-
-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
No shared cipher #6534
Comments
#codetriage $ crystal --version
Crystal 0.26.1 (2018-08-27)
LLVM: 6.0.1
Default target: x86_64-apple-macosx On version 0.26.1, the repro provides this error:
A quick rewrite to conform to 0.26.0 (see #5960 and #6533 ) is: require "http/server"
tls = OpenSSL::SSL::Context::Server.new
tls.private_key = "private.key"
tls.certificate_chain = "fullchain.crt"
server = HTTP::Server.new do |context|
context.response.content_type = "text/plain"
context.response.print "Hello world!"
end
server.bind_tls "127.0.0.1", 443, tls
puts "Listening on example.com:443"
server.listen And the subsequent verification: $ openssl s_client -connect 127.0.0.1:443
CONNECTED(00000003)
depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
verify error:num=20:unable to get local issuer certificate
verify return:0
---
.... So it appears to be resolved. @MrSorcus I'd recommend testing in your environment with the latest release to confirm, and recommend closure. |
The server doesn't crash anymore when it can't complete a TLS handshake (thats #6577). But the real solution should establish a TLS session with ECC cert. |
Looks like that works with 0.26.1
|
Description
Doesn't work with ECC certificate (works with RSA).
Steps to Reproduce
Expected behavior: Get correct TLS session.
Actual behavior:
Reproduces how often: Everytime
Versions
The text was updated successfully, but these errors were encountered: