$ openssl s_client -connect brave-browser-rpm-release.s3.brave.com:443 2>/dev/null | fgrep bit
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
Server Temp Key: X25519, 253 bits
Server public key is 2048 bit
Not totally sure what curl is complaining about here, but my first guess would be that it can’t verify the site’s certificate chain; and in most cases, when dealing with public CAs, this is some kind of an issue with the local certificate store.
Does curl work properly when fetching other random public sites?
Well of course, nothing has been changed so I would expect the behavior to continue.
On that same system what happens if you browse (with Brave, Chrome, or Chromium) to the same https://brave-browser-rpm-release.s3.brave.com/x86_64/repodata/repomd.xml URL?
And if you also have Firefox on that system, what happens with the same URL in that browser?
The error at this address with both browsers is:
This XML file does not appear to have any style information associated with it. The document tree is shown below.
I notice that the ckecksum is in sha256 while the signatures are in 4096 bits since January 23, 2023.
The solution from the link works and there was just an update from Brave.