Closed Bug 92923 Opened 24 years ago Closed 11 years ago

Support OCSP checks via https in Mozilla clients

Categories

(Core :: Security: PSM, enhancement, P3)

x86
All
enhancement

Tracking

()

RESOLVED WONTFIX

People

(Reporter: joerg.bruenner, Unassigned)

References

()

Details

(Whiteboard: [psm-tcpip])

From Bugzilla Helper: User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; rv:0.9.2) Gecko/20010628 BuildID: 2001062815 Prerequisitions: - the X.509 server certificate contains a authority information access field (OID 1.3.6.1.5.5.7.1.1) containing "https://ocsp.local.com" - the browser is ordered to check certificates via OCSP (both options showed the same bug) - all the certificates were issued by my local CA - certificates with an AIA containing "http://ocsp.local.com" worked fine The test case: I made a https connection to server.local.com (situated in local network) and expected the browser to check the certificate via my local OCSP responder (ocsp.local.com). The bug: The browser closed the connection to the server server.local.com directly after reciving the server certificate. The reason code was: "bad certificate". It seems the check within the browser does not like the "https" in the AIA field. There was no message to the user. The error message laid in the ssl-error log of the webserver. The OCSP request was not started. The page was not delivered. The same webserver delivered the page without OCSP checking activated. The certificate was still the same. Here the browser seems not to check the content of the AIA field. Reproducible: Always Steps to Reproduce: 1. set up a webserver with a dummy page, activate SSL, give the server certificate an AIA containing OCSP, URI: https://ocsp-responder 2. set u an OCSP responder 3. import the root CA-Certificate into the browser (You should redesign this procedure!!!) 4. activate OCSP check in the browser Actual Results: nothing, the page is not delivered the error log of the webserver told me what's wrong (see long description) Expected Results: the page, after an succsessful OCSP request (OCSP response: Good) Feel free to contact me. I can provide the certificates an keys used.
PSM
Assignee: mstoltz → ssaux
Status: UNCONFIRMED → NEW
Component: Security: General → Client Library
Ever confirmed: true
Product: Browser → PSM
QA Contact: ckritzer → junruh
Version: other → 2.1
->javi P1
Assignee: ssaux → javi
Keywords: nsenterprise
Priority: -- → P1
Target Milestone: --- → 2.1
Mass assigning QA to ckritzer.
QA Contact: junruh → ckritzer
changing to a RFE. ->future P3
Severity: normal → enhancement
Keywords: nsenterprise
Priority: P1 → P3
Target Milestone: 2.1 → Future
OS > all
OS: Windows NT → All
QA Contact: ckritzer → junruh
Blocks: 157555
Keywords: nsbeta1
adt: nsbeta1-
Keywords: nsbeta1nsbeta1-
Mass reassign Javi's old PSM bugs to nobody
Assignee: javi → nobody
QA Contact: junruh → nobody
Target Milestone: Future → ---
I think this bug is affecting at least one real site which uses Verisign: https://viewmyaccounts.moneysupermarket.com I can access this site in Konqueror and IE, but not Mozilla or Firefox. Always reproducible: set OCSP to "Use OCSP to validate certificates that specify an OCSP service URL", then visit the above URL.
Product: PSM → Core
it appears that situation is even worse. Currently, if a cert has a https ocsp URL and OCSP is on, it cannot be imported anymore - see Bugzilla Bug 331336 also, isn't Bug 205436 a duplicate of this?
The site reported in comment 8 seems to be down. Yes, this is a duplicate. *** This bug has been marked as a duplicate of 205436 ***
Status: NEW → RESOLVED
Closed: 19 years ago
Resolution: --- → DUPLICATE
Actually I take that back, the bugs are not necessarily duplicates. Bug 205436 is about supporting OCSP to https *within* NSS. NSS has an internal http client, and might choose to enhance that to support https. Independent of what NSS does internally, NSS now offers a http client delegation mechanism, and with bug 111384 we made use of that feature in PSM / the Mozilla clients. So I propose this bug should track to enhance PSM to allow https. In order to make this work in PSM, we need to extend the new code added in bug 111384 to use more than one SSL thread.
Status: RESOLVED → REOPENED
Component: Security: UI → Security: PSM
Resolution: DUPLICATE → ---
Assignee: nobody → kengert
Status: REOPENED → NEW
QA Contact: nobody
Summary: OCSP check via https does not work → Support OCSP checks via https in Mozilla clients
QA Contact: psm
Version: psm2.1 → 1.0 Branch
Version: 1.0 Branch → Trunk
Assignee: kaie → nobody
Whiteboard: [psm-tcpip]
Connecting to an https site while verifying a certificate means we attempt to verify another certificate, which could cause us to connect to an https site, and so on and so forth. This is a problematic and unnecessary practice that we won't be supporting.
Status: NEW → RESOLVED
Closed: 19 years ago11 years ago
Resolution: --- → WONTFIX
You need to log in before you can comment on or make changes to this bug.