On 22.06., Theo Buehler wrote:
> On Fri, Jun 21, 2019 at 01:28:03PM +0200, Reyk Floeter wrote:
> > On Thu, Jun 20, 2019 at 07:58:10PM +0200, Bruno Flueckiger wrote:
> > > Hi,
> > >
> > > The patch below adds OCSP stapling to the TLS server in relayd(8). The
> > > OCSP response is read from a binary
On Fri, Jun 21, 2019 at 01:28:03PM +0200, Reyk Floeter wrote:
> On Thu, Jun 20, 2019 at 07:58:10PM +0200, Bruno Flueckiger wrote:
> > Hi,
> >
> > The patch below adds OCSP stapling to the TLS server in relayd(8). The
> > OCSP response is read from a binary encoded DER file that can be created
> >
On Thu, Jun 20, 2019 at 07:58:10PM +0200, Bruno Flueckiger wrote:
> Hi,
>
> The patch below adds OCSP stapling to the TLS server in relayd(8). The
> OCSP response is read from a binary encoded DER file that can be created
> using ocspcheck(8).
>
> If a file with the same name as the certificate a
Hi Bruno,
thanks for your efforts. I‘ve already written an OCSP patch which was being
delayed in review.
I don’t have the patch at hand but you can see the branch at
https://github.com/reyk/relayd/tree/ocsp
Reyk
> Am 20.06.2019 um 19:58 schrieb Bruno Flueckiger :
>
> Hi,
>
> The patch below
Hi,
The patch below adds OCSP stapling to the TLS server in relayd(8). The
OCSP response is read from a binary encoded DER file that can be created
using ocspcheck(8).
If a file with the same name as the certificate and private key files is
found, its content is loaded and OCSP stapling is active