Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ignore OCSP checks for short-lived certificates #41

Open
Seirdy opened this issue Apr 15, 2024 · 1 comment
Open

Ignore OCSP checks for short-lived certificates #41

Seirdy opened this issue Apr 15, 2024 · 1 comment

Comments

@Seirdy
Copy link

Seirdy commented Apr 15, 2024

Firefox skips OCSP checks for certificates with a lifetime of under 10 days. At this point, OCSP stapling becomes redundant: since the whole certificate will renew within days, an additional parameter that only serves to expire after a similar duration isn't very meaningful.

Ready's OCSP stapling check should allow certs with short lifetimes to automatically pass. Certain CAs support the ACME notBefore and notAfter parameters to control lifetimes (Sectigo's ZeroSSL and Google Trust Services are two examples), and can issue such short-lived certificates.

I'll share a PR with a (messy) PoC, but I don't know of any domains to test it with.

@Seirdy
Copy link
Author

Seirdy commented Apr 15, 2024

Perhaps Ready should actually penalize the use of OCSP stapling on short-lived certificates, as OCSP is unnecessary overhead when a cert is too short-lived for week-long revocation cycles to make sense.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant