i run nginx/1.23.2 on linux after a clear reboot, on first access to my site front page, I see in log
==> /var/log/nginx/example.com.443.error.log <== 2022/11/09 12:38:15 [info] 1460#1460: *2 SSL_do_handshake() failed (SSL: error:0A000412:SSL routines::sslv3 alert bad certificate:SSL alert number 42) while SSL handshaking, client: 2601:...:xxx1, server: [2600:...:xxx6]:443 if I immediately just reload the page in browser, no more problem; the page renders ok, SSL check out, all site nav is fine subsequent hits to the front page are also OK i use include letsencrypt certs. digging around, i found this from 2013 Can't get OCSP stapling to work, despite openssl working fine https://success.qualys.com/discussions/s/question/0D52L00004TnuFdSAJ/cant-get-ocsp-stapling-to-work-despite-openssl-working-fine my config includes, ssl_stapling on; ssl_stapling_verify on; ssl_stapling_responder http://r3.o.lencr.org/; server { ssl_trusted_certificate ...; } checking, after cold reboot, 1st connect returns an OCSP missing response echo | openssl s_client -connect example.com:443 -servername example.com -tls1_3 -tlsextdebug -status CONNECTED(00000003) ... depth=0 CN = example.com verify return:1 !! OCSP response: no response sent ... --- SSL handshake has read 4384 bytes and written 318 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_CHACHA20_POLY1305_SHA256 Server public key is 384 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- DONE but an immediately subsequent 2nd try returns a response echo | openssl s_client -connect example.com:443 -servername example.com -tls1_3 -tlsextdebug -status CONNECTED(00000003) ... verify return:1 OCSP response: ====================================== OCSP Response Data: OCSP Response Status: successful (0x0) Response Type: Basic OCSP Response Version: 1 (0x0) Responder Id: C = US, O = Let's Encrypt, CN = R3 Produced At: Nov 9 17:09:00 2022 GMT Responses: Certificate ID: Hash Algorithm: sha1 Issuer Name Hash: 48D...3D1 Issuer Key Hash: 142...2BC Serial Number: 022...84E Cert Status: good This Update: Nov 9 17:00:00 2022 GMT Next Update: Nov 16 16:59:58 2022 GMT Signature Algorithm: sha256WithRSAEncryption Signature Value: 09:...:cf ====================================== ... --- SSL handshake has read 4894 bytes and written 318 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_CHACHA20_POLY1305_SHA256 Server public key is 384 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- DONE so far, this^^ is 100% reproducible for me; always/only on first load after boot this 'feels' like a timeout before OCSP is cached, and no issues after. not sure reading up at https://nginx.org/en/docs/http/ngx_http_ssl_module.html i see ssl_stapling_responder "Overrides the URL of the OCSP responder specified in the “Authority Information Access” certificate extension." which i use, but also ssl_ocsp_responder "Overrides the URL of the OCSP responder specified in the “Authority Information Access” certificate extension for validation of client certificates. " which I don't currently. what's the difference in function/usage between those two? As far as caching, I also see ssl_ocsp_cache which i haven't defined, so it's at default ssl_ocsp_cache off any clues as to what's missing/misconfig'd and responsible for the 1st-time-only fails I see? _______________________________________________ nginx mailing list -- nginx@nginx.org To unsubscribe send an email to nginx-le...@nginx.org