Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement OCSP stapling #292

Closed
konklone opened this issue Oct 5, 2014 · 4 comments
Closed

Implement OCSP stapling #292

konklone opened this issue Oct 5, 2014 · 4 comments

Comments

@konklone
Copy link
Contributor

konklone commented Oct 5, 2014

OCSP stapling is a method for checking whether the SSL certificate for a website has been revoked at the very same time as you connect to the website. The revocation data is "stapled" to the SSL response at connection time.

Without OCSP stapling, browsers which do revocation checking (e.g. Firefox, but not Chrome) have to hit a web API that SSL certificate authorities provide, that offer a list of revoked certificates. Doing this is slow, has poorer security properties, and is a privacy leak (it shares browsing data with CAs).

It's not yet enabled in our nginx configuration, as I have a little more research to do -- especially in figuring out the instrumentation to test whether OCSP stapling is actually working.

@konklone
Copy link
Contributor Author

konklone commented May 6, 2016

A note that SSLMate has an excellent blog post on OCSP stapling implementation in nginx and Apache:

https://sslmate.com/blog/post/ocsp_stapling_in_apache_and_nginx

@konklone
Copy link
Contributor Author

konklone commented Sep 2, 2016

This is an upstream request of Federalist, but I think CloudFront supports OCSP stapling, so this may be solved for now.

@wslack
Copy link
Member

wslack commented Sep 2, 2016

@konklone should we have an issue in the federaist repo?

@konklone
Copy link
Contributor Author

konklone commented Sep 2, 2016

@wslack Yeah, it looks like it. SSL Labs says no OCSP stapling for 18f.gsa.gov: https://www.ssllabs.com/ssltest/analyze.html?d=18f.gsa.gov&s=52.84.213.151

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants