strongswan/src/libstrongswan/plugins/revocation
Martin Willi 7efe92130a revocation: Validate OCSP nonce only if response actually contains a nonce
Commit 27756b081c (revocation: Check that nonce in OCSP response matches)
introduced strict nonce validation to prevent replay attacks with OCSP
responses having a longer lifetime. However, many commercial CAs (such as
Digicert) do not support nonces in responses, as they reuse once-issued OCSP
responses for the OCSP lifetime. This can be problematic for replay attack
scenarios, but is nothing we can fix at our end.

With the mentioned commit, such OCSP responses get completely unusable,
requiring the fallback to CRL based revocation. CRLs don't provide any
replay protection either, so there is nothing gained security-wise, but may
require a download of several megabytes CRL data.

To make use of replay protection where available, but fix OCSP verification
where it is not, do nonce verification only if the response actually contains
a nonce. To be safe against replay attacks, one has to fix the OCSP responder
or use a different CA, but this is not something we can enforce.

Fixes #3557.
2020-10-27 10:51:51 +01:00
..
Makefile.am plugins: Don't link with -rdynamic on Windows 2014-06-04 15:53:02 +02:00
revocation_plugin.c revocation: Support en-/disabling CRL/OCSP at runtime 2018-07-03 11:31:40 +02:00
revocation_plugin.h Moved CRL/OCSP checking to a dedicated plugin called revocation 2010-07-13 10:26:07 +02:00
revocation_validator.c revocation: Validate OCSP nonce only if response actually contains a nonce 2020-10-27 10:51:51 +01:00
revocation_validator.h revocation: Support en-/disabling CRL/OCSP at runtime 2018-07-03 11:31:40 +02:00