Re: [TLS] OCSP stapling problem

2018-12-19 Thread Bill Frantz
On 12/19/18 at 11:15 AM, ietf-d...@dukhovni.org (Viktor Dukhovni) wrote: > What I'd rather see is automation of certificate rotation, and > increasingly (decreasingly?) short certificate lifetimes as > with Let's Encrypt. I think what you wanted to say was "increasingly shorter certificate

Re: [TLS] OCSP stapling problem

2018-12-19 Thread Viktor Dukhovni
On Wed, Dec 19, 2018 at 01:40:43PM -0500, Viktor Dukhovni wrote: > To that end, please post a "tshark" decode of a TLS 1.2 handshake > (thus avoiding encrypted handshake records that make much of the > TLS 1.3 handshake opaque, and your tshark may not yet support TLS > 1.3). With reference to

Re: [TLS] OCSP stapling problem

2018-12-19 Thread Viktor Dukhovni
On Wed, Dec 19, 2018 at 03:47:25PM +0100, T.Tributh wrote: > Shall I open a ticket for openssl? Before you do that, it would be good to have clarity about the specific behaviour you're seeing and how it differs from what you want, and whether you want to see changes in the client or in the

Re: [TLS] OCSP stapling problem

2018-12-19 Thread Salz, Rich
>Shall I open a ticket for openssl? GnuTLS seems also not be able to staple the status_response when in client mode. Feel free. One possible result is that the OpenSSL maintainers will say that this is more about integration for the different servers that accept client

Re: [TLS] OCSP stapling problem

2018-12-19 Thread T.Tributh
Am 19.12.18 um 14:20 schrieb Rob Stradling: > On 19/12/2018 13:13, Salz, Rich wrote: >>> OpenSSL already has some support for Must-Staple: >>> https://github.com/openssl/openssl/pull/495 >> >> Oops, yeah, you're aright. But it's not really documented and not hooked up >> to any

Re: [TLS] OCSP stapling problem

2018-12-19 Thread Rob Stradling
On 19/12/2018 13:13, Salz, Rich wrote: >> OpenSSL already has some support for Must-Staple: >> https://github.com/openssl/openssl/pull/495 > > Oops, yeah, you're aright. But it's not really documented and not hooked up > to any popular server, is it? OpenSSL can parse it, but that's

Re: [TLS] OCSP stapling problem

2018-12-19 Thread Salz, Rich
>OpenSSL already has some support for Must-Staple: >https://github.com/openssl/openssl/pull/495 Oops, yeah, you're aright. But it's not really documented and not hooked up to any popular server, is it? OpenSSL can parse it, but that's about it.

Re: [TLS] OCSP stapling problem

2018-12-19 Thread Rob Stradling
On 19/12/2018 01:18, Salz, Rich wrote: >> The "exim" server claims to support stapling (for incoming connections) > > Yes, which isn't what I asked. > >> The Must-Staple belongs to the certificate which was requested > including "1.3.6.1.5.5.7.1.24=DER:30:03:02:01:05" >

Re: [TLS] OCSP stapling problem

2018-12-18 Thread Salz, Rich
>The "exim" server claims to support stapling (for incoming connections) Yes, which isn't what I asked. >The Must-Staple belongs to the certificate which was requested including "1.3.6.1.5.5.7.1.24=DER:30:03:02:01:05" in the CSR. Does the exim server understand that

Re: [TLS] OCSP stapling problem

2018-12-18 Thread T.Tributh
Am 18.12.18 um 15:57 schrieb Salz, Rich: > Does the server claim to support must-staple? > The "exim" server claims to support stapling (for incoming connections) The Must-Staple belongs to the certificate which was requested including "1.3.6.1.5.5.7.1.24=DER:30:03:02:01:05" in the CSR.

Re: [TLS] OCSP stapling problem

2018-12-18 Thread Salz, Rich
Does the server claim to support must-staple? ___ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls