<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>https client error 113</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/119142/https-client-error-113</link><description>sample code: https client 
 sdl version: 2.6.2 
 board: 7002dk 
 question: https client cannot connect to iot.cht.com.tw 
 log: 
 *** Booting nRF Connect SDK v3.5.99-ncs1-2 *** HTTPS client sample started Bringing network interface up Connecting to the</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 04 Mar 2025 14:47:39 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/119142/https-client-error-113" /><item><title>RE: https client error 113</title><link>https://devzone.nordicsemi.com/thread/525765?ContentTypeID=1</link><pubDate>Tue, 04 Mar 2025 14:47:39 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d372a7ab-e2a2-4c97-a275-5dbad62336ff</guid><dc:creator>H&amp;#229;kon Alseth</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Sorry that I took so much time before responding. I have had some connectivity issues towards this server, and needed to debug that in addition to adding RSA 4096 support.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It seems&amp;nbsp;that there&amp;#39;s a problem with the RSA4096 certificate support locally to the project.&lt;/p&gt;
&lt;p&gt;This is my added configuration, for enabling mbedtls + debug traces + RSA4096 support:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;diff --git a/samples/net/https_client/boards/nrf7002dk_nrf5340_cpuapp_ns.conf b/samples/net/https_client/boards/nrf7002dk_nrf5340_cpuapp_ns.conf
index 9b3cdc5961..00da982e25 100644
--- a/samples/net/https_client/boards/nrf7002dk_nrf5340_cpuapp_ns.conf
+++ b/samples/net/https_client/boards/nrf7002dk_nrf5340_cpuapp_ns.conf
@@ -7,7 +7,7 @@
 # General
 CONFIG_POSIX_CLOCK=y
 CONFIG_SYSTEM_WORKQUEUE_STACK_SIZE=4096
-CONFIG_HEAP_MEM_POOL_SIZE=81920
+CONFIG_HEAP_MEM_POOL_SIZE=120000
 CONFIG_NET_RX_STACK_SIZE=2048
 
 # Optimize Wi-Fi stack to save some memory
@@ -68,3 +68,107 @@ CONFIG_MBEDTLS_TLS_LIBRARY=y
 CONFIG_TFM_PROFILE_TYPE_SMALL=y
 CONFIG_PM_PARTITION_SIZE_TFM_SRAM=0xc000
 CONFIG_PM_PARTITION_SIZE_TFM=0x20000
+
+# Added for ncs v2.6.x
+CONFIG_NET_SOCKETS_TLS_SET_MAX_FRAGMENT_LENGTH=n
+CONFIG_MBEDTLS_MPI_MAX_SIZE=512
+CONFIG_NET_LOG=y
+CONFIG_NET_IPV6=n
+CONFIG_MBEDTLS_DEBUG=y
+CONFIG_MBEDTLS_SSL_DEBUG_ALL=y
+CONFIG_MBEDTLS_LOG_LEVEL_DBG=y
+CONFIG_MBEDTLS_DEBUG_C=y
+CONFIG_MBEDTLS_DEBUG_LEVEL=4
+# Handle the large influx of prints
+CONFIG_LOG_BUFFER_SIZE=16384
+
+# Enable ECDSA
+CONFIG_MBEDTLS_ECDSA_C=y
+CONFIG_PSA_WANT_ALG_ECDSA=y
+CONFIG_MBEDTLS_ECDSA_DETERMINISTIC=y
+CONFIG_PSA_WANT_ALG_DETERMINISTIC_ECDSA=y
+CONFIG_PSA_WANT_ALG_HMAC=y # dependency for DETERMINISTIC_ECDSA
+CONFIG_PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT=y # dependency for DETERMINISTIC_ECDSA
+
+# Enable ECC
+CONFIG_MBEDTLS_ECP_C=y
+CONFIG_PSA_WANT_ECC_SECP_R1_256=y
+
+
+# NET sockets
+CONFIG_NET_SOCKETS_SOCKOPT_TLS=y
+CONFIG_NET_SOCKETS_TLS_MAX_CONTEXTS=3
+
+# nRF Security legacy MBed TLS
+CONFIG_NORDIC_SECURITY_BACKEND=y
+CONFIG_MBEDTLS_ENABLE_HEAP=y
+CONFIG_MBEDTLS_HEAP_SIZE=120000
+CONFIG_MBEDTLS_RSA_C=y
+CONFIG_MBEDTLS_PSA_CRYPTO_C=y
+CONFIG_MBEDTLS=y
+CONFIG_MBEDTLS_TLS_LIBRARY=y
+CONFIG_MBEDTLS_SSL_SRV_C=y
+CONFIG_MBEDTLS_SSL_IN_CONTENT_LEN=16384
+CONFIG_MBEDTLS_SSL_OUT_CONTENT_LEN=16384
+
+# Enable TLS protocol options
+CONFIG_NET_SOCKETS_TLS_SET_MAX_FRAGMENT_LENGTH=y
+CONFIG_MBEDTLS_SSL_SERVER_NAME_INDICATION=y
+
+# Enable AES
+CONFIG_MBEDTLS_AES_C=y
+CONFIG_MBEDTLS_CCM_C=y
+CONFIG_MBEDTLS_GCM_C=y
+CONFIG_MBEDTLS_CIPHER_MODE_CBC=y
+CONFIG_MBEDTLS_CIPHER_PADDING_PKCS7=y
+
+# Enable ECC
+CONFIG_MBEDTLS_ECP_C=y
+CONFIG_PSA_WANT_ECC_SECP_R1_256=y
+
+# Enable ECDSA
+CONFIG_MBEDTLS_ECDSA_C=y
+CONFIG_PSA_WANT_ALG_ECDSA=y
+CONFIG_MBEDTLS_ECDSA_DETERMINISTIC=y
+CONFIG_PSA_WANT_ALG_DETERMINISTIC_ECDSA=y
+CONFIG_PSA_WANT_ALG_HMAC=y # dependency for DETERMINISTIC_ECDSA
+CONFIG_PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT=y # dependency for DETERMINISTIC_ECDSA
+
+# Enable ECDH
+CONFIG_MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED=y
+CONFIG_MBEDTLS_ECDH_C=y
+CONFIG_PSA_WANT_ALG_ECDH=y
+
+# Enable EDCHE
+CONFIG_MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED=y
+CONFIG_MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED=y
+
+# Enable RSA
+CONFIG_MBEDTLS_KEY_EXCHANGE_RSA_ENABLED=y
+CONFIG_MBEDTLS_PKCS1_V15=y
+CONFIG_MBEDTLS_MPI_MAX_SIZE=512
+CONFIG_PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY=y
+CONFIG_PSA_WANT_RSA_KEY_SIZE_2048=y
+CONFIG_PSA_WANT_RSA_KEY_SIZE_4096=y
+
+# Enable SHA
+CONFIG_MBEDTLS_SHA256_C=y
+CONFIG_MBEDTLS_SHA512_C=y
+
+# Disable MBEDTLS modules
+CONFIG_MBEDTLS_CTR_DRBG_C=n
+CONFIG_MBEDTLS_CHACHA20_C=n
+CONFIG_MBEDTLS_POLY1305_C=n
+CONFIG_MBEDTLS_DHM_C=n
+CONFIG_MBEDTLS_CMAC_C=n
+CONFIG_MBEDTLS_CIPHER_MODE_CTR=n
+CONFIG_MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED=n
+CONFIG_MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED=n
+CONFIG_MBEDTLS_SHA1_C=n
+
+# DNS
+CONFIG_DNS_RESOLVER=y
+CONFIG_NET_SOCKETS_DNS_TIMEOUT=30000
+CONFIG_NET_SOCKETS_CONNECT_TIMEOUT=30000
+
+CONFIG_RESET_ON_FATAL_ERROR=n&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;.conf file:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/0385.nrf7002dk_5F00_nrf5340_5F00_cpuapp_5F00_ns.conf"&gt;devzone.nordicsemi.com/.../0385.nrf7002dk_5F00_nrf5340_5F00_cpuapp_5F00_ns.conf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This now hangs while trying to connect, and returns a -11 (EAGAIN).&lt;/p&gt;
&lt;p&gt;However, now and again it succeeds:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;*** Booting nRF Connect SDK v3.5.99-ncs1-3 ***
HTTPS client sample started
Bringing network interface up
Provisioning certificate
CA certificate already exists, sec tag: 42
Connecting to the network
[00:00:02.233,184] &amp;lt;inf&amp;gt; wifi_mgmt_ext: Connection requested
[00:00:16.308,380] &amp;lt;inf&amp;gt; net_dhcpv4: Received: 192.168.1.196
Network connectivity established and IP address assigned
Looking up iot.cht.com.tw
Resolved 20.188.24.130 (AF_INET)
Connecting to iot.cht.com.tw:443
... Took away loads of mbedtls debug output
[00:00:13.707,672] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:1997: dumping &amp;#39;raw buffer after decryption&amp;#39; (2 bytes)
[00:00:13.707,946] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:1997: 0000:  01 00                                            ..
[00:00:13.708,007] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:2126: &amp;lt;= decrypt buf
[00:00:13.708,129] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:4017: dumping &amp;#39;input payload after decrypt&amp;#39; (2 bytes)
[00:00:13.708,404] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:4017: 0000:  01 00                                            ..
[00:00:13.708,526] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:5027: got an alert message, type: [1:0]
[00:00:13.708,587] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:5041: is a close notify message
[00:00:13.708,740] &amp;lt;err&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:4177: mbedtls_ssl_handle_message_type() returned -30848 (-0x7880)
[00:00:13.708,892] &amp;lt;err&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:5736: mbedtls_ssl_read_record() returned -30848 (-0x7880)
Received 231 bytes

&amp;gt;        HTTP/1.1 403 Forbidden

Finished, closing socket.
[00:00:13.709,075] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:5974: =&amp;gt; write close notify
[00:00:13.709,167] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:5103: =&amp;gt; send alert message
[00:00:13.709,259] &amp;lt;inf&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:5104: send alert level=1 message=0
[00:00:13.709,320] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:2948: =&amp;gt; write record
[-5:00:13.709,411] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:0937: =&amp;gt; encrypt buf
[00:00:13.709,533] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:0959: dumping &amp;#39;before encrypt: output payload&amp;#39; (2 bytes)
[00:00:13.709,808] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:0959: 0000:  01 00                                            ..
[00:00:13.709,930] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:1186: dumping &amp;#39;IV used (internal)&amp;#39; (12 bytes)
[00:00:13.710,388] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:1186: 0000:  e5 fa 89 08 00 00 00 00 00 00 00 02              ............
[00:00:13.710,723] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:1188: dumping &amp;#39;IV used (transmitted)&amp;#39; (8 bytes)
[00:00:13.711,120] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:1188: 0000:  00 00 00 00 00 00 00 02                          ........
[00:00:13.711,242] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:1191: dumping &amp;#39;additional data used for AEAD&amp;#39; (13 bytes)
[00:00:13.711,730] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:1191: 0000:  00 00 00 00 00 00 00 02 15 03 03 00 02           .............
[00:00:13.711,853] &amp;lt;inf&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:1193: before encrypt: msglen = zu, including 0 bytes of padding
[00:00:13.712,127] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:1227: dumping &amp;#39;after encrypt: tag&amp;#39; (16 bytes)
[00:00:13.712,646] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:1227: 0000:  93 9e b9 ae 5f 07 9e db dc 3c ee b7 d2 75 99 5c  ...._....&amp;lt;...u.\
[00:00:13.712,707] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:1478: &amp;lt;= encrypt buf
[00:00:13.712,860] &amp;lt;inf&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:3032: output record: msgtype = 21, version = [3:3], msglen = zu
[00:00:13.712,982] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:3037: dumping &amp;#39;output record sent to network&amp;#39; (31 bytes)
[00:00:13.713,500] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:3037: 0000:  15 03 03 00 1a 00 00 00 00 00 00 00 02 75 51 93  .............uQ.
[00:00:13.713,989] &amp;lt;dbg&amp;gt; mbedtls: zephyr_mbedtls_debug: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:3037: 0010:  9e b9 ae 5f 07 9e db dc 3c ee b7 d2 75 99 5c     ..._....&amp;lt;...u.\
[00:00:13.714,050] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:2358: =&amp;gt; flush output
[00:00:13.714,172] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:2372: message length: zu, out_left: zu
[00:00:13.714,874] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:2379: ssl-&amp;gt;f_send() returned 31 (-0xffffffe1)
[00:00:13.714,935] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:2406: &amp;lt;= flush output
[00:00:13.714,996] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:3085: &amp;lt;= write record
[00:00:13.715,057] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:5115: &amp;lt;= send alert message
[00:00:13.715,148] &amp;lt;wrn&amp;gt; mbedtls: WEST_TOPDIR/modules/crypto/mbedtls/library/ssl_msg.c:5985: &amp;lt;= write close notify
Network connectivity lost&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So I suspect I have a bad connection towards the server.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Could you try this at your end and see if it works now?&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;/p&gt;
&lt;p&gt;Håkon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: https client error 113</title><link>https://devzone.nordicsemi.com/thread/524734?ContentTypeID=1</link><pubDate>Wed, 26 Feb 2025 07:57:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7b43d3b2-2e4c-43ca-93a0-4f838d5bfb5a</guid><dc:creator>shaman</dc:creator><description>&lt;p&gt;I found&amp;nbsp;&lt;span&gt;HiPKI Root CA - G1 at&amp;nbsp;&lt;a id="" href="https://eca.hinet.net/repository-h/download/HRCA_b64.crt"&gt;https://eca.hinet.net/repository-h/download/HRCA_b64.crt&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;and i change CMakeLists.txt&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;    cert/DigiCertGlobalG2.pem
    ${gen_dir}/DigiCertGlobalG2.pem.inc
 &lt;/pre&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;to&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;    cert/HRCA_b64.crt
    ${gen_dir}/DigiCertGlobalG2.pem.inc
 &lt;/pre&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;connection failed.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Same code on 9151 ok.&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: https client error 113</title><link>https://devzone.nordicsemi.com/thread/524726?ContentTypeID=1</link><pubDate>Wed, 26 Feb 2025 07:34:47 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ac0ddf6d-5ebc-4cd4-81b6-abc937f11e5d</guid><dc:creator>shaman</dc:creator><description>&lt;p&gt;How to add to my project? I searched Kconfig GUI and not found.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: https client error 113</title><link>https://devzone.nordicsemi.com/thread/524013?ContentTypeID=1</link><pubDate>Fri, 21 Feb 2025 08:28:00 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:02238d32-b87c-44f7-b65a-f6fc3a0d0523</guid><dc:creator>H&amp;#229;kon Alseth</dc:creator><description>&lt;p&gt;You need to add &amp;quot;HiPKI Root CA - G1&amp;quot; to your project and use that for verifying this specific domain.&lt;/p&gt;
&lt;p&gt;Here&amp;#39;s a screenshot from my browser when inspecting the domain:&lt;/p&gt;
&lt;p&gt;&lt;img style="max-height:240px;max-width:320px;" src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/pastedimage1740126473298v1.png" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;/p&gt;
&lt;p&gt;Håkon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: https client error 113</title><link>https://devzone.nordicsemi.com/thread/523981?ContentTypeID=1</link><pubDate>Fri, 21 Feb 2025 02:04:23 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fa4b9532-1a16-456d-841f-9668df3f0fec</guid><dc:creator>shaman</dc:creator><description>&lt;p&gt;How? That is s&lt;span&gt;erver certificate, I could not ask them to change?&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: https client error 113</title><link>https://devzone.nordicsemi.com/thread/523868?ContentTypeID=1</link><pubDate>Thu, 20 Feb 2025 10:59:41 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:956a0fac-0f28-4ff7-b040-698cf53eb72e</guid><dc:creator>H&amp;#229;kon Alseth</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
[quote user="shaman"]* issuer: C=TW; O=Chunghwa Telecom Co., Ltd.; CN=HiPKI OV TLS CA - G1[/quote]
&lt;p&gt;Could you try with &amp;quot;HiPKI Root CA - G1&amp;quot; instead?&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;/p&gt;
&lt;p&gt;Håkon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: https client error 113</title><link>https://devzone.nordicsemi.com/thread/523866?ContentTypeID=1</link><pubDate>Thu, 20 Feb 2025 10:52:53 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f5ffe788-9b70-48e8-b76e-7583319ea6c6</guid><dc:creator>shaman</dc:creator><description>&lt;p&gt;using the same pem file&lt;/p&gt;
&lt;p&gt;% curl -v -I --cacert cert/DigiCertGlobalRootG2.pem &lt;a href="https://iot.cht.com.tw"&gt;https://iot.cht.com.tw&lt;/a&gt;&lt;br /&gt;* Host iot.cht.com.tw:443 was resolved.&lt;br /&gt;* IPv6: (none)&lt;br /&gt;* IPv4: 20.188.24.130&lt;br /&gt;* Trying 20.188.24.130:443...&lt;br /&gt;* Connected to iot.cht.com.tw (20.188.24.130) port 443&lt;br /&gt;* ALPN: curl offers h2,http/1.1&lt;br /&gt;* (304) (OUT), TLS handshake, Client hello (1):&lt;br /&gt;* CAfile: cert/DigiCertGlobalRootG2.pem&lt;br /&gt;* CApath: none&lt;br /&gt;* (304) (IN), TLS handshake, Server hello (2):&lt;br /&gt;* (304) (IN), TLS handshake, Unknown (8):&lt;br /&gt;* (304) (IN), TLS handshake, Certificate (11):&lt;br /&gt;* (304) (IN), TLS handshake, CERT verify (15):&lt;br /&gt;* (304) (IN), TLS handshake, Finished (20):&lt;br /&gt;* (304) (OUT), TLS handshake, Finished (20):&lt;br /&gt;* SSL connection using TLSv1.3 / AEAD-AES256-GCM-SHA384 / [blank] / UNDEF&lt;br /&gt;* ALPN: server accepted h2&lt;br /&gt;* Server certificate:&lt;br /&gt;* subject: C=TW; L=\U81FA\U5317\U5E02; O=\U4E2D\U83EF\U96FB\U4FE1\U80A1\U4EFD\U6709\U9650\U516C\U53F8; CN=*.iot.cht.com.tw&lt;br /&gt;* start date: Dec 16 09:45:19 2024 GMT&lt;br /&gt;* expire date: Dec 16 09:45:19 2025 GMT&lt;br /&gt;* subjectAltName: host &amp;quot;iot.cht.com.tw&amp;quot; matched cert&amp;#39;s &amp;quot;iot.cht.com.tw&amp;quot;&lt;br /&gt;* issuer: C=TW; O=Chunghwa Telecom Co., Ltd.; CN=HiPKI OV TLS CA - G1&lt;br /&gt;* SSL certificate verify ok.&lt;br /&gt;* using HTTP/2&lt;br /&gt;* [HTTP/2] [1] OPENED stream for &lt;a href="https://iot.cht.com.tw/"&gt;https://iot.cht.com.tw/&lt;/a&gt;&lt;br /&gt;* [HTTP/2] [1] [:method: HEAD]&lt;br /&gt;* [HTTP/2] [1] [:scheme: https]&lt;br /&gt;* [HTTP/2] [1] [:authority: iot.cht.com.tw]&lt;br /&gt;* [HTTP/2] [1] [:path: /]&lt;br /&gt;* [HTTP/2] [1] [user-agent: curl/8.7.1]&lt;br /&gt;* [HTTP/2] [1] [accept: */*]&lt;br /&gt;&amp;gt; HEAD / HTTP/2&lt;br /&gt;&amp;gt; Host: iot.cht.com.tw&lt;br /&gt;&amp;gt; User-Agent: curl/8.7.1&lt;br /&gt;&amp;gt; Accept: */*&lt;br /&gt;&amp;gt; &lt;br /&gt;* Request completely sent off&lt;br /&gt;&amp;lt; HTTP/2 403 &lt;br /&gt;HTTP/2 403 &lt;br /&gt;&amp;lt; server: nginx&lt;br /&gt;server: nginx&lt;br /&gt;&amp;lt; date: Thu, 20 Feb 2025 10:51:46 GMT&lt;br /&gt;date: Thu, 20 Feb 2025 10:51:46 GMT&lt;br /&gt;&amp;lt; content-type: text/html; charset=utf-8&lt;br /&gt;content-type: text/html; charset=utf-8&lt;br /&gt;&amp;lt; content-length: 146&lt;br /&gt;content-length: 146&lt;br /&gt;&amp;lt; strict-transport-security: max-age=31536000; includeSubDomains; preload&lt;br /&gt;strict-transport-security: max-age=31536000; includeSubDomains; preload&lt;br /&gt;&amp;lt;&lt;/p&gt;
&lt;p&gt;* Connection #0 to host iot.cht.com.tw left intact&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>