-
Notifications
You must be signed in to change notification settings - Fork 241
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CRL, OCSP and IPv6 #68
Comments
Why is it relevant that a CA has IPv6 OCSP and CRL infrastructure? |
For what i understand, when OCSP stapling is implemented the web server queries the OCSP server and the response is "stapled" in the tls handshake. When OCSP stapling is configured in the server, if the server is pure IPv6 doesn't it try to communicate via IPv6 with the OCSP server? If so, if the server is IPv6 and the CA OCSP is only IPv4, it will not work, right? I don't see many cases for this now, but with IPv4 exaustion, i guess it will happen more in the future. Also if a client only has IPv6? How will he connect to the OCSP server if it doesn't support IPv4? I don't think it's a priority but it would be good to test OCSP IPv6 support in the future. |
I understand. We don't test IPv6 at all now, but that should change soon. I'll consider this ticket then. |
ivanr, another thing i remembered is that you can have the same server with SNI for IPv4 and without SNI for IPv6, since a provider can give one IPv4 and a lots of IPv6 for the same server, like DO for instance. |
GlobalSign warns about CRL and OCSP inaccessibility over IPv6 primarily because their own servers support IPv6. Comodo made the servers available over IPv6 on 15 February 2015. Who else? |
Yes, Globalsign and Comodo seem to be the only ones: Entrust as some IPv6 capability, but doesn't seem to have full support Don't know other that provides OCSP/CRL in IPv6. |
Hi Ivan,
In the API docs you have «ocspStapling - true if OCSP stapling is deployed on the server»
But many CA's doesn't have OCSP IPv6 responders.
A nice list (probably outdated) in http://unmitigatedrisk.com/?p=147
So, reggarding this, if the server is:
Is this the result of the test? or ssl scan test doesn't test IPv6 OCSP?
A similiar case also for CRL in IPv6. For instance if a server is serving IPv6 and has a certificate from a CA with only IPv4 CRL, should this server be considered exceptional?
Also if a server has IPv6 shouldn't the endpoints IPv6 also be in the API JSON result (ex: "ipv6Address")?
Thanks
The text was updated successfully, but these errors were encountered: