Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCSP stapling with HAProxy as a server #7593

Closed
wants to merge 1 commit into from

Conversation

vkssv
Copy link

@vkssv vkssv commented May 29, 2024

This patch allows to load and validate OCSP response file in DER format, when haproxy starts. This file should be kept at the same path as the using server certificate and *.issuer file (set as ssl crt keyword value at haproxy's bind line):

bind *:1443 ssl crt show_ocsp_server.pem

~/haproxy master$ ls -al show_ocsp_server.pem*
-rw-r--r-- 1 root root 6918 mai   16 19:25 show_ocsp_server.pem
-rw-r--r-- 1 root root 1830 mai   16 19:25 show_ocsp_server.pem.issuer
-rw-r--r-- 1 root root 2281 mai   16 19:25 show_ocsp_server.pem.ocsp

Description

Please describe the scope of the fix or feature addition.

Fixes zd#

Testing

How did you test?

Checklist

  • added tests
  • updated/added doxygen
  • updated appropriate READMEs
  • Updated manual and documentation

This patch allows to load and validate OCSP response file in DER format, when
haproxy starts. This file should be kept at the same path as the using server
certificate and *.issuer file (set as ssl crt keyword value at haproxy's bind
line):

	bind *:1443 ssl crt show_ocsp_server.pem

	~/haproxy master$ ls -al show_ocsp_server.pem*
	-rw-r--r-- 1 root root 6918 mai   16 19:25 show_ocsp_server.pem
	-rw-r--r-- 1 root root 1830 mai   16 19:25 show_ocsp_server.pem.issuer
	-rw-r--r-- 1 root root 2281 mai   16 19:25 show_ocsp_server.pem.ocsp
@wolfSSL-Bot
Copy link

Can one of the admins verify this patch?

@dgarske
Copy link
Contributor

dgarske commented May 29, 2024

Hi @vkssv ,

Can you tell me more about your project? I don't see you on our contributor list. Please send an email to support@ wolfssl.com and reference this PR to start the process for getting setup as a contributor.

Okay to test

Thanks, David Garske, wolfSSL

@dgarske
Copy link
Contributor

dgarske commented May 29, 2024

@vkssv

The HAProxy test fails the ./tests/unit.test

FAILURES:
   648: test_wolfSSL_i2d_OCSP_CERTID

@vkssv
Copy link
Author

vkssv commented May 30, 2024

Hello @dgarske !

I've provided this patch in order to illustrate and reproduce our problem with OCSP stapling, described at #7588.

So we are not intended to merge this. Just to help you to debug or provide us some hints, how we could use OCSP OpenSSL compatible d2i_OCSP_CERTID and i2d_OCSP_CERTID APIs.

Thanks in advance,

@dgarske dgarske assigned ejohnstown and unassigned dgarske and wolfSSL-Bot May 30, 2024
@anhu anhu assigned anhu and dgarske and unassigned ejohnstown and anhu Jun 5, 2024
@dgarske
Copy link
Contributor

dgarske commented Jul 31, 2024

@rizlik is working on fixing this internally. I will go ahead and close this.

@dgarske dgarske closed this Jul 31, 2024
@dgarske
Copy link
Contributor

dgarske commented Jul 31, 2024

See #7779

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

6 participants