On 23.10.2014 02:59, traw...@apache.org wrote:
> Author: trawick
> Date: Thu Oct 23 00:59:40 2014
> New Revision: 1633730
> 
> URL: http://svn.apache.org/r1633730
> Log:
> add OCSP Stapling configuration, disabled by default
> 
> Modified:
>     httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in
> 
> Modified: httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in
> URL: 
> http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in?rev=1633730&r1=1633729&r2=1633730&view=diff
> ==============================================================================
> --- httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in (original)
> +++ httpd/httpd/trunk/docs/conf/extra/httpd-ssl.conf.in Thu Oct 23 00:59:40 
> 2014
> @@ -73,6 +73,31 @@ SSLPassPhraseDialog  builtin
>  SSLSessionCache        "shmcb:ssl_scache(512000)"
>  SSLSessionCacheTimeout  300
>  
> +#   OCSP Stapling (requires OpenSSL 0.9.8h or later)
> +#
> +#   This feature is disabled by default and requires at least
> +#   the two directives SSLUseStapling and SSLStaplingCache.
> +#   Refer to the documentation on OCSP Stapling in the SSL/TLS
> +#   How-To for more information.
> +#
> +#   Enable stapling for all SSL-enabled servers:
> +#SSLUseStapling On

OCSP stapling is primarily a per-certificate feature - so my suggestion
would be to only have the cache related directives (SSLStaplingCache,
SSLStaplingStandardCacheTimeout, SSLStaplingErrorCacheTimeout) at the
global level, and put the other ones into the default <VirtualHost> block.

> +
> +#   Define a relatively small cache for OCSP Stapling using
> +#   the same mechanism that is used for the SSL session cache
> +#   above.  If stapling is used with more than a few certificates,
> +#   the size may need to be increased.  (AH01929 will be logged.)
> +#SSLStaplingCache "shmcb:ssl_stapling(32768)"

Shouldn't we make it a bit larger by default? Memory is so cheap these
days that I'm not sure it's worth to keep it that small.

> +
> +#   Override the OCSP responder URL specified in the certificate
> +#SSLStaplingForceURL http://ocsp.example.com/

I suggest to omit this in the sample configuration, as certificates
issued by publicly-trusted CAs which lack an OCSP URI (based on section
13.2.1 in the CA/Browser Forum's Baseline Requirements [1] that the URI
may be omitted for a "high-traffic FQDN" when stapling is contractually
or technically enforced) do 1) not exist as of today and 2) are
definitely not what a typical deployment with mod_ssl entails. Having
SSLStaplingForceURL in the sample configuration (especially as a global
directive) does more harm than good, IMO.

Kaspar


[1] https://cabforum.org/documents/#Baseline-Requirements

Reply via email to