Package: openssl Version: 1.0.2e-1 Severity: normal openssl s_server -www does not send a Content-Length header. This can be reproduced from the test/certs directory of the openssl source package with:
openssl s_server -CAfile rootCA.pem -key rootCA.key -cert rootCA.pem -www and with wget -S --no-check-certificate https://localhost:4433 which gives errors "The TLS connection was non-properly terminated." According to https://savannah.gnu.org/bugs/?45792 this is not a bug in wget (same problem with curl). A Content-Length header must be provided. -- System Information: Debian Release: stretch/sid APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'stable-updates'), (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 4.3.0-1-amd64 (SMP w/8 CPU cores) Locale: LANG=POSIX, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages openssl depends on: ii libc6 2.21-6 ii libssl1.0.2 1.0.2e-1 openssl recommends no packages. Versions of packages openssl suggests: ii ca-certificates 20160104 -- no debconf information