django-ca
django-ca copied to clipboard
OCSP request for unknown cert received
I have set several OCSP paths, but only the first OCSP service path can respond normally, while the others all return OCSP request for unknown cert received:
Sincere thanks and looking forward to your reply!
Hi @PIKACHUIM ,
Thanks for your report! I'll look into it right away.
But just to be sure: do you really have a need for this feature - if you configure CA_DEFAULT_HOSTNAME, there is no need to actually configure these - django-ca will provide fine default values.
In any case, can you also give me
- The Python version you're using.
- The django-ca version you're using.
- How you have set up your CA (from source? as Django app? ...)
kr, Mat
Thank you for your patient reply!
For these reasons, I would like to use a custom OCSP service:
- I would like to customize the URL path for OCSP services
- I found that the URL path of OCSP set by default CA looks like this
ca/ issuer/<hex:serial>.der [name='issuer']
ca/ ocsp/<hex:serial>/cert/ [name='ocsp-cert-post']
ca/ ocsp/<hex:serial>/cert/<base64:data> [name='ocsp-cert-get']
ca/ ocsp/<hex:serial>/ca/ [name='ocsp-ca-post']
ca/ ocsp/<hex:serial>/ca/<base64:data> [name='ocsp-ca-get']
ca/ crl/<hex:serial>/ [name='crl']
ca/ crl/ca/<hex:serial>/ [name='ca-crl']
I will use NGINX to reverse proxy each CA address, I don't know how to set it up. I need each different CA to have a dedicated OCSP URL.
Information provided:
Python version: 3.12
Package version: Django==5.0.1, Django ca=1.27.0, Django object actions==4.2.0
CA Setup: Django app
By the way, what is the mechanism for OCSP to return certificate status judgment
Our certification authority has the following structure:
I imported all the certificates and manually set up three OCSP servers, but only the first OCSP returned Good, while the rest returned Unknown.
Thank you for your help. If you need any further information, I will provide it.
Hi @PIKACHUIM,
I tried to reproduce the issue, but failed. From what I can tell, it works as it should. First, let me answer that question of yours:
By the way, what is the mechanism for OCSP to return certificate status judgment
The certificate has a revoked flag, if it is set, the certificate is considered revoked. You can set it using manage.py revoke or via the admin interface.
But to find the certificate (you get an unknown cert response) a few things need to fall into place. Hopefully by going through them one-by-one, you can find the issue:
- The key specifies the URL path to use for OCSP requests. In your case
/django_ca/ocsp/RSA8192/,/django_ca/ocsp/RSA4096/and so on. It's a free-form key, so it really can be (almost) anything. - If the
cakey is not set, the key is also used to identify the CA. You setca, so the key is not used to identify the CA and has no principal relation to the CA (so you could use"RSA4019": {"ca": "ECCP521"}, if you wanted). - During the request, the
cakey is used to identify the CA that has signed the certificate. - The serial encoded in the OCSP request identifies the certificate of interest.
- Look up the CA based on the
cakey (it looks up some CA at least, in your case). - Look up the certificate based on the CA and the serial number (this way certs for different CAs could have the same serial).
So in your case I would check:
- Does the
cakey in your configuration identify the correct CA? - Do the imported certificates link to the correct CA?
- Are you really using the correct URL path for making requests?
- Since you mention an NGINX proxy, does the proxy work correctly, and does django-ca get the right request?
You can check point 2 easily with the manage.py list_certs --ca=<serial> command or in the admin interface.
kr, Mat
When trying reproduce the issue, I initialized the project using dev.py init-demo (which also creates OCSP certs), then ran manage.py runserver, with the following configuration:
CA_OCSP_URLS = {
"root": {
"ca": "...",
"responder_key": "/home/.../django-ca/ca/files/ocsp/....key",
"responder_cert": "/home/.../django-ca/ca/files/ocsp/....pem",
"expires": 3600,
},
"ed448": {
"ca": "...",
"expires": 3600,
"responder_key": "/home/.../django-ca/ca/files/ocsp/....key",
"responder_cert": "/home/.../django-ca/ca/files/ocsp/....pem",
},
"ed25519": {
"ca": "...",
"expires": 3600,
"responder_key": "/home/.../django-ca/ca/files/ocsp/....key",
"responder_cert": "/home/.../django-ca/ca/files/ocsp/....pem",
},
}
I then ran the following OCSP requests using the openssl shell:
$ openssl ocsp -CAfile ca/files/root.pub -issuer ca/files/root.pub -cert ca/files/root-cert.pub -url http://localhost:8000/django_ca/ocsp/root/ -resp_text
...
Response verify OK
ca/files/root-cert.pub: good
This Update: Jan 27 09:15:10 2024 GMT
Next Update: Jan 27 10:15:10 2024 GMT
$ openssl ocsp -CAfile ca/files/ed448.pub -issuer ca/files/ed448.pub -cert ca/files/ed448-cert.pub -url http://localhost:8000/django_ca/ocsp/ed448/ -resp_text
...
Response verify OK
ca/files/ed448-cert.pub: good
This Update: Jan 27 09:15:52 2024 GMT
Next Update: Jan 27 10:15:52 2024 GMT
$ openssl ocsp -CAfile ca/files/ed25519.pub -issuer ca/files/ed25519.pub -cert ca/files/ed25519-cert.pub -url http://localhost:8000/django_ca/ocsp/ed25519/ -resp_text
...
Response verify OK
ca/files/ed25519-cert.pub: good
This Update: Jan 27 09:16:12 2024 GMT
Next Update: Jan 27 10:16:12 2024 GMT
If there is anything I might have missed here, or you want to share additional configuration, of course please let me know!
PS: Please note that you're using absolute paths, this is deprecated, see documentation. I will actually remove deprecate support for this in 1.28.0.
Thank you for your reply and detailed guidance.I will follow your method to find the problem. If there are any problems or results, I will reply to you. Thank you again for your detailed answer!
closing this topic as there there is no further response. @PIKACHUIM , I hope django-ca is useful to you!
Please feel free to re-open this ticket or open a new one if you have any further questions!