.6.1 > < X-Frame-Options: SAMEORIGIN > < Cache-Control: private > < Expires: Thu, 01 Jan 1970 00:00:00 GMT > < WWW-Authenticate: Negotiate > < Content-Type: text/html;charset=utf-8 > < Content-Language: en > < Content-Length: 802 > < Connection: close > < > * Closing connection 0 > } [5 bytes data] > * TLSv1.3 (OUT), TLS alert, close notify (256): > } [2 bytes data] > * Issue another request to this URL: 'https://sitex-ldadw.ad001.siemens.net/backend-dev-anon/manager-1/text/deploy?path=/backend-dev-anon&update=false&version=009' > * Uses proxy env variable NO_PROXY == 'localhost .siemens.net .siemens.com .siemens.de' > * Hostname sitex-ldadw.ad001.siemens.net was found in DNS cache > * Trying 147.54.64.149... > * TCP_NODELAY set > * Connected to sitex-ldadw.ad001.siemens.net (147.54.64.149) port 443 (#1) > * ALPN, offering http/1.1 > * successfully set certificate verify locations: > * CAfile: /usr/local/etc/ssl/cert.pem > CApath: none > * SSL re-using session ID > } [5 bytes data] > * TLSv1.3 (OUT), TLS handshake, Client hello (1): > } [680 bytes data] > * TLSv1.3 (IN), TLS handshake, Server hello (2): > { [128 bytes data] > * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): > { [21 bytes data] > * TLSv1.3 (IN), TLS handshake, Finished (20): > { [52 bytes data] > * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): > } [1 bytes data] > * TLSv1.3 (OUT), TLS handshake, Finished (20): > } [52 bytes data] > * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 > * ALPN, server accepted to use http/1.1 > * Server certificate: > * subject: C=DE; O=Siemens; OU=LDA DW; CN=sitex-ldadw.ad001.siemens.net > * start date: Mar 19 13:10:13 2019 GMT > * expire date: Mar 19 13:10:13 2020 GMT > * subjectAltName: host "sitex-ldadw.ad001.siemens.net" matched cert's "sitex-ldadw.ad001.siemens.net" > * issuer: C=DE; ST=Bayern; L=Muenchen; O=Siemens; serialNumber=ZZZZZZB7; OU=Siemens Trust Center; CN=Siemens Issuing CA Intranet Server 2017 > * SSL certificate verify ok. > * Server auth using Negotiate with user '' > } [5 bytes data] > > PUT /backend-dev-anon/manager-1/text/deploy?path=/backend-dev-anon&update=false&version=009 HTTP/1.1 > > Host: sitex-ldadw.ad001.siemens.net > > Authorization: Negotiate YIIR9QYGKwYBBQUCoIIR6TCCEe... > > User-Agent: curl/7.64.1 > > Accept: */* > > Content-Length: 6501669 > > Expect: 100-continue > > > { [5 bytes data] > * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): > { [297 bytes data] > * old SSL session ID is stale, removing > * Done waiting for 100-continue > } [5 bytes data] > < HTTP/1.1 100 > } [5 bytes data] > * We are completely uploaded and fine > { [5 bytes data] > < HTTP/1.1 200 > < Date: Wed, 03 Apr 2019 13:04:09 GMT > < Server: Apache/2.4.39 (FreeBSD) OpenSSL/1.1.1a-freebsd mod_auth_gssapi/1.6.1 > < X-Frame-Options: SAMEORIGIN > < Cache-Control: private > < Expires: Thu, 01 Jan 1970 00:00:00 GMT > < WWW-Authenticate: Negotiate oYH1MIHyoAMKAQChCwYJKoZIhvcSA... > < X-Content-Type-Options: nosniff > < Content-Type: text/plain;charset=utf-8 > < Transfer-Encoding: chunked > < > { [78 bytes data] > * Connection #1 to host sitex-ldadw.ad001.siemens.net left intact > * Closing connection 1 Looking forward to 2.4.40...