Join GitHub today
GitHub is home to over 20 million developers working together to host and review code, manage projects, and build software together.
Nginx OCSP stapling ssl_trusted_certificate #1813
Comments
riyadhalnur
commented
Dec 9, 2015
|
Using the |
pupboss
commented
Dec 9, 2015
|
@riyadhalnur OK, I'll try it now thanks :) |
pupboss
commented
Dec 9, 2015
|
Cool, I got it! |
pupboss
closed this
Dec 9, 2015
riyadhalnur
commented
Dec 9, 2015
|
Awesome. Btw I wrote a piece on getting started with Let's Encrypt - https://blog.verticalaxisbd.com/using-lets-encrypt-to-secure-your-site/ |
pupboss
commented
Jan 2, 2016
moseslecce
commented
Jan 5, 2016
|
I am also having an issue with correctly accessing the OCSP Stapling functionality from inside nginx. I believe the problem may have something to do with a HOST header. For example, when using the openssl command line tool to try and get a response from the letsencrypt server I get a 400 code unless I send a HOST header. I believe that nginx is not sending this header. E.g: openssl ocsp -issuer /etc/letsencrypt/live/site.com/chain.pem -cert /etc/letsencrypt/live/site.com/cert.pem -text -url http://ocsp.int-x1.letsencrypt.org/Error querying OCSP responsder openssl ocsp -issuer /etc/letsencrypt/live/site.com/chain.pem -cert /etc/letsencrypt/live/site.com/cert.pem -text -url http://ocsp.int-x1.letsencrypt.org/ -header "HOST" "ocsp.int-x1.letsencrypt.org" Gets a full response with a few items that look a bit wrong: OCSP Response Data: |



pupboss commentedDec 7, 2015
After running the
./letsencrypt-autocommand, we got four files:privkey.pem,cert.pem,chain.pem,fullchain.pem.For OCSP stapling configuration of Nginx, we also need a cert which include the
cert.pem,chain.pem, andDST Root CA X3 cert.Please rename
fullchain.pemtocert_nginx.pemand generate a real full chain certificate.Here is the content of DST Root CA X3: