Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-110794

libpkix does not process id-pkix-oscp-nocheck extension

Linking RHIVOS CVEs to...Migration: Automation ...SWIFT: POC ConversionSync from "Extern...XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Minor Minor
    • None
    • rhel-10.0
    • nss
    • None
    • No
    • Low
    • rhel-security-crypto-clubs
    • None
    • False
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • Enabled
    • Automated
    • Unspecified
    • Unspecified
    • Unspecified
    • All
    • None

      What were you trying to do that didn't work?

      NSS ocspclnt fails to verify response signed by a delegated OCSP responder with critical id-pkix-ocsp-nocheck extension.

      The actual scenario is as follows:

       

      1. Create a PKI structure with separate OCSP server and leaf certificates
      2. Start ocsp responder with the certificate (a custom java OCSP responder, same code for RHEL-9 and RHEL-10 except that java-17 is used on RHEL-9 and java-21 on RHEL-10)
      3. Try to verify any certificate using NSS ocspclnt

      On RHEL-9 verification succeeds - Verification of certificate "server” succeeded. On RHEL-10 it fails - Verification of certificate "server" failed.  Reason: Peer's Certificate has been revoked.

      With NSS_DISABLE_PKIX_VERIFY=1 verification succeed on RHEL-10 too. Hence this looks like a bug in libpkix.

      Please provide the package NVR for which the bug is seen:

      nss-3.101, nss-3.112 

      How reproducible is this bug?:

      Expected results

      Verification suceeded.

      Actual results

      Verification of certificate "server" failed.  Reason: Peer's Certificate has been revoked.

              rrelyea Robert Relyea
              omoris Ondrej Moris
              Robert Relyea Robert Relyea
              Ondrej Moris Ondrej Moris
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

                Created:
                Updated: