Buy commercial curl support. We
help you work out your issues, debug your libcurl applications, use the API,
port to new platforms, add new features and more. With a team lead by the
curl founder Daniel himself.
Re: Inquiry on Reproducing CVE-2024-8096: OCSP Stapling Bypass with GnuTLS
- Contemporary messages sorted: [ by date ] [ by thread ] [ by subject ] [ by author ] [ by messages with attachments ]
From: Daniel Stenberg via curl-library <curl-library_at_lists.haxx.se>
Date: Sun, 22 Sep 2024 19:59:59 +0200 (CEST)
On Sun, 22 Sep 2024, aquilamacedo--- via curl-library wrote:
> Could anyone provide insights on how the server was configured to return the
> "unauthorized (6)" error? I would like to replicate this error for testing
> purposes.
I suspect Hiroki Kurosawa (who reported that issue and set up the server) is
not a subsrciber of this mailing list.
Date: Sun, 22 Sep 2024 19:59:59 +0200 (CEST)
On Sun, 22 Sep 2024, aquilamacedo--- via curl-library wrote:
> Could anyone provide insights on how the server was configured to return the
> "unauthorized (6)" error? I would like to replicate this error for testing
> purposes.
I suspect Hiroki Kurosawa (who reported that issue and set up the server) is
not a subsrciber of this mailing list.
-- / daniel.haxx.se | Commercial curl support up to 24x7 is available! | Private help, bug fixes, support, ports, new features | https://curl.se/support.html -- Unsubscribe: https://lists.haxx.se/mailman/listinfo/curl-library Etiquette: https://curl.se/mail/etiquette.htmlReceived on 2024-09-22