-
-
Notifications
You must be signed in to change notification settings - Fork 132
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Handle Let's Encrypt OCSP deprecation #530
Comments
Dear Lukas I agree. The OCSP check should be optional. I will try to find some time to fix it. |
I want to emphasize that I don't know if a change is even necessary; if a OCSP URL is present in the certificate, we should check the OCSP server by default, imho. But if there is no OCSP URL in the certificate, we should not fail because of it. |
You are right. The problem is that some CAs are removing the OCSP services too soon. The certificate still has the URL but this is now invalid. |
For Let's Encrypt all certificates with OCSP URLs will be expired by the time the OCSP service is shutdown if I understand their blog post correctly, so for LE specifically this should not be an issue. |
I run the complete test suite every day, and I notice that I get OCSP errors more frequently. One example is github.com with Sectigo. From time to time, the OCSP servers do not respond. Then the next day they are OK again. At ETH Zurich we used QuoVadis for hundreds of servers and every three or four weeks we had problems with OCSP. I suspect that since OCSP is dying, a lot of CAs are caring less it is working or not ... |
Anyway looking at the code if the OCSP URI is missing, the script should just output a verbose message
and continue with the next element in the chain. I did not find a server without OCSP to test (it's working with self-signed certificates but these are handled differently). I will keep the issue open and keep an eye open. |
Seems that I am not the only one to look for a quick possibility to test: https://community.letsencrypt.org/t/how-to-get-cert-with-crl-not-ocsp/226151/3 |
Is your feature request related to a problem? Please describe.
OCSP is dead, it has slowly been dying for years now and it is coming to an end altogether sooner rather than later.
Describe the solution you'd like
Verify what happens if a certificate does not have a OCSP URL (Let's Encrypt certificates from May 7th), or if OCSP responders are gone (LE from August 6th).
I would expect check_ssl_cert to not return CRITICAL or WARNING when Let's Encrypt removes OCSP URLs from the certificates, but handle it gracefully (missing OCSP URL should automatically disables OCSP check?).
This may already be the case, I do not know.
Describe alternatives you've considered
--ignore-ocsp
may be used to disable OCSP checking manually, however doing this manually does not scale.Additional context
Add any other context or screenshots about the feature request here.
The text was updated successfully, but these errors were encountered: