Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCSP timeout is considered "Good (not revoked)" #796

Open
folkol opened this issue Apr 29, 2020 · 7 comments
Open

OCSP timeout is considered "Good (not revoked)" #796

folkol opened this issue Apr 29, 2020 · 7 comments

Comments

@folkol
Copy link

folkol commented Apr 29, 2020

I got "Revocation status: Good (Not revoked)", but it also showed an error "OCSP ERROR: Exception: Read timed out".

(I performed this scan on 2020-03-12 07:19:57 UTC.)

@tamthing
Copy link

We will look at it. Could you share the domain to https://discussions.qualys.com/people/tamthing ? Thanks.

@folkol
Copy link
Author

folkol commented Apr 30, 2020

Sure. I'll PM you there.

@tamthing
Copy link

tamthing commented May 6, 2020

Hi @folkol , this issue is not reproducible anymore both on www.ssllabs.com & dev.ssllabs.com. However, if an error has occurred like in your case, the revocation status is not correctly represented and we have created a ticket to fix that.

Please note that this kind of issue is seldom expected to happen.

@folkol
Copy link
Author

folkol commented Apr 12, 2021

For what it's worth, it happened again (just now):

image

@logopk
Copy link

logopk commented Apr 30, 2021

Here too, today (just now)

@noloader
Copy link

noloader commented May 12, 2021

@folkol,,

I'm seeing this too with a Let's Encrypt chain. It looks liek an intermittent problem. I'm guessing there's a race somewhere in the server code (either SSL Labs or the OCSP).

I got "Revocation status: Good (Not revoked)", but it also showed an error "OCSP ERROR: Exception: Read timed out".

This is expected... The lawyers from the CA's got involved. They decided they did not want the legal liability of associated with a "certificate is good" when in fact certificate (or the private key was bad). Instead they return a response of "certificate is not bad"/"certificate is bad". Since the predicate is based on "not bad", getting a "not bad" response is considered good/success. That is, there's a difference legal distinction between "certificate is good" and "certificate is not bad". A timeout is effectively a the same as not getting a "certificate is bad" response. (You can't make this shit up...).

@folkol
Copy link
Author

folkol commented May 12, 2021

I am not surprised that the check fails intermittently—it is a distributed system after all—the only thing that I find confusing is the presentation on the report page. I would have preferred "indeterminate" or something similar if the check (and retries?) failed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants