To clarify, I meant I don't run nginx.org's nginx server that they have. ;)
The remaining IP tests by SSLLabs shows the same behavior -
https://www.ssllabs.com/ssltest/analyze.html?d=nginx.org&latest - so
it's just a case of these servers being configured to only use TLS 1.2.
POSSIBLY they'r
So, I don't run the NGINX webserver, but I am pretty sure this is on the
remote server to serve the protocol right. SSLLabs test shows that TLS
1.3 is just not offered.
https://www.ssllabs.com/ssltest/analyze.html?d=nginx.org&s=3.125.197.172&latest
There's three other IPs (one IPv4 and two IP
So I have to downgrade to TLS v1.2. The full command input and the connection
process can be shown as follows:
./curl -v --http2-prior-knowledge --tlsv1.2 https://nginx.org
* Trying 52.58.199.22:443...
* Connected to nginx.org (52.58.199.22) port 443 (#0)
* ALPN, offering h2
* ALPN, offering
I just did a cURL request just now using the command in Windows Powershell
using the MinGW version of cURL.
`./curl -v --http2-prior-knowledge --tlsv1.3 https://nginx.org`
And my curl specs are as follows
curl 7.74.0 (x86_64-pc-win32) libcurl/7.74.0 OpenSSL/1.1.1i (Schannel)
zlib/1.2.11 brotl