Bonjour,

Le mardi 1 octobre 2013 11:20:10 UTC+2, Chema Lopez a écrit :
> El jueves, 26 de septiembre de 2013 17:10:36 UTC+2, Erwann Abalea  escribió:
> > Bonjour,
> > 
> > Le mercredi 25 septembre 2013 10:37:10 UTC+2, Chema Lopez a écrit :
> > 
> > > Dear all, we are proud to announce that we have solved the issues 
> > > detected by Erwann Abalea.
> > > 
> > > Is it possible to continue with the process, now? Remember, test URL is:
> > >  https://publifirma.firmaprofesional.com/
> > 
> > The OCSP responder certificate has the "OCSPNoCheck" extension.
> > 
> > But the OCSP service is still unavailable for GET requests. There's no more 
> > recursive 302 redirections, but the service isn't available.
> > 
> > Therefore, your OCSP service isn't BR compliant.
> 
> Dear all,
> 
> We have fixed the issues kindly reported by Erwann Abalea.

Still no.

Look at RFC2560/6960 section A.1, describing the format of a request sent over 
HTTP:

   An OCSP request using the GET method is constructed as follows:

   GET {url}/{url-encoding of base-64 encoding of the DER encoding of
   the OCSPRequest}

That is, some characters from the base64 representation of the request are 
transformed:
 / is transformed into %2F
 + is transformed into %2B
 = is transformed into %3D
and your OCSP responder is supposed to reverse that transformation (only once), 
then base-64 decode the string, and continue with the process (OCSP request 
parsing, etc).

Your OCSP service don't show any problem when + and = are URL-encoded, but when 
a / is URL-encoded, an HTTP 404 error is returned.

If you want to see it in practice under a different browser (IE, for example), 
clear the OCSP+CRL cache, capture network trafic going from your desktop to 
{ocsp,crl,crl2}.firmaprofesional.com and tcp port 80, and try to connect to the 
test site (publifirma). The browser/OS will first request an OCSP token with a 
GET request (URL-encoded), receive a 404 error, and fallback to CRL download, 
thus hiding the malfunction of the OCSP responder.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to