Hi Jesus and Erwann,

I belive the problem you mentioned about our OCSP responder accepting 
URL-encoded OCSP requests is fixed. Could you be so kind to check this again?

Best Regards,

Volkan Nergiz
TURKTRUST, Inc.

-----Original Message-----
From: dev-security-policy 
[mailto:dev-security-policy-bounces+volkan.nergiz=turktrust.com...@lists.mozilla.org]
 On Behalf Of Jesus F
Sent: Thursday, March 5, 2015 12:32 PM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: TurkTrust Root Renewal Request

Hi Volkan,

Look at RFC2560/6960 section A.1, describing the format of a request sent over 
HTTP: 

   An OCSP request using the GET method is constructed as follows: 

   GET {url}/{url-encoding of base-64 encoding of the DER encoding of 
   the OCSPRequest} 

That is, some characters from the base64 representation of the request are 
transformed: 
 / is transformed into %2F
 + is transformed into %2B
 = is transformed into %3D
and your OCSP responder is supposed to reverse that transformation (only once), 
then base-64 decode the string, and continue with the process (OCSP request 
parsing, etc).

It seems your OCSP responder doesn't accept URL-encoded OCSP requests, or at 
least the "%2F".

For exemple,
http://ocsp.turktrust.com.tr/MG8wbTBGMEQwQjAJBgUrDgMCGgUABBQQ2AK0bL%2FGhSj1k0wefmhq3OpH2QQUm2YLShhBeYBnKwY4pSPDzSCPzccCCQFsT3pmwByBWqIjMCEwHwYJKwYBBQUHMAECBBIEEHVUJl9ozL9EVAJGSJJt7yA%3D
gives a 400 error, and if I change "%2F" into "/", I get an OCSP response. 

May this can help you: I think this is the same error that Mr Erwann Abalea 
detected on this OCSP Responder in May 2012 (See "TURKTRUST Additional Root 
Inclusion Request" discussion).

Cheers,
J


El miércoles, 4 de marzo de 2015, 17:33:02 (UTC+1), Volkan Nergiz  escribió:
> Hi All,
> 
> #1: As far as we know, our OCSP server already works with HTTP GET requests.
> When we analyze the logs, we see many GET requests that are being responded 
> successfully.
> 
> For example, we have generated the OCSP request below, using the 
> openssl tool, for the certificate of 
> https://testsuite12002.turktrust.com.tr/
> 
> MG8wbTBGMEQwQjAJBgUrDgMCGgUABBQQ2AK0bL/GhSj1k0wefmhq3OpH2QQUm2YLShhBeY
> BnKwY4pSPDzSCPzccCCQFsT3pmwByBWqIjMCEwHwYJKwYBBQUHMAECBBIEEHVUJl9ozL9E
> VAJGSJJt7yA=
> 
> When we paste this request to the address bar of Firefox 36.0 as:
> 
> http://ocsp.turktrust.com.tr/MG8wbTBGMEQwQjAJBgUrDgMCGgUABBQQ2AK0bL/Gh
> Sj1k0wefmhq3OpH2QQUm2YLShhBeYBnKwY4pSPDzSCPzccCCQFsT3pmwByBWqIjMCEwHwY
> JKwYBBQUHMAECBBIEEHVUJl9ozL9EVAJGSJJt7yA=
> 
> we get a successful "good" answer using HTTP GET.
> 
> Could you please share with us the name of the OCSP client tool and the 
> content of the request, or any other clue that made you think that our OCSP 
> server does not support HTTP GET?
> 
> Best Regards,
> 
> Volkan Nergiz
> TURKTRUST, Inc.
> 
> -----Original Message-----
> From: dev-security-policy 
> [mailto:dev-security-policy-bounces+volkan.nergiz=turktrust.com.tr@lis
> ts.mozilla.org] On Behalf Of Jesus F
> Sent: Tuesday, March 3, 2015 6:28 PM
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: TurkTrust Root Renewal Request
> 
> Hi all,
> 
> After some quick test of the OCSP Service I detect the following issues 
> related to the conformity with CA/Browser Forum Baseline Requirements for the 
> Issuance and Management of Publicly-Trusted Certificates (hereinafter BR) as 
> required by section 12 of Mozilla CA Certificate Inclusion Policy v2.2:
> 
> Test site: https://testsuite12001.turktrust.com.tr
> Test site: https://testsuite12002.turktrust.com.tr
> Ocsp: http://ocsp.turktrust.com.tr/
> 
> #1: OCSP do not respond using GET method. (BR section 13.2.2)
> #2: Although the OCSP do not respond "good" to a non-issued certifcate 
> (serials FFFFFFFFFFFFFFFFFF and 000000000000000000) (BR Section 
> 13.2.6), it responds "unknown".  This is not in accordance with RFC 
> 6960 (section 2.2) contrary to what is stated in section 7.3 of the CP 
> (http://dl.turktrust.com.tr/pdf/TURKTRUST-CP-v09-SSL.pdf)
> 
> Cheers,
> J
> 
> 
> 
> El martes, 3 de marzo de 2015, 16:37:21 (UTC+1), Volkan Nergiz  escribió:
> > Dear All,
> > 
> >  
> > 
> > The issue is actually quite clear and explicitly stated in TURKTRUST 
> > CP and CPS documents. Please see 
> > <http://dl.turktrust.com.tr/pdf/TURKTRUST-CP-v09-SSL.pdf>
> > http://dl.turktrust.com.tr/pdf/TURKTRUST-CP-v09-SSL.pdf and 
> > <http://dl.turktrust.com.tr/pdf/TURKTRUST-CPS-v09-SSL.pdf>
> > http://dl.turktrust.com.tr/pdf/TURKTRUST-CPS-v09-SSL.pdf for the 
> > English versions of TURKTRUST CP and CPS regarding SSL, EV SSL and 
> > Object Signing
> > (OSC) certificate services.
> > 
> >  
> > 
> > Currently, TURKTRUST has three explicit OIDs for SSL, EV SSL and OSC 
> > certificates as follows with dedicated policies:
> > 
> >  
> > 
> > 1.            TURKTRUST SSL Certificate Policy (2.16.792.3.0.3.1.1.2) covers
> > OV SSL certificates for servers. SSL Certificates are issued and 
> > maintained in conformity with "Normalized Certificate Policy" 
> > defined in ETSI TS 102 042.
> > 
> > 2.            TURKTRUST OSC Policy (2.16.792.3.0.3.1.1.4) covers
> > certificates related to object signing operations. OSC is issued and 
> > maintained in conformity with "Normalized Certificate Policy" 
> > defined in ETSI TS 102 042.
> > 
> > 3.            TURKTRUST EV SSL Policy (2.16.792.3.0.3.1.1.5) covers
> > certificates related to EV SSL certificates. EV SSL certificates are 
> > issued and maintained in conformity with ""Extended Validity Certificate 
> > Policy"
> > defined in ETSI TS 102 042.
> > 
> >  
> > 
> > For EV SSL services, we have a separate EV root in our new 
> > hierarchies as mandated by the CA/Browser Forum EV Guidelines. This 
> > is the "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6" root 
> > certificate.
> > 
> >  
> > 
> > For OV SSL and code signing (OSC), we have another separate root 
> > certificate, namely  "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5"
> > root certificate.
> > 
> >  
> > 
> > For our qualified electronic certificate (QEC) services related to 
> > our e-signature based operations, we have a totally different root called 
> > H4.
> > This is out of discussion in this context.
> > 
> >  
> > 
> > Hence, the primary distinction related to our discussion is that we 
> > have two separate roots for EV SSL services and the others.
> > 
> >  
> > 
> > The second distinction is that, we have separate sub-root certificates, i.e.
> > intermediate certificates, for our OV SSL  and OSC certificate 
> > services under the root H5. That is to say, all certificate types 
> > have different policies, different OIDs, different intermediates and 
> > different operational processes.
> > 
> >  
> > 
> > We hope, these explanations clarify the issue for all. Should you 
> > have and further questions, please do not hesitate to contact us.
> > 
> >  
> > 
> > Best regards,
> > 
> >  
> > 
> > Volkan NERGİZ
> > 
> > 
> > Quality Management System Specialist
> > 
> >  
> > 
> > 
> > 
> > TURKTRUST Information Security Services Inc.
> > 
> > Address: Hollanda Caddesi 696. Sokak No: 7 Yıldız, Çankaya 06550 - 
> > ANKARA
> > 
> > Phone: (312) 439 10 00 - 226 Fax: (312) 439 10 01
> > 
> > E-Mail:  <mailto:volkan.ner...@turktrust.com.tr>
> > volkan.ner...@turktrust.com.tr
> > 
> > Web:  <http://www.turktrust.com.tr/> www.turktrust.com.tr
> _______________________________________________
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to