It's fine with me also, some of my user's reported the problem.I can access your site. Have you try another browser? IE, perhaps?
I experienced this on a client site. Once I installed my own OpenSSL packages into server, all issues were gone. Honestly, I'm not sure if it was just related to SSL, as I did a server revamp and installed all Axivo rpm's (PHP, MariaDB, Nginx, OpenSSL).Is this a ssl/https mis-configuration?
SSLClientSocket::NextProtoStatus status =
SSLClientSocket::kNextProtoUnsupported;
std::string proto;
std::string server_protos;
// GetNextProto will fail and and trigger a NOTREACHED if we pass in a socket
// that hasn't had SSL_ImportFD called on it. If we get a certificate error
// here, then we know that we called SSL_ImportFD.
if (result == OK || IsCertificateError(result))
status = ssl_socket_->GetNextProto(&proto, &server_protos);
// If we want spdy over npn, make sure it succeeded.
if (status == SSLClientSocket::kNextProtoNegotiated) {
ssl_socket_->set_was_npn_negotiated(true);
NextProto protocol_negotiated =
SSLClientSocket::NextProtoFromString(proto);
ssl_socket_->set_protocol_negotiated(protocol_negotiated);
// If we negotiated a SPDY version, it must have been present in
// SSLConfig::next_protos.
// TODO(mbelshe): Verify this.
if (protocol_negotiated >= kProtoSPDYMinimumVersion &&
protocol_negotiated <= kProtoSPDYMaximumVersion) {
ssl_socket_->set_was_spdy_negotiated(true);
}
}
if (params_->want_spdy_over_npn() && !ssl_socket_->was_spdy_negotiated())
return ERR_NPN_NEGOTIATION_FAILED;
IMO, clearing the cache won't help. It is clearly a server software related issue.Try getting end users to clear their browser caches and see if it happens again. Matt nice work finding that code, looks like the error occurs when the web server - Nginx announces to end user's browser that this server supports SPDY but for some reason the SSL handshake doesn't actually support SPDY.
This: http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_stapling_responderIMO, is not related to your certificate or Nginx settings. My client used a Starfield SSL certificate, the same I have installed on my site. Users on his site reported same problems you have and once I upgraded his servers with Axivo rpm's, all issues were gone.
Just curious, why do you use a specific ssl_stapling_responder URL?
We use essential cookies to make this site work, and optional cookies to enhance your experience.