Hi, On Mon, Apr 06, Vasileios Tzimourtos wrote: > It was the issue that you mentioned with the 300sec SKEW. I compiled > haproxy with smaller value (30 :) ) and id returns the response :)
30s is probably too small: If client's clock is off by > 30s then it's possible that haproxy send ocsp response that client thinks has expired. Maybe HARICA could issue responses that are valid for longer than 5m ? Or if this is not possible maybe something like 200 for SKEW and update responses every 90s(<100) ? -Jarno > The test with the openssl that toy mentioned returns Verified OK. > The problem was the refferrence to the past > > Finally, to ease your curiosity, the CA is HARICA ( harica.gr ) > > Thanks again! > > > On 6/4/2015 12:50 μμ, Jarno Huuskonen wrote: > >Hi, > > > >On Mon, Apr 06, Vasileios Tzimourtos wrote: > >>**/usr/bin/openssl ocsp -noverify -issuer $ROOT_CERT_FILE -cert > >>$SERVER_CERT_FILE -url "$OCSP_URL" -no_nonce -header Host `echo > >>"$OCSP_URL" | cut -d"/" -f3` -respout $OCSP_FILE** > >>**echo "set ssl ocsp-response $(/usr/bin/base64 -w 10000 > >>$OCSP_FILE)" | socat $HAPROXY_SOCKET stdio** > >>* > >Can you run openssl ocsp w/out -noverify (and maybe -VAfile) ? > >So something like: > >/usr/bin/openssl ocsp -issuer $ROOT_CERT_FILE \ > > -cert $SERVER_CERT_FILE -url "$OCSP_URL" -no_nonce \ > > -header Host `echo "$OCSP_URL" | cut -d"/" -f3` -respout $OCSP_FILE \ > > [ -VAfile $ROOT_CERT_FILE [-validity_period 300] ] > > > >>Running the above script returns that all is OK and that ocsp > >>response was updated > >Do you get any messages about ocsp response if you reload haproxy/check > >configuration sometime after creating the ocsp response ? > >>*/etc/haproxy/certs/mycertificate.crt.pem: good** > >>** This Update: Apr 6 08:28:46 2015 GMT** > >>** Next Update: Apr 6 08:33:46 2015 GMT** > >>**OCSP Response updated!** > >Out of curiosity which CA issues responses for only 5min ? > > > >Haproxy defaults.h has: > >#define OCSP_MAX_RESPONSE_TIME_SKEW 300 > > > >In commit 4f3c87a5d942d4d0649c35805ff4e335970b87d4 there's: > >" Haproxy stops serving OCSP response if nextupdate date minus > > the supported time skew (#define OCSP_MAX_RESPONSE_TIME_SKEW) is > > in the past. > >" > > > >Your problem maybe be that the ocsp response is valid for 5min(300s) > >Quick check to test this could be to compile haproxy with > >different OCSP_MAX_RESPONSE_TIME_SKEW (< 300) ? > > > >-Jarno > > > > -- > Vassilis Tzimourtos > > -- Jarno Huuskonen

