-
Notifications
You must be signed in to change notification settings - Fork 100
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for OCSP verification #1213
Conversation
d6890c9
to
3081ce6
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@fnikolai, looking good! Left some comments/questions. Thank you!
f001453
to
49bb33b
Compare
Thanks for the updates @fnikolai - it'll likely get re-reviewed toward the end of this week / early next week as people return from holidays. |
Just returning from holidays here, thank you for your patience @fnikolai! Replies added directly inline. |
b7ac1cd
to
a41721e
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is the last remaining issue that I can see.
I'm conscious that the E2E tests are using a cert chain that is from a TLS client/server, and that removing this will break that test. For now, I think it might be best to remove that test, or assert that it fails, so this work can be merged.
@tri-adam
@dtrudg I believe it is now ready to be merged. |
There's a conflict on Thanks! |
Signed-off-by: Fotis Nikolaidis <[email protected]>
@dtrudg done |
@fnikolai - LGTM. I'll do a final quick sanity check for my benefit then merge, as tri-adam is travelling. Many thanks for your efforts on this, and patience working through the reviews etc. over the holiday period. |
It's my pleasure to jump in. Looking forward to the next contribution. |
Signed-off-by: Fotis Nikolaidis [email protected]
Description of the Pull Request (PR):
Add support for Online Revocation Checks using the OCSP protocols.
This fixes or addresses the following GitHub issues:
Testing & Limitations
Since there is no officially signed certificate chain for Singularity, the validation of OCSP is done:
Using the self-signed certificates. However, e2e testing fails because the root certificate is signed using Ed25519 (see the issue discussion)
Using third-party certificate chain (AKAMAI). OCSP successfully validates the certificate, but the signature verification fails (since they are not useful for signing the image).