Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Request for OCSP Stapling #499

Closed
wslack opened this issue Sep 2, 2016 · 7 comments
Closed

Request for OCSP Stapling #499

wslack opened this issue Sep 2, 2016 · 7 comments
Assignees

Comments

@wslack
Copy link
Contributor

wslack commented Sep 2, 2016

Per 18F/18f.gsa.gov#292

@jmhooper jmhooper self-assigned this Dec 22, 2016
@jmhooper
Copy link
Contributor

Despite the above, it looks like SSL Labs is still saying we don't have OCSP stapling enabled?

I found an AWS Developer Forum Thread where they point to the the docs on OCSP stapling posted above as an answer to why someone did not see OCSP stapling.

@jmhooper
Copy link
Contributor

From Amazon's docs on OCSP stapling:

If your distribution doesn't get much traffic in a CloudFront edge location, new requests are more likely to be directed to a server that hasn't validated the certificate with the CA yet. In that case, the viewer separately performs the validation step and the CloudFront server serves the object. That CloudFront server also submits a validation request to the CA, so the next time it receives a request that includes the same domain name, it has a validation response from the CA.

So it looks like the servers in edge locations will only have OCSP stapling enabled when they receive multiple requests from a client over some period of time.

@wslack
Copy link
Contributor Author

wslack commented Dec 30, 2016

@konklone given the info ^^, should we leave this open? Seems like it should be closed unless we want off CloudFront

@konklone
Copy link

konklone commented Jan 3, 2017

Let's close it and re-open if it emerges as a more significant issue later.

@konklone
Copy link

konklone commented Jan 3, 2017

However, note that if Federalist ever needs to explicitly discuss the third parties that might receive data about visitors to Federalist sites, the certificate authority will need to be listed as a potential third party that will get pinged. One of the benefits of OCSP stapling is that it removes this data sharing.

@wslack
Copy link
Contributor Author

wslack commented Jan 3, 2017

kk, I'm going to move this to our icebox but leave it open

@wslack
Copy link
Contributor Author

wslack commented May 18, 2018

Closing; can reopen if ever asked.

@wslack wslack closed this as completed May 18, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants