[gnutls-devel] GnuTLS | It is not possible for server to check whether client requested OCSP stapling (#829)

Development of GNU's TLS library gnutls-devel at lists.gnutls.org
Sun Dec 15 14:09:40 CET 2019




jgh commented:


Yes.

It's closest to the latter, but slightly more subtle:  was a response actually sent?  The distinction being
that, because there could have been multiple possible server certs, and multiple possible OCSP responses -
it's quite feasible for the application code using the library to fail to have loaded up a consistent
combination.  Especially in the face of changing client behaviour, requiring the server to use a cert
for which no OCSP response has been loaded.  Therefore, a plain easy-to-use question
from the server application code to the server-side library, after the handshake: was an OCSP stapled
response sent?

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/issues/829#note_260466598
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20191215/ae422023/attachment.html>


More information about the Gnutls-devel mailing list