On 28/09/2020 23.35, John Robson via openssl-users wrote:
> # curl https://server.fqdn
>
>
> 302 Found
>
> Found
> The document has moved href="https://server.fqdn:443/path/";>here.
>
>
> OpenSSL:
> # openssl s_client -connect server.fqdn:443
> CONNECTED(0007)
> depth=1 CN = CAINTER, O =
On 01/03/2019 12.34, Sravani Maddukuri via openssl-users wrote:
> Hi,
>
> Earlier our application used OpenSSL version 1.0.2n. Now we wanted to
> upgrade to 1.1.1b.
> After upgrade when i compile OpenSSL, i see the following errors:
>
> Tried to generate the Makefile with both the ways mentioned
On 27/02/2019 19.53, Michael Richardson wrote:
>
> Christian Heimes wrote:
> > I'm concerned about the version number of the upcoming major release of
> > OpenSSL. "OpenSSL 3.0" just sounds and looks way too close to "SSL 3.0".
> > I
Hi,
I'm concerned about the version number of the upcoming major release of
OpenSSL. "OpenSSL 3.0" just sounds and looks way too close to "SSL 3.0".
It took us more than a decade to teach people that SSL 3.0 is bad and
should be avoided in favor of TLS. In my humble opinion, it's
problematic and c
Hi,
I'm one of the maintainers of Python's ssl module. A couple of days ago
Hanno Böck opened an issue [1] against ssl.get_server_certificate()
function [2][3]. It's a helper function to retrieve the end-entity
certificate from a remote TLS/SSL server over an unverified connection.
The implementa
Am 25.11.2013 17:14, schrieb Sassan Panahinejad:
> Hi,
>
> I am dealing with a CA certificate bundle, similar to this one:
> https://github.com/twitter/secureheaders/blob/master/config/curl-ca-bundle.crt,
> like the example, the one I am dealing with was automatically generated
> from mozilla's ce