On Thu, 10 Apr 2014, Kurt Roeckx wrote:

What we really need is OCSP stapling.  That would mean that the
server asks the CA for the OCSP response and adds that response
in the TLS session, and the client doesn't have to contact the
CA anymore to ask for the status.  Only the server would need to
contact the CA.  The server should have enough time to be able to
refresh the OCSP response, which is valid for maximum 10 days.

Yes, agreed. Unfortunately not many sites enable it. I think it'd be productive to have Debian-packaged SSL _servers_ all support and document and maybe default to OCSP stapling, so that in a few years, maybe we can have the start of a working revocation protocol. Sadly, there isn't one right now, so I don't there's anything we can do today.

This documentation seems to imply that upstream Apache HTTPD does not usefully support stapling when intermediate certs are in play, which is basically always:

https://httpd.apache.org/docs/trunk/mod/mod_ssl.html#sslusestapling

I'm hereing some vague cases why OCSP mandatory checking can't be
enabled by default because some users can't contact the OCSP
server.  I've never had this problem myself and I think I've seen
way to many weird setups already to not consider this a real
problem.

Well, you'll have the problem as soon as you're being MITM'd. A cert verification solution that works fine when nobody's MITMing you is not particularly useful. :-)

--
Geoffrey Thomas
https://ldpreload.com
geo...@ldpreload.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to