Bug 66677 - Enable OCSP https URI
Summary: Enable OCSP https URI
Status: NEW
Alias: None
Product: Apache httpd-2
Classification: Unclassified
Component: mod_ssl (show other bugs)
Version: 2.4.57
Hardware: All All
: P2 minor (vote)
Target Milestone: ---
Assignee: Apache HTTPD Bugs Mailing List
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-07-05 15:17 UTC by davide schiaroli
Modified: 2023-07-05 16:35 UTC (History)
0 users



Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description davide schiaroli 2023-07-05 15:17:39 UTC
At this moment, certificate without http scheme as ocsp responder uri, including https can't be verified. This probably following "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates" section 7.1.2.2c. 

This is an excess of caution in my opinion because it implies that ocsp responder may all be under an unsecure http environment. 

Furthermore rfc6960 says that "Where privacy
   is a requirement, OCSP transactions exchanged using HTTP MAY be
   protected using either Transport Layer Security/Secure Socket Layer
   (TLS/SSL) or some other lower-layer protocol."

This is the line of code that deny the ocsp responder https uri:
 
 if (ap_cstr_casecmp(u->scheme, "http") != 0) {
        ap_log_cerror(APLOG_MARK, APLOG_DEBUG, rv, c, APLOGNO(01920)
                      "cannot handle OCSP responder URI '%s'", s);
        return NULL;
    }
Comment 1 Stefan Eissing 2023-07-05 16:05:43 UTC
Could you explain your use case for https OCSP urls? All public CAs issue only http urls, as far as I know.
Comment 2 davide schiaroli 2023-07-05 16:27:53 UTC
Hi Stefan, thanks for the fast reply. Our use case Is a Pki with our certificates and a custom responder that resides inside a https environment. We developed the responder without knowing the http/s limitation. I think theres no possibilities to avoid that check.
Comment 3 davide schiaroli 2023-07-05 16:30:48 UTC
To be more clear, we have certificates without any  ocps responder uri. We would like to use the apache direttive overrideresponder to set the default responder tò our ocsp responder. Our responder Is inside an https environment, and this cause the problem explained before
Comment 4 Stefan Eissing 2023-07-05 16:35:53 UTC
Well, I would recommend  to strip that https: from your OSCP responder URLs for technical reasons. If you go outside the internet standards, you are on your own. But I do, of course, not know how difficult that is in your organization.

As to httpd, the implementation in mod_ssl does not support https URLs in this place. It is not only a matter of changing the check.