Closed Bug 1321273 Opened 8 years ago Closed 8 years ago

OCSP error prevent to access the website - SEC_ERROR_OCSP_TRY_SERVER_LATER

Categories

(Core :: Security: PSM, defect)

defect
Not set
normal

Tracking

()

RESOLVED DUPLICATE of bug 1028534

People

(Reporter: rhubscher, Unassigned)

Details

When trying to access https://café-vie-privée.fr/ I get a SEC_ERROR_OCSP_TRY_SERVER_LATER which prevent me for accessing the website. If I try with wget, curl or chromium I don't have any error. I guess we should not block on OCSP error but rather fallback to the CRL file and then to a degraded SSL access but we should not prevent the user to access the website in that specific case.
I'm pretty sure that we don't default to strict OCSP enforcement. I can access the website in question fine on my default profile - but maybe the problem was intermittent? Did you check whether this was a result of strict settings you enabled? (In reply to Rémy Hubscher (:natim) from comment #0) > I guess we should not block on OCSP error but rather fallback to the CRL > file and then to a degraded SSL access but we should not prevent the user to > access the website in that specific case. What is "degraded SSL access" ?
Component: General → Security: PSM
Flags: needinfo?(rhubscher)
Product: Firefox → Core
(See also e.g. bug 1028534 - Chrome doesn't do any OCSP checking which explains the different behaviour.)
> I can access the website in question fine Yes it is back as well on my side. > What is "degraded SSL access" ? Something that uses the SSL certificate to encrypt the connection but display a warning and a red or orange lock instead of the green one telling that the certificate revocation server couldn't be reached for instance.
Flags: needinfo?(rhubscher)
This can happen if the site staples an OCSP response that contains the "try later" code. We could definitely improve the UI of the error page, but we're probably not going to make this an overridable error.
Status: NEW → RESOLVED
Closed: 8 years ago
Resolution: --- → DUPLICATE
> but we're probably not going to make this an overridable error. I don't understand why?
One reason is the specification requires it ( https://tools.ietf.org/html/rfc6066 bottom of section 8). My understanding is part of the aim of that requirement was to transition from soft-fail OCSP fetching (which is fairly useless from a security standpoint) to hard-fail opt-in to OCSP checks (via stapling, which still has some problems), that could then be augmented with some sort of expect-stapling mechanism, which would actually enable sites to opt-in to meaningful revocation checking.
You need to log in before you can comment on or make changes to this bug.