Open Bug 811329 Opened 12 years ago Updated 1 year ago

Extend selfserv to implement OCSP stapling

Categories

(NSS :: Tools, enhancement, P5)

3.14
enhancement

Tracking

(Not tracked)

People

(Reporter: KaiE, Assigned: KaiE)

References

Details

Attachments

(1 file)

We should extend selfserv to support OCSP stapling for testing purposes. I propose to start with a very simple approach, that doesn't need an external connection to an OCSP server. If the NSS database used by selfserv contains the CA's private key, then selfserv shall be able to create its own OCSP response.
Blocks: 811331
In addition to selfserv code, it's also necessary to implement the server side of the cert_status handshake protocol in libSSL. I'm attaching a first working patch that implements both.
Attached patch patch v3Splinter Review
Assignee: nobody → kaie
Note the attached patch isn't cleaned up yet, and it might contain snippets that belong elsewhere, and of course, everything depends on the work from bug 360420. So, this patch serves mostly as a backup, at this time. In order to test this mode of selfserv, which creates the OCSP response on its own (without talking to an external OCSP server (yet) for simplification purposes), I need a NSS database that contains the private keys for both the server cert and for the CA that issued the server cert. I want to create a new certificate database "stapling" as part of the test suite, which copies the "server" directory to the new directory "stapling", and imports the CA's private key from the "CA" directory. cp server -> stapling cd stapling pk12util -d ../CA/ -o ca.p12 -n TestCA -K nss -W nss pk12util -i ca.p12 -d . -K nss -W nss
Severity: normal → S3
Severity: S3 → N/A
Type: defect → enhancement
Priority: -- → P5
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: