Important information about Certificates/CAs/OCSP Must-Staple #1285
Replies: 4 comments 12 replies
-
Thanks for this explanation, |
Beta Was this translation helpful? Give feedback.
-
Would Googles "newish" TLS service suffice as a substitute? https://pki.goog Setup procedure: https://cloud.google.com/certificate-manager/docs/public-ca-tutorial Keypoints:
The only CON I see with them is that you need to connect it to a google cloud project, then enable google CA API in the project and use that API key to request certificates. But it works for normal free google accounts or any random google account you create and they provide a cli tool so the process can be fully scripted.
I just tried the procedure and uploaded the certificate manually to NPMPlus and added it to this domain if you want to inspect the certificate "removed domain". Edit: I ran certbot-ocsp-fetcher for it and updated the host manually to enable stapling for the custom certificate inside the container, SSLLabs is now reporting Stapling for it as well. I couldnt get OCSP Stapling with Must-Staple to work, only OCSP Stapling without Must-Staple. Google might not support Must-Staple after further testing :( |
Beta Was this translation helpful? Give feedback.
-
Ah, this explains why my applications and websites started behaving wonky recently. Reverted back to the version from early November which is working without problems. I'll take a look in January to see what actions are expected of me, I'm using Unraid which is working with templates and the template that was added for NPMplus is missing the (newly added?) environment variables (there would be no problems adding them myself). |
Beta Was this translation helpful? Give feedback.
-
Note: This is not a new release but an important information
Let's Encrypt has made an announcement today which has a huge impact on NPMplus, you can read it here: https://letsencrypt.org/2024/12/05/ending-ocsp
If you have any question/ideas etc. on this topic, please write a comment
What is OCSP/CRLs?
OCSP:
=> useful, but with a privacy problem, maybe takes some time to be detected because of cache
OCSP Stapling without Must-Staple:
=> useless without must staple, see below
OCSP Stapling with Must-Staple:
=> useful, if supported by the client, maybe takes some time to be detected because of validity of “second certificate”
CRLs
=> depends: if the revocation information of your cert is not included, then it is useless, otherwise it is ok
My opinion on this (I mostly talk about Must-Staple)
What now?
When will the change happen?
This discussion was created from the release Important information about Certificates/CAs/OCSP Must-Staple.
Beta Was this translation helpful? Give feedback.
All reactions