-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[nginx] Support ssl ocsp stapling #416
Comments
that is the reason why I never added this options ;)
Maybe we can check if the certificate contains the necessary information and enable this per SSL certificate |
That would be awesome, and by the way start checking from the ground up if the chain is signed properly. |
For people here using kube-lego, this issue is presently open regarding getting the must staple option included in newly requested certs. |
This will be required for many implementations of Certificate Transparency. For example, I know Let's Encrypt planned to embed them in OCSP responses. As Google Chrome will not be trusting any certs without CT starting October 2017, it would be nice if we had a stable version with OCSP stapling by then. |
If any of you had an issue in enabling OCSP like me follow the steps below.
Notes:
|
Hi,
...
could you please explain where I can add these "args" ? Apparently I cannot add these to a running nginx-ingress-controller in minikube (as an addon). Thank you for your support. Peter |
It needs to be added in nginx-ingress-deployment.yaml file. snippet of configuration.
|
Well I don't have this file (as I installed this with "minikube addons enable ingress")... |
Would love to see support for this implemented. The options to enable are fairly trivial.
Something like:
By default these global options should be off. This is because not every certificate contains the root/intermediate combined for the webserver to actually properly perform oscp. Luckily, LetsEncrypt does. Because of this, I think its best to have the global options disabled by default but allow an annotation for ingresses to optionally enable this.
Although, this could go deeper for per-ingress enablement as there is also the
ssl_trusted_certificate
option where people can also manually specify their root/intermediate cert.There is actually another issue asking for this here (in the old repo) as well.
The text was updated successfully, but these errors were encountered: