-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Future of OCSP Stapling? #1641
Comments
The OCSP stapling is in the current NCSC TLS guidelines, which are currently in review. There are already some test certificates, e.g. $ openssl s_client -showcerts -connect test1.pki.microsoft.com:443 -verify_quiet </dev/null 2>/dev/null | openssl x509 -noout -ocsp_uri Internet.nl website test of test1.pki.microsoft.com still produces an ℹ️ informational/notice, even though OCSP (stapling) is not possible. Probably this should be extended with a new state for not available: Lines 79 to 82 in 0a16ff7
It should be noted that some browsers have OCSP checking by default off, and e.g. use combined CRLSets. Related, Internet.nl currently does not check for revocation by checking OCSP, CRL or CRLSet/CRLite: Another thing I wonder: could you also staple a revoked OCSP response, and get a ✅? |
This is rewritten in the sslyze, so only fix this in the tls-update. |
Let's Encrypt has announced this:
https://letsencrypt.org/2024/12/05/ending-ocsp/
Does this require a change on the internet.nl test?
The text was updated successfully, but these errors were encountered: