Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Accept TLS Feature (aka OCSP Must Staple) in CSRs #989

Closed
jsha opened this issue Oct 15, 2015 · 10 comments
Closed

Accept TLS Feature (aka OCSP Must Staple) in CSRs #989

jsha opened this issue Oct 15, 2015 · 10 comments

Comments

@jsha
Copy link
Contributor

jsha commented Oct 15, 2015

We need to do cloudflare/cfssl#390 first, and then it will be just a godep update and config change in Boulder.

@My1
Copy link

My1 commented Nov 29, 2015

but please use the feature just as opt-in and not as default.

@hlandau
Copy link
Contributor

hlandau commented Dec 7, 2015

cloudflare/cfssl#390 is now closed, so is this no longer blocked?

@jmhodges
Copy link
Contributor

jmhodges commented Dec 7, 2015

Yes, there is a PR up for it already that didn't get linked in. #1224

@selecadm
Copy link

selecadm commented Dec 7, 2015

Starting today, Comodo supports it. Yes, it respects extension in CSR with no additional actions required.
I appear to be its first customer with such certificates.
On the client side, it's already supported by Firefox Nightly.
Have posted links for testing on Twitter: https://twitter.com/selecadm/status/673992962192338944

My first thought was asking LE and not any other CA whether they are going to support it, but I searched in community and it's not so long to wait already. Though I stick to Comodo because of ECC support, it takes money and makes me wait for 5 minutes or even more between DCV and issuance.

Nice job!

@osirisinferi
Copy link

I would very much see this feature implemented before I request my certificates.

Any way I could help to make it happen? I see the pull request has some failing tests?

@konklone
Copy link

Looks like it was merged to Boulder 6 days ago in #1224, so this issue can be closed?

Any plans for when the feature might hit Let's Encrypt's staging or production servers?

@rolandshoemaker
Copy link
Contributor

#1224 was reverted, the fix for the breakage that introduced was merged today so it will hit staging on tuesday and should get to production, if nothing else breaks, a few days after that.

@nbraud
Copy link

nbraud commented Mar 29, 2016

@rolandshoemaker What's the status on this?

@jsha
Copy link
Contributor Author

jsha commented Mar 29, 2016

This is shipped, but not yet configured on. We're waiting for the fix for #1650 to ship to production before configuring it on.

@jsha
Copy link
Contributor Author

jsha commented May 24, 2016

Must Staple is now live in production.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

9 participants