-
Notifications
You must be signed in to change notification settings - Fork 17.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
crypto/tls: implement OCSP Must-Staple #22274
Comments
Another one for you s'il vous plait @agl. |
Firstly, there's nothing stopping you from using Firefox supports must-staple now and Chrome has Expect-stable support. I think Cloudflare have it on blog.cloudflare.com. So it's plausible, but a bigger job than can reasonably happen in the 1.10 cycle. |
Proposal accepted based on @agl's comment. Please go ahead and send in an implementation. |
Retitled to reflect that this is about implementing OCSP Must-Staple across crypto/tls and crypto/x509. |
@FiloSottile @agl Until this is done, what are my options to perform OCSP verification in a client (non-HTTP client, if that matters). For my use case, I need to be able to determine whether or not the certificate presented by the server has a Must-Staple extension, the stapled response returned by the server, if any, and the OCSP responder endpoint for the certificate presented by the server. I've seen two recommended options so far:
Any suggestions? |
Randomly stumbled across this and thought it might be an interesting issue to tackle (that is if nobody else is already working on it!). It seems like there are two real units of work here:
Support for RFC 7633 can be added by just accomplishing (1), but that ends up off-loading significant responsibility to the user who might not really be paying attention. On the other hand bundling the two changes together makes a significantly more complex changeset. |
Actually (2) probably doesn't make much sense, the existing |
Would anyone be open to a patch to crypto/x509 that checks for this extension and exposes it as a bool in the Certificate struct? Kinda like type Certificate struct {
...
// If this certificate requires OCSP Stapling.
MustStapleOCSP bool
...
} It seems a lot easier than checking for the extension by its ID. |
A bit over a year ago, someone created an issue to add support for RFC 7633 TLS Feature Extension into
crypto/tls
but it was closed by @agl because he felt it was premature and that OCSP stapling wasn't really supported as a client in Go (not sure if that has changed?).See #13074
It's been more than a year so I'm creating this issue to see what he thinks of it now.
The text was updated successfully, but these errors were encountered: