From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 13510 invoked from network); 10 May 2023 20:38:13 -0000 Received: from 9front.inri.net (168.235.81.73) by inbox.vuxu.org with ESMTPUTF8; 10 May 2023 20:38:13 -0000 Received: from sirjofri.de ([5.45.105.127]) by 9front; Wed May 10 16:35:27 -0400 2023 Received: from dummy.faircode.eu ([95.90.217.101]) by sirjofri.de; Wed May 10 22:35:19 +0200 2023 Date: Wed, 10 May 2023 22:35:16 +0200 (GMT+02:00) From: sirjofri To: 9front@9front.org Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Correlation-ID: List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: non-blocking responsive element-scale self-signing HTTP replication dependency optimizer Subject: [9front] https with tcp80 in 2023? Reply-To: 9front@9front.org Precedence: bulk Hey all, I had this script working for quite some time now, but somehow my modern browsers started refusing to connect to it (something about unsupported protocols). Any ideas? tcp443: #!/bin/rc exec /bin/tlssrv -c/sys/lib/tls/acmed/sirjofri.de.crt /bin/tcp80 sirjofri