Yes I have that as well
SSLVerifyClient require
SSLVerifyDepth 10

I also have FIPS enabled (not sure if that matters).

——————————————————————————




Quintin Ash | Senior Software Engineer

Tenable Network Security

7021 Columbia Gateway Drive, Suite 500

Columbia, MD 21046

q...@tenable.com

W: 443-545-2101 ext. 472

tenable.com <http://www.tenable.com/>


On Mon, Apr 17, 2023 at 1:51 PM Daniel Ferradal <dferra...@apache.org>
wrote:

>
>
> **** CAUTION: This email was sent from an EXTERNAL source. Think before
> clicking links or opening attachments. ****
> ------------------------------
> El lun, 17 abr 2023 a las 17:29, Quintin Ash (<q...@tenable.com>)
> escribió:
>
>> Hello,
>>
>>
>> I am working with OCSP and SSL Stapling and I want to know if this case
>> is working as expected.
>>
>>
>> I am trying to connect to Apache and I have a certificate that is revoked
>> from the OCSP server. The OCSP server is responding as Revoked, but the
>> connection is not getting rejected. This is a case where I would suspect
>> that the connection should be rejected because the certificate is revoked,
>> but it is not happening.
>>
>>
>> Does anyone have experience with OCSP and SSL Stapling and is this
>> configured correctly?
>>
>>
>> Configuration:
>>
>> Apache 2.4.57
>>
>> OpenSSL 3.0.8
>>
>>
>> SSLOCSPEnable on
>>
>> SSLOCSPDefaultResponder http://x.x.x.x:41233
>>
>> SSLOCSPOverrideResponder on
>>
>>
>> Logs:
>>
>> [Thu Apr 13 10:42:14.734750 2023] [ssl:debug] [pid 1812:tid
>> 139698106267200] ssl_util_ocsp.c(97): [client x.x.x.x:60742] AH01973:
>> connecting to OCSP responder ‘x.x.x.x:41233'
>>
>> [Thu Apr 13 10:42:14.734815 2023] [ssl:debug] [pid 1812:tid
>> 139698106267200] ssl_util_ocsp.c(125): [client x.x.x.x:60742] AH01975:
>> sending request to OCSP responder
>>
>> [Thu Apr 13 10:42:14.739728 2023] [ssl:debug] [pid 1812:tid
>> 139698106267200] ssl_util_ocsp.c(235): [client x.x.x.x:60742] AH01981: OCSP
>> response header: Content-type: application/ocsp-response
>>
>> [Thu Apr 13 10:42:14.739751 2023] [ssl:debug] [pid 1812:tid
>> 139698106267200] ssl_util_ocsp.c(235): [client x.x.x.x:60742] AH01981: OCSP
>> response header: Content-Length: 2273
>>
>> [Thu Apr 13 10:42:14.739756 2023] [ssl:debug] [pid 1812:tid
>> 139698106267200] ssl_util_ocsp.c(283): [client x.x.x.x:60742] AH01987: OCSP
>> response: got 2273 bytes, 2273 total
>>
>> [Thu Apr 13 10:42:14.741198 2023] [ssl:debug] [pid 1812:tid
>> 139698106267200] ssl_util_stapling.c(575): AH01942:
>> stapling_renew_response: query response received
>>
>> [Thu Apr 13 10:42:14.741644 2023] [ssl:error] [pid 1812:tid
>> 139698106267200] AH02969: stapling_check_response: response has certificate
>> status revoked (reason: n/a) for serial number xxxx
>>
>> ——————————————————————————
>>
>>
>>
>>
>
>
> In the information you provide you are at least missing the Location with:
>
> SSLVerifyclient require
>
> Do you have that?
>
>
> --
> Daniel Ferradal
> HTTPD Project
> #httpd help at Libera.Chat
>

Reply via email to