Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Refactor OCSP client to support better retries #19345

Merged
merged 1 commit into from
Feb 24, 2023

Conversation

cipherboy
Copy link
Contributor

Mirror NSS's GET-vs-POST selection criteria, wherein GET is preferred over POST (as the former might be a response from a cached CDN entry, whereas the latter might hit a live responder). However, only accept it if it definitively says "Good" or "Revoked" -- trigger a POST request when an unknown or failure status is seen.


Because existing Vault PKI engines respond with a parse error, and not Method Not Allowed, this would probably be useful to backport to 1.13, which is the first release with OCSP support.

Mirror NSS's GET-vs-POST selection criteria, wherein GET is preferred
over POST (as the former might be a response from a cached CDN entry,
whereas the latter might hit a live responder). However, only accept it
if it definitively says "Good" or "Revoked" -- trigger a POST request
when an unknown or failure status is seen.

Signed-off-by: Alexander Scheel <[email protected]>
@cipherboy cipherboy added bug Used to indicate a potential bug auth/cert Authentication - certificates backport/1.13.x labels Feb 24, 2023
@cipherboy cipherboy added this to the 1.14 milestone Feb 24, 2023
@cipherboy cipherboy requested review from sgmiller, stevendpclark and a team February 24, 2023 16:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
auth/cert Authentication - certificates bug Used to indicate a potential bug
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants