On 23.10.2014 02:59, traw...@apache.org wrote: > Author: trawick > Date: Thu Oct 23 00:59:40 2014 > New Revision: 1633730 > > URL: http://svn.apache.org/r1633730 > Log: > add OCSP Stapling configuration, disabled by default > > Modified: > httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in > > Modified: httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in > URL: > http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in?rev=1633730&r1=1633729&r2=1633730&view=diff > ============================================================================== > --- httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in (original) > +++ httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in Thu Oct 23 00:59:40 > 2014 > @@ -73,6 +73,31 @@ SSLPassPhraseDialog builtin > SSLSessionCache "shmcb:ssl_scache(512000)" > SSLSessionCacheTimeout 300 > > +# OCSP Stapling (requires OpenSSL 0.9.8h or later) > +# > +# This feature is disabled by default and requires at least > +# the two directives SSLUseStapling and SSLStaplingCache. > +# Refer to the documentation on OCSP Stapling in the SSL/TLS > +# How-To for more information. > +# > +# Enable stapling for all SSL-enabled servers: > +#SSLUseStapling On
OCSP stapling is primarily a per-certificate feature - so my suggestion would be to only have the cache related directives (SSLStaplingCache, SSLStaplingStandardCacheTimeout, SSLStaplingErrorCacheTimeout) at the global level, and put the other ones into the default <VirtualHost> block. > + > +# Define a relatively small cache for OCSP Stapling using > +# the same mechanism that is used for the SSL session cache > +# above. If stapling is used with more than a few certificates, > +# the size may need to be increased. (AH01929 will be logged.) > +#SSLStaplingCache "shmcb:ssl_stapling(32768)" Shouldn't we make it a bit larger by default? Memory is so cheap these days that I'm not sure it's worth to keep it that small. > + > +# Override the OCSP responder URL specified in the certificate > +#SSLStaplingForceURL http://ocsp.example.com/ I suggest to omit this in the sample configuration, as certificates issued by publicly-trusted CAs which lack an OCSP URI (based on section 13.2.1 in the CA/Browser Forum's Baseline Requirements [1] that the URI may be omitted for a "high-traffic FQDN" when stapling is contractually or technically enforced) do 1) not exist as of today and 2) are definitely not what a typical deployment with mod_ssl entails. Having SSLStaplingForceURL in the sample configuration (especially as a global directive) does more harm than good, IMO. Kaspar [1] https://cabforum.org/documents/#Baseline-Requirements