Closed Bug 497184 Opened 16 years ago Closed 16 years ago

Add default OCSP responder for trustwave

Categories

(Core :: Security: PSM, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED
Tracking Status
blocking1.9.1 --- .2+
status1.9.1 --- .2-fixed

People

(Reporter: johnath, Assigned: KaiE)

Details

(Keywords: verified1.9.1)

Attachments

(1 file)

Brian Trzupek from trustwave says that they will soon be ready to enable a default OCSP responder for us, using the mechanism introduced in bug 485052. The data structure that controls this is here: http://mxr.mozilla.org/mozilla-central/source/security/manager/ssl/src/nsNSSCallbacks.cpp#1058 So we just need that information (issuer name, issuer key ID, ocsp url) for each cert (including intermediates) that trustwave wants to have OCSP checking for using this mechanism.
Is this the preferred way these days? How about implementing revocation checking correctly by including the OCSP URI in the certificate(s)?
Hi Eddy, This is definitely not the preferred method, but as of Firefox 3.5 all EV certificates require OCSP responders or else they are downgraded in the UI to OV/DV presentation. You can see within the link provided by Johnathan that several CAs are providing hardcoded default OCSP responders for their roots/subroots. This ensures that their existing end entity certificates (that do not have OCSP URIs embedded) will be unaffected by the changed behavior.
Yes I know. Incidentally Nelson is trying to get CRLs working, since FF 3.5 has been somewhat delayed, maybe it's still possible. The lack of OCSP should then have no effect I believe.
Here is the information requested: KeyID: 42 32 b6 16 fa 04 fd fe 5d 4b 7a c3 fd f7 4c 40 1d 5a 43 af Issuer Name: SecureTrust CA OCSP URL: ocsp.trustwave.com I would be happy to produce the patch if someone can explain the format of the KeyIDs. They appear to be base64 encoded binary blobs?
Paul - that's right - base64 encoded blobs. Will you require a second entry to validate any intermediate certs, or do they have their own OCSP responders specified in the cert?
We shouldn't require any additional entries. For the blob, could you elaborate on the method of generation? I apologize if this is self-evident but I don't want to provide an incorrect encoding of the keyid.
Kai will correct me if I'm wrong, but I believe that feeding the binary key id (perhaps by cat'ng a 20-byte file containing it) to a base64 encoder should do the trick. It should be the binary Key ID that's encoded, not a string containing the characters '4', '2', '3', '2', etc.
Great, Paul. Is there a test page we should use to verify the patch works?
Unfortunately I don't know the exact date that we'll have the responder publicly available, although we're working hard to have it within the next week.
As of this time we have our OCSP responder available publicly at ocsp.trustwave.com. I have also successfully built the branch using the submitted patch. Due to the low impact nature of the change is there any chance of it making in before 3.5? If Trustwave can assist in any way, please let me know.
Flags: blocking1.9.1?
Seeing as FF 3.0 currently supports the EV UI for our certificates, we feel it would benefit the Mozilla customer base if this treatment continues in 3.5. The patch has been tested and is of very minimal impact and we would enjoy your consideration of this patch prior to final release.
Hi Brian, sadly we've already done what we expect to be the final build for Firefox 3.5's final release, and the time required to rebuild with this patch included would require us to slip the schedule. We'll consider and likely take the patch for the first stability update, Firefox 3.5.1.
Flags: wanted1.9.1.x+
Flags: blocking1.9.1?
Flags: blocking1.9.1-
Whiteboard: [3.5.1?]
Johnath: who's right to review this patch?
Flags: blocking1.9.1.1+
Whiteboard: [3.5.1?]
Comment on attachment 383338 [details] [diff] [review] Trustwave OCSP Default Responder (In reply to comment #15) > Johnath: who's right to review this patch? kaie or rrelyea are the right reviewers for this component, but it's barely a code change - the most scathing review comment would be that it didn't fix the problem, but trustwave says this patch works for their test sites. I'll flag kaie for it.
Attachment #383338 - Flags: review?(kaie)
Comment on attachment 383338 [details] [diff] [review] Trustwave OCSP Default Responder I've tested this, confirm that it fixes the behaviour for trustwave. Since there is no real "code" change here, just an added piece of metadata, I'm going to give it my r+, but still check with kaie or rrelyea to make sure they're okay with me doing that, before landing. I'd like to land this on 1.9.1.1 too - near-zero risk, enables EV for another CA who was being downgraded by our lack of CRLDP support.
Attachment #383338 - Flags: review?(kaie)
Attachment #383338 - Flags: review+
Attachment #383338 - Flags: approval1.9.1.1?
Comment on attachment 383338 [details] [diff] [review] Trustwave OCSP Default Responder Clearing approval request since this already blocks 1.9.1.1 - thanks Mike.
Attachment #383338 - Flags: approval1.9.1.1?
We need to firedrill a 3.5.1, moving this to 3.5.2 which will likely be first week of August.
blocking1.9.1: --- → .2+
Flags: blocking1.9.1.1+ → blocking1.9.1.1-
With such a trivial change (as Johnathan says in #17, near-zero risk), is there any chance this could make it into the firedrill release? After missing 3.5 so narrowly it'd be a shame to miss the next release as well. If that's not possible I do still appreciate the information regarding timeframe Mike!
Attachment #383338 - Flags: superreview+
Landed on mozilla-central for baking, even if the baking is mostly academic for a metadata change like this. http://hg.mozilla.org/mozilla-central/rev/69ebef6ff887 Will request approval to land on the 1.9.1 branch as soon as it reope
Status: NEW → RESOLVED
Closed: 16 years ago
Resolution: --- → FIXED
Comment on attachment 383338 [details] [diff] [review] Trustwave OCSP Default Responder Requesting approval to land this on 1.9.1.2. There is negligible risk here, and the upside is that we fix validation of certificates for this CA.
Attachment #383338 - Flags: approval1.9.1.2?
Attachment #383338 - Flags: approval1.9.1.2? → approval1.9.1.2+
Comment on attachment 383338 [details] [diff] [review] Trustwave OCSP Default Responder a1912=beltzner
http://hg.mozilla.org/releases/mozilla-1.9.1/rev/bd3674407488 This has landed on the 1.9.1 stream, should be testable in tomorrow's nightly 1.9.1 builds, and should appear in Firefox 3.5.2 when it is released.
Paul, can you help us verify this in the 3.5.2 (build1) candidates?
(In reply to comment #25) > Paul, can you help us verify this in the 3.5.2 (build1) candidates? I downloaded the build and can confirm that it is working as expected.
If you'd like to test it directly you can visit https://sealserver.trustwave.com/seal.php
Thanks, Paul. Adding verified1.9.1 keyword, per comment #26. For reference, I wanted to see the difference in behavior between 3.5 and 3.5.2, which is not apparent by visiting the sites mentioned here.
Keywords: verified1.9.1
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: