Closed
Bug 92923
Opened 24 years ago
Closed 11 years ago
Support OCSP checks via https in Mozilla clients
Categories
(Core :: Security: PSM, enhancement, P3)
Tracking
()
RESOLVED
WONTFIX
People
(Reporter: joerg.bruenner, Unassigned)
References
()
Details
(Whiteboard: [psm-tcpip])
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; rv:0.9.2) Gecko/20010628
BuildID: 2001062815
Prerequisitions:
- the X.509 server certificate contains a authority information access
field (OID 1.3.6.1.5.5.7.1.1) containing "https://ocsp.local.com"
- the browser is ordered to check certificates via OCSP (both options
showed the same bug)
- all the certificates were issued by my local CA
- certificates with an AIA containing "http://ocsp.local.com" worked
fine
The test case:
I made a https connection to server.local.com (situated in local
network) and expected the browser to check the certificate via my
local OCSP responder (ocsp.local.com).
The bug:
The browser closed the connection to the server server.local.com
directly after reciving the server certificate. The reason code was:
"bad certificate". It seems the check within the browser does not like
the "https" in the AIA field.
There was no message to the user. The error message laid in the
ssl-error log of the webserver. The OCSP request was not started. The
page was not delivered.
The same webserver delivered the page without OCSP checking activated.
The certificate was still the same. Here the browser seems not to
check the content of the AIA field.
Reproducible: Always
Steps to Reproduce:
1. set up a webserver with a dummy page, activate SSL, give the server
certificate an AIA containing OCSP, URI: https://ocsp-responder
2. set u an OCSP responder
3. import the root CA-Certificate into the browser (You should
redesign this procedure!!!)
4. activate OCSP check in the browser
Actual Results: nothing, the page is not delivered the error log of the
webserver told me what's wrong (see long description)
Expected Results: the page, after an succsessful OCSP request (OCSP response: Good)
Feel free to contact me. I can provide the certificates an keys used.
Comment 1•24 years ago
|
||
PSM
Assignee: mstoltz → ssaux
Status: UNCONFIRMED → NEW
Component: Security: General → Client Library
Ever confirmed: true
Product: Browser → PSM
QA Contact: ckritzer → junruh
Version: other → 2.1
Comment 2•24 years ago
|
||
->javi
P1
Comment 4•24 years ago
|
||
changing to a RFE.
->future
P3
Comment 7•21 years ago
|
||
Mass reassign Javi's old PSM bugs to nobody
Assignee: javi → nobody
QA Contact: junruh → nobody
Target Milestone: Future → ---
I think this bug is affecting at least one real site which uses Verisign:
https://viewmyaccounts.moneysupermarket.com
I can access this site in Konqueror and IE, but not Mozilla or Firefox.
Always reproducible: set OCSP to "Use OCSP to validate certificates that
specify an OCSP service URL", then visit the above URL.
Comment 9•19 years ago
|
||
it appears that situation is even worse. Currently, if a cert has a https ocsp URL and OCSP is on, it cannot be imported anymore - see Bugzilla Bug 331336
also, isn't Bug 205436 a duplicate of this?
Comment 10•19 years ago
|
||
The site reported in comment 8 seems to be down.
Yes, this is a duplicate.
*** This bug has been marked as a duplicate of 205436 ***
Status: NEW → RESOLVED
Closed: 19 years ago
Resolution: --- → DUPLICATE
Comment 11•19 years ago
|
||
Actually I take that back, the bugs are not necessarily duplicates.
Bug 205436 is about supporting OCSP to https *within* NSS.
NSS has an internal http client, and might choose to enhance that to support https.
Independent of what NSS does internally, NSS now offers a http client delegation mechanism, and with bug 111384 we made use of that feature in PSM / the Mozilla clients.
So I propose this bug should track to enhance PSM to allow https.
In order to make this work in PSM, we need to extend the new code added in bug 111384 to use more than one SSL thread.
Status: RESOLVED → REOPENED
Component: Security: UI → Security: PSM
Resolution: DUPLICATE → ---
Updated•19 years ago
|
Assignee: nobody → kengert
Status: REOPENED → NEW
QA Contact: nobody
Updated•19 years ago
|
Summary: OCSP check via https does not work → Support OCSP checks via https in Mozilla clients
Updated•18 years ago
|
QA Contact: psm
Updated•15 years ago
|
Assignee: kaie → nobody
Whiteboard: [psm-tcpip]
![]() |
||
Comment 12•11 years ago
|
||
Connecting to an https site while verifying a certificate means we attempt to verify another certificate, which could cause us to connect to an https site, and so on and so forth. This is a problematic and unnecessary practice that we won't be supporting.
Status: NEW → RESOLVED
Closed: 19 years ago → 11 years ago
Resolution: --- → WONTFIX
You need to log in
before you can comment on or make changes to this bug.
Description
•