I did the same test again via VPN from Canada and getting good results:
root@vmxws1:~# curl -Iv --http0.9 https://kohanyim.com/
* Trying 67.0.88.50:443...
* Connected to kohanyim.com (67.0.88.50) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
* CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server did not agree to a protocol
* Server certificate:
* subject: CN=kohanyim.com
* start date: Apr 17 06:18:17 2022 GMT
* expire date: Apr 17 06:18:16 2023 GMT
* subjectAltName: host "kohanyim.com" matched cert's "kohanyim.com"
* issuer: C=PA; O=TrustCor Systems S. de R.L.; CN=TrustCor DV SSL CA - G2 - RSA
* SSL certificate verify ok.
> HEAD / HTTP/1.1
> Host: kohanyim.com
> User-Agent: curl/7.74.0
> Accept: */*
>
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
HTTP/1.1 200 OK
< Date: Mon, 09 May 2022 03:21:23 GMT
Date: Mon, 09 May 2022 03:21:23 GMT
< Server: Apache/2.4.37 (rocky) OpenSSL/1.1.1k mod_fcgid/2.3.9
Server: Apache/2.4.37 (rocky) OpenSSL/1.1.1k mod_fcgid/2.3.9
< Last-Modified: Sun, 08 May 2022 21:56:34 GMT
Last-Modified: Sun, 08 May 2022 21:56:34 GMT
< ETag: "1c86-5de872a400ceb"
ETag: "1c86-5de872a400ceb"
< Accept-Ranges: bytes
Accept-Ranges: bytes
< Content-Length: 7302
Content-Length: 7302
< Content-Type: text/html; charset=UTF-8
Content-Type: text/html; charset=UTF-8
<
* Connection #0 to host kohanyim.com left intact
and
root@vmxws1:~# curl -Iv https://kohanyim.com/
* Trying 67.0.88.50:443...
* Connected to kohanyim.com (67.0.88.50) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
* CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server did not agree to a protocol
* Server certificate:
* subject: CN=kohanyim.com
* start date: Apr 17 06:18:17 2022 GMT
* expire date: Apr 17 06:18:16 2023 GMT
* subjectAltName: host "kohanyim.com" matched cert's "kohanyim.com"
* issuer: C=PA; O=TrustCor Systems S. de R.L.; CN=TrustCor DV SSL CA - G2 - RSA
* SSL certificate verify ok.
> HEAD / HTTP/1.1
> Host: kohanyim.com
> User-Agent: curl/7.74.0
> Accept: */*
>
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
HTTP/1.1 200 OK
< Date: Mon, 09 May 2022 03:27:07 GMT
Date: Mon, 09 May 2022 03:27:07 GMT
< Server: Apache/2.4.37 (rocky) OpenSSL/1.1.1k mod_fcgid/2.3.9
Server: Apache/2.4.37 (rocky) OpenSSL/1.1.1k mod_fcgid/2.3.9
< Last-Modified: Sun, 08 May 2022 21:56:34 GMT
Last-Modified: Sun, 08 May 2022 21:56:34 GMT
< ETag: "1c86-5de872a400ceb"
ETag: "1c86-5de872a400ceb"
< Accept-Ranges: bytes
Accept-Ranges: bytes
< Content-Length: 7302
Content-Length: 7302
< Content-Type: text/html; charset=UTF-8
Content-Type: text/html; charset=UTF-8
<
* Connection #0 to host kohanyim.com left intact
and the same with www.kohanyim.com and roaddriversplus.com and HAProxy Backends are executing properly. . And now I will test it on my Rocky Server Box using each domain per VM.