• Login
    • Search
    • Categories
    • Recent
    • Tags
    • Users
    • Groups
    • Rules
    • Help

    Do more on the web, with a fast and secure browser!

    Download Opera browser with:

    • built-in ad blocker
    • battery saver
    • free VPN
    Download Opera

    OCSP hard-fail

    Suggestions and feature requests
    3
    8
    2184
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • rschulz
      rschulz last edited by

      Opera should add an option, to opt-in into OCSP hard-fail. Firefox and Explorer allow this configuration and I think that it makes sense in the wake of heartbleed. An error to connect to the OCSP server should either produce an error message or at least a warning (similar to mixed content).
      For background:

      • http://arstechnica.com/security/2014/04/how-heartbleed-transformed-https-security-into-the-stuff-of-absurdist-theater/
      • http://security.stackexchange.com/questions/55457/how-to-configure-browser-to-detect-revoked-certificates
      • http://news.netcraft.com/archives/2014/04/24/certificate-revocation-why-browsers-remain-affected-by-heartbleed.html
      Reply Quote 0
        1 Reply Last reply
      • burnout426
        burnout426 Volunteer last edited by

        +1

        Reply Quote 0
          1 Reply Last reply
        • Deleted User
          Deleted User last edited by

          Opera 12 always operates that way, it can't not. But I have no idea how the 15+ series behaves.

          Reply Quote 0
            1 Reply Last reply
          • rschulz
            rschulz last edited by

            I created a test page to see how browsers behave: http://crt.rschulz.eu. It shows that Opera doesn't detect if the OCSP or CRL server is not reachable.

            Reply Quote 0
              1 Reply Last reply
            • Deleted User
              Deleted User last edited by

              @rschulz Opera should add an option, to opt-in into OCSP hard-fail.

              This would be a good feature. But error pages or warnings may annoy users and they would disable the feature as certificate warnings occuring on website were often clicked away.

              And what can a user do, if a OCSP and/or CRL server is not reachable? Stop surfing?
              No, i remmber OCSP problems with some CAs years ago with Opera 10 and 11. The only workaround was: disable "OCSP Validate Certificates"

              I think that it makes sense in the wake of heartbleed

              Why? Do you think the feature really helps standard users secured against compromised CAs or MiM attacks? or do you thins the feature would be good for Opera longtime pros/geeks?

              Reply Quote 0
                1 Reply Last reply
              • rschulz
                rschulz last edited by

                Most OCSP are getting pretty good with the uptime. See http://uptime.netcraft.com/perf/reports/performance/OCSP . I think a reasonable response of a user accessing a large e-commerce site, which is probably using a reliable CA, over a public wifi, is not enter a credit card if such a warning is shown. Very similar to the case where a site shows a self-signed certificate.

                I don't think it should be a fatal error. Some CA's still have unreliable CAs. One could use the netcraft data to handle them differently, but adding that information to the warning. But even for the reliable CAs it is still possible to not have access to the OCSP server (e.g. firewall or captive portals). Opera should show a dialog similar to the one it shows for self-signed certificates. This lets the user decide whether the risk is reasonable.

                Soft-fail is completely useless: https://www.imperialviolet.org/2014/04/29/revocationagain.html. The argument by netcraft (http://news.netcraft.com/archives/2014/04/24/certificate-revocation-why-browsers-remain-affected-by-heartbleed.html) that at least CRL isn't useless without hard-fail isn't correct, because Opera doesn't cache CRLs between browser restarts. Thus Opera should either remove CRL/OCSP checks completely and add crlset (as Chrome - of course this means that no revocation checking is done for most sites not included in crlset), or should show some warning if the CRL/OCSP isn't accessible. As it is right now the revocation checking is simply broken and useless.

                Reply Quote 0
                  1 Reply Last reply
                • Deleted User
                  Deleted User last edited by

                  OK, OCSP works, mostly.
                  I may be wrong, but OCSP depends on correct domain-to-IP resolving if sub-/domains are used. You cant really trust domain servers.
                  Yes, DNSSec exists.

                  Reply Quote 0
                    1 Reply Last reply
                  • rschulz
                    rschulz last edited by

                    OCSP works until it is needed. See in https://www.imperialviolet.org/2012/02/05/crlsets.html the comparison to the seat-belt. A hacker which can do a MITM attack (the main reason to have certificates), can block access to the OCSP server in all important cases. Thus without a warning that the OCSP server isn't reachable, OCSP is completely useless because it fails exactly when it is needed (someone is attacking you).

                    Reply Quote 0
                      1 Reply Last reply
                    • First post
                      Last post

                    Computer browsers

                    • Opera for Windows
                    • Opera for Mac
                    • Opera for Linux
                    • Opera beta version
                    • Opera USB

                    Mobile browsers

                    • Opera for Android
                    • Opera Mini
                    • Opera Touch
                    • Opera for basic phones

                    • Add-ons
                    • Opera account
                    • Wallpapers
                    • Opera Ads

                    • Help & support
                    • Opera blogs
                    • Opera forums
                    • Dev.Opera

                    • Security
                    • Privacy
                    • Cookies Policy
                    • EULA
                    • Terms of Service

                    • About Opera
                    • Press info
                    • Jobs
                    • Investors
                    • Become a partner
                    • Contact us

                    Follow Opera

                    • Opera - Facebook
                    • Opera - Twitter
                    • Opera - YouTube
                    • Opera - LinkedIn
                    • Opera - Instagram

                    © Opera Software 1995-