阿里云的 ecs 有一台不正常,其他的正常,本地正常。
不正常的那一台有时正常,有时就返回 curl 52 ,试了重新安装 openssl 和 curl ,没有用
curl -v "https://xx.xx.xx.xx" * Trying xx.xx.x.x:443... * Connected to xx.xx.xx.xx (xx.xx.xx.xx) port 443 (#0) * Initializing NSS with certpath: sql:/etc/pki/nssdb * CAfile: none * CApath: none * loaded libnssckbi.so * ALPN: server did not agree on a protocol. Uses default. * SSL connection using TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 * Server certificate: * subject: CN=xx.xx.xx.xx * start date: Apr 01 00:00:00 2022 GMT * expire date: Apr 01 23:59:59 2023 GMT * common name: xx.xx.xx.xx * issuer: CN=Encryption Everywhere DV TLS CA - G1,OU=www.digicert.com,O=DigiCert Inc,C=US > GET /ggfwzc/auth/gateway.do HTTP/1.1 > Host: xx.xx.xx.xx > User-Agent: curl/7.85.0 > Accept: */* > * Empty reply from server * Closing connection 0 curl: (52) Empty reply from server 另外装的 curl
* Trying xx.xx.xx.xx:443... * Connected to xx.xx.xx.xx (xx.xx.xx.xx) port 443 (#0) * ALPN: offers http/1.1 * Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH * CAfile: /etc/pki/tls/certs/ca-bundle.crt * CApath: none * TLSv1.2 (OUT), TLS header, Certificate Status (22): * TLSv1.2 (OUT), TLS handshake, Client hello (1): * TLSv1.2 (IN), TLS handshake, Server hello (2): * TLSv1.2 (IN), TLS handshake, Certificate (11): * TLSv1.2 (IN), TLS handshake, Server key exchange (12): * TLSv1.2 (IN), TLS handshake, Server finished (14): * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): * TLSv1.2 (OUT), TLS handshake, Finished (20): * TLSv1.2 (IN), TLS change cipher, Change cipher spec (1): * TLSv1.2 (IN), TLS handshake, Finished (20): * SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 * ALPN: server did not agree on a protocol. Uses default. * Server certificate: * subject: CN=xx.xx.xx.xx * start date: Apr 1 00:00:00 2022 GMT * expire date: Apr 1 23:59:59 2023 GMT * subjectAltName: host "xx.xx.xx.xx" matched cert's "xx.xx.xx.xx" * issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=Encryption Everywhere DV TLS CA - G1 * SSL certificate verify ok. > GET /ggfwzc/auth/gateway.do HTTP/1.1 > Host: xx.xx.xx.xx > User-Agent: curl/7.85.0 > Accept: */* > * TLSv1.2 (IN), TLS alert, close notify (256): * Empty reply from server * Closing connection 0 * TLSv1.2 (OUT), TLS alert, close notify (256): curl: (52) Empty reply from server 