Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 12 Dec 2015 18:32:54 +0000
From:      bugzilla-noreply@freebsd.org
To:        apache@FreeBSD.org
Subject:   [Bug 201446] Server name indication (sni) is not supported in base OpenSSL
Message-ID:  <bug-201446-16115-8AoDhEOkp9@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-201446-16115@https.bugs.freebsd.org/bugzilla/>
References:  <bug-201446-16115@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201446

Gea-Suan Lin <darkkiller@gmail.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |darkkiller@gmail.com

--- Comment #10 from Gea-Suan Lin <darkkiller@gmail.com> ---
This bug affects curl too, not just openssl cli itself.

gslin@FreeBSD [~] [02:22] uname -a
FreeBSD FreeBSD.cs.nctu.edu.tw 9.3-RELEASE-p30 FreeBSD 9.3-RELEASE-p30 #0: Mon
Nov  2 10:11:50 UTC 2015    
root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC  amd64

gslin@FreeBSD [~] [02:22] curl -v https://i.kfs.io/robots.txt
*   Trying 118.214.255.182...
* Connected to i.kfs.io (118.214.255.182) port 443 (#0)
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
*   CAfile: /usr/local/share/certs/ca-root-nss.crt
  CApath: none
* TLSv1.0 (OUT), TLS handshake, Client hello (1):
* TLSv1.0 (IN), TLS handshake, Server hello (2):
* TLSv1.0 (IN), TLS handshake, Certificate (11):
* TLSv1.0 (OUT), TLS alert, Server hello (2):
* SSL certificate problem: unable to get local issuer certificate
* Closing connection 0
curl: (60) SSL certificate problem: unable to get local issuer certificate
More details here: http://curl.haxx.se/docs/sslcerts.html

curl performs SSL certificate verification by default, using a "bundle"
 of Certificate Authority (CA) public keys (CA certs). If the default
 bundle file isn't adequate, you can specify an alternate file
 using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
 the bundle, the certificate verification probably failed due to a
 problem with the certificate (it might be expired, or the name might
 not match the domain name in the URL).
If you'd like to turn off curl's verification of the certificate, use
 the -k (or --insecure) option.

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-201446-16115-8AoDhEOkp9>