mirror of
https://git.haproxy.org/git/haproxy.git/
synced 2025-08-07 07:37:02 +02:00
DOC: ssl: Add ocsp-update troubleshooting clues and emphasize on crt-list only aspect
The current limitation of the 'ocsp-update' option and the fact that it can only be used in crt-lists was puzzling for some people so the doc was amended to emphasize this specificity. A configuration extract was added as well. A few troubleshooting clues were added as well. Must be backported in 2.8.
This commit is contained in:
parent
8352f00261
commit
a9b1a4edd9
@ -15286,13 +15286,24 @@ npn <protocols>
|
|||||||
at the time of writing this. It is possible to enable both NPN and ALPN
|
at the time of writing this. It is possible to enable both NPN and ALPN
|
||||||
though it probably doesn't make any sense out of testing.
|
though it probably doesn't make any sense out of testing.
|
||||||
|
|
||||||
ocsp-update [ off | on ]
|
ocsp-update [ off | on ] (crt-list only)
|
||||||
Enable automatic OCSP response update when set to 'on', disable it otherwise.
|
Enable automatic OCSP response update when set to 'on', disable it otherwise.
|
||||||
Its value defaults to 'off'.
|
Its value defaults to 'off'.
|
||||||
This option can only be used in a crt-list line so that is applies to only
|
Please note that for now, this option can only be used in a crt-list line, it
|
||||||
one certificate at a time. If a given certificate is used in multiple
|
cannot be used directly on a bind line. It lies in this "Bind options"
|
||||||
crt-lists with different values of the 'ocsp-update' set, an error will be
|
section because it is still a frontend option. This limitation was set so
|
||||||
raised.
|
that the option applies to only one certificate at a time.
|
||||||
|
If a given certificate is used in multiple crt-lists with different values of
|
||||||
|
the 'ocsp-update' set, an error will be raised. Here is an example
|
||||||
|
configuration enabling it:
|
||||||
|
|
||||||
|
haproxy.cfg:
|
||||||
|
frontend fe
|
||||||
|
bind :443 ssl crt-list haproxy.list
|
||||||
|
|
||||||
|
haproxy.list:
|
||||||
|
server_cert.pem [ocsp-update on] foo.bar
|
||||||
|
|
||||||
When the option is set to 'on', we will try to get an ocsp response whenever
|
When the option is set to 'on', we will try to get an ocsp response whenever
|
||||||
an ocsp uri is found in the frontend's certificate. The only limitation of
|
an ocsp uri is found in the frontend's certificate. The only limitation of
|
||||||
this mode is that the certificate's issuer will have to be known in order for
|
this mode is that the certificate's issuer will have to be known in order for
|
||||||
@ -15310,9 +15321,9 @@ ocsp-update [ off | on ]
|
|||||||
short time after init.
|
short time after init.
|
||||||
On the other hand, if a certificate has an OCSP uri specified and no OCSP
|
On the other hand, if a certificate has an OCSP uri specified and no OCSP
|
||||||
response, setting this option to 'on' for the given certificate will ensure
|
response, setting this option to 'on' for the given certificate will ensure
|
||||||
that the OCSP response gets fetched automatically right after init. The
|
that the OCSP response gets fetched automatically right after init.
|
||||||
default minimum and maximum delays (5 minutes and 1 hour respectively) can be
|
The default minimum and maximum delays (5 minutes and 1 hour respectively)
|
||||||
configured by the "tune.ssl.ocsp-update.maxdelay" and
|
can be configured by the "tune.ssl.ocsp-update.maxdelay" and
|
||||||
"tune.ssl.ocsp-update.mindelay" global options.
|
"tune.ssl.ocsp-update.mindelay" global options.
|
||||||
|
|
||||||
Whenever an OCSP response is updated by the auto update task or following a
|
Whenever an OCSP response is updated by the auto update task or following a
|
||||||
@ -15347,6 +15358,15 @@ ocsp-update [ off | on ]
|
|||||||
<OCSP-UPDATE> -/- 2/0/-1/-1/3009 503 217 - - SC-- 0/0/0/0/3 0/0 {} \
|
<OCSP-UPDATE> -/- 2/0/-1/-1/3009 503 217 - - SC-- 0/0/0/0/3 0/0 {} \
|
||||||
"GET http://127.0.0.1:12345/MEMwQT HTTP/1.1"
|
"GET http://127.0.0.1:12345/MEMwQT HTTP/1.1"
|
||||||
|
|
||||||
|
Troubleshooting:
|
||||||
|
A common error that can happen with let's encrypt certificates is if the DNS
|
||||||
|
resolution provides an IPv6 address and your system does not have a valid
|
||||||
|
outgoing IPv6 route. In such a case, you can either create the appropriate
|
||||||
|
route or set the "httpclient.resolvers.prefer ipv4" option in the global
|
||||||
|
section.
|
||||||
|
In case of "OCSP response check failure" error, you might want to check that
|
||||||
|
the issuer certificate that you provided is valid.
|
||||||
|
|
||||||
prefer-client-ciphers
|
prefer-client-ciphers
|
||||||
Use the client's preference when selecting the cipher suite, by default
|
Use the client's preference when selecting the cipher suite, by default
|
||||||
the server's preference is enforced. This option is also available on
|
the server's preference is enforced. This option is also available on
|
||||||
|
Loading…
Reference in New Issue
Block a user