Am Mi., 16. Apr. 2025 um 22:09 Uhr schrieb Bryce Chidester <br...@cobryce.com>:
> Here's Linux/curl for example.
> $ curl --cert-status https://www.openbsd.org
> curl: (91) OCSP response has expired

Can reproduce on 7.5:

> curl --cert-status --verbose https://www.openbsd.org
* Host www.openbsd.org:443 was resolved.
* IPv6: 2620:3d:c000:178::80
* IPv4: 199.185.178.80
*   Trying [2620:3d:c000:178::80]:443...
* Connected to www.openbsd.org (2620:3d:c000:178::80) port 443
* ALPN: curl offers h2,http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
*  CAfile: /etc/ssl/cert.pem
*  CApath: none
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Unknown (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / [blank] / UNDEF
* ALPN: server did not agree on a protocol. Uses default.
* Server certificate:
*  subject: CN=www.openbsd.org
*  start date: Apr  4 15:53:55 2025 GMT
*  expire date: Jul  3 15:53:54 2025 GMT
*  subjectAltName: host "www.openbsd.org" matched cert's "www.openbsd.org"
*  issuer: C=US; O=Let's Encrypt; CN=R11
*  SSL certificate verify ok.
*   Certificate level 0: Public key type ? (4096/128 Bits/secBits),
signed using sha256WithRSAEncryption
*   Certificate level 1: Public key type ? (2048/112 Bits/secBits),
signed using sha256WithRSAEncryption
*   Certificate level 2: Public key type ? (4096/128 Bits/secBits),
signed using sha256WithRSAEncryption
* OCSP response has expired
* closing connection #0
curl: (91) OCSP response has expired

Reply via email to