On Tue, 14 Apr 2020 13:13:59 -0700
Andy Warner via dev-security-policy
<dev-security-policy@lists.mozilla.org> wrote:

> From 2020-04-08 16:25 UTC to 2020-04-09 05:40 UTC, Google Trust
> Services' EJBCA based CAs (GIAG4, GIAG4ECC, GTSY1-4) served empty
> OCSP data which led the OCSP responders to return unauthorized.

No new lessons for CAs here in general, but I think this incident is
worth highlighting as an example to OCSP Stapling implementations.

It is desirable (not technically required in the standard, but necessary
to a robust implementation) that your software should not be adversely
affected by an outage like this. Mistakes will happen, and good
software can and thus should allow for them without introducing
cascading failure.

Specifically: You should cache your stapled GOOD answers in durable
storage if practical, and when periodically refreshing you should report
non-GOOD answers to the operator (e.g. logging them as an ERROR
condition) but always continue to present clients with the last GOOD
answer until it actually expires even if you receive newer non-GOOD
OCSP responses.

Nick.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to