The test client class in Mozilla's NSS has been helpfull for me as well:
http://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_2_1_RTM/src/nss-3.2.1/mozilla/security/nss/cmd/tstclnt/tstclnt.c

I had used tstclnt when on-boarding a CA into the mozilla program in the
past.


Thanks,
~Gordon


On Mon, Jun 29, 2015 at 9:51 AM, David Keeler <[email protected]> wrote:

> Please file a new bug here:
>
> https://bugzilla.mozilla.org/enter_bug.cgi?product=Core&component=Security%3A%20PSM
>
> To debug the issue, it would be helpful to have packet captures of the
> failing TLS handshakes and any related OCSP requests. This can be done
> with tcpdump or wireshark - let me know if you want more details on
> that. At the very least, knowing what domains are failing would be useful.
>
> Thanks!
>
> On 06/28/2015 07:08 AM, David E. Ross wrote:
> > I am getting a number of failures to reach Web sites.  The error message
> > says:
> >
> > An error occurred during a connection to [some domain].
> > Invalid OCSP signing certificate in OCSP response.
> > (Error code: sec_error_ocsp_invalid_signing_cert)
> >
> >
>
>
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to