Closed Bug 881901 Opened 11 years ago Closed 11 years ago

stopwatching.us OCSP failures

Categories

(Websites :: Other, defect)

defect
Not set
normal

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: keeler, Assigned: btrzupek)

Details

Attachments

(1 file)

With security.OCSP.requre set to true, visiting https://optin.stopwatching.us/ gives a revoked certificate error (even though it looks like the responder is giving out a "good" status).
The error I see is:
Invalid OCSP signing certificate in OCSP response.
(Error code: sec_error_ocsp_invalid_signing_cert)

https://wiki.mozilla.org/CA:Recommended_Practices#OCSP
"Error code: sec_error_ocsp_invalid_signing_cert
- OCSP response signer's certificate was issued by the CA that issued the certificate whose status is being checked, but the response signer's certificate does not bear an ExtendedKeyUsage extension with the OCSP Responder OID, or
- OCSP response signer's certificate chain does not validate (e.g. expired, or bad signature, etc.)
- Trusted OCSP Responder Signing cert has not been imported. Mozilla users should not have to find and install the OCSP responder's certificate. See Potentially Problematic Practices.
The actual error is bad signature.
OCSP responder cert is expired. (note the trace, invalid since june 1 2013).
(In reply to Camilo Viecco (:cviecco) from comment #3)
> OCSP responder cert is expired. (note the trace, invalid since june 1 2013).

Brian, Looks like a Trustwave customer.
Assignee: nobody → btrzupek
This seems to be resolved now, right?
Correct, the OCSP Responder cert was fixed. I have also been following up with Brian (btrzupek@trustwave.com) in email regarding their monitoring of their OCSP service. But that doesn't require a Bugzilla bug, so I'll close this bug.
Status: NEW → RESOLVED
Closed: 11 years ago
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: