Hello, Just to move this subject back up, 2 links about OCSP stapling : - https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/ - http://news.netcraft.com/archives/2013/07/19/microsoft-achieves-world-domination-in-ocsp-stapling.html
In short, support on client and server side is clearly increasing but the main goal is not reached, as OCSP remains necessary for intermediate certificate. A new RFC has been wrote to handle those remaining case : http://tools.ietf.org/html/rfc6961 Hervé. On 11/06/2012 11:08 PM, Willy Tarreau wrote: >> I would say the periodic-request aspect of it is pretty trivial; you add a >> timer to the event loop that expires in some configurable amount of time, >> e.g. a bit before the last OCSP response expires, and you cache the result >> until it expires or a more recent result overwrites it. Given that the >> overhead of making a single OCSP request for the cert inside HAProxy is very >> low, you can easily do this every few minutes with no perceivable overhead. >> Obviously some logic re: failing requests and retrying has to be implemented, >> which amounts to nothing more than a formulation for how much time to wait >> until retrying again. > > I confirm that this part it clearly nothing. > >> The user should also be able to configure whether to >> deliver an expired OCSP response or none at all in the case that an upstream >> OCSP response cannot be received by the time the currently cached response >> expires. > > That's one of the points of attention, I agree. > >> A single timer and single cache slot are used for each certificate chain. The >> timer is reset with a new value when: >> - a request fails; in this case we need >> to use our retry/backoff algorithm to decide how long to wait before >> retrying; >> - a request succeeds; in this case we need to use our expires algorithm, >> which can be parameterized over the expiration time of the OCSP response, >> to >> decide how long to wait before trying to get a fresh response. > > Hmmm OK it's per certificate... Obviously in fact. So that probably means > some funny mechanisms to connect to various places depending on the cert > chain (eg: for those connecting via proxies, etc...). > >> One thing to keep in mind is that OCSP stapling in many libraries has (or >> had, at one point) buggy or nonexistent support for OCSP payloads containing >> multiple certificates, > > That's a very useful and interesting piece of information. > >> and a bit of research should be done prior to >> implementation to discover the current state of the world in this regard. > > I agree! > >> I believe the official word at one point was that OCSP stapling of chains >> should be accomplished by including the entire chain in the OCSP request, >> delivering that compound OCSP response via the TLS Certificate Status Request >> extension. > > And do you know how large this could be for average web sites ? Maybe > there is a cross-over point where doing so has a more negative impact > than letting the client check by itself ? > > Thanks for your comments and suggestions! > Willy > > -- Hervé COMMOWICK Ingénieur systèmes et réseaux. http://www.rezulteo.com by Lizeo Online Media Group <http://www.lizeo-online-media-group.com/> 42 quai Rambaud - 69002 Lyon (France) ⎮ ☎ +33 (0)4 26 99 03 77

