On 9/4/25 8:06 AM, Ruediger Pluem wrote:
> 
> 
> On 9/3/25 9:16 PM, Stefan Eissing via dev wrote:
>>
>>
>>> Am 03.09.2025 um 20:55 schrieb Ruediger Pluem <[email protected]>:
>>>
>>>
>>>
>>> On 9/3/25 5:49 PM, Stefan Eissing via dev wrote:
>>>> https://docs.digicert.com/en/whats-new/change-log/certcentral-change-log.html#digicert-ending-support-for-http-1-0-connections-for-ocsp-and-crl-certificate-status-verification-checks-619426
>>>
>>> Thanks for the heads up.
>>>
>>>>
>>>> On rather short notice, they switch off HTTP/1.0 in their OCSP responder. 
>>>> That means our implementation of stapling in mod_ssl will no longer work, 
>>>> I assume.
>>>
>>> Agreed. But as HTTP/1.1 is still accepted and we already set a host and 
>>> connection header it should be easy to fix:
>>>
>>> Index: modules/ssl/ssl_util_ocsp.c
>>> ===================================================================
>>> --- modules/ssl/ssl_util_ocsp.c (revision 1928174)
>>> +++ modules/ssl/ssl_util_ocsp.c (working copy)
>>> @@ -46,7 +46,7 @@
>>>         BIO_printf(bio, "http://%s:%d";,
>>>                    uri->hostname, uri->port);
>>>     }
>>> -    BIO_printf(bio, "%s%s%s HTTP/1.0\r\n"
>>> +    BIO_printf(bio, "%s%s%s HTTP/1.1\r\n"
>>>                "Host: %s:%d\r\n"
>>>                "Content-Type: application/ocsp-request\r\n"
>>>                "Connection: close\r\n"
>>
>> Will be a bit tricky to ship that everywhere until September 8.💁🏻‍♂️
> 
> True, but at least a patch is available for those who need it and build on 
> their own.
> r1928222.

Unfortunately this is not enough as the OCSP responder can now reply with 
transfer-encoding: chunked which we cannot handle currently.

Regards

Rüdiger

Reply via email to