On Thu, Dec 10, 2020 at 03:24:39PM +0100, Björn Jacke wrote:
> Hi William,
> 
> On 09.12.20 09:27, William Lallemand wrote:
> >     $ echo -e -n "@1 set ssl cert server1.fullchain.pem <<\n$(cat 
> > server2.fullchain.pem)\n\n" | socat - /tmp/master.socket
> >     $ echo -e "@1 set ssl cert server1.fullchain.pem.ocsp <<\n$(base64 -w 
> > 10000 server2.fullchain.ocsp)\n" | socat - /tmp/master.socket
> >     $ echo "@1 commit ssl cert server1.fullchain.pem" | socat - 
> > /tmp/master.socket
> > 
> > It should activate the OCSP with the new SSL context.
> 
> thanks, yes, using "set ssl cert fullchain.pem.ocsp" instead of "set ssl
> ocsp-response ..." makes it succeed.
> 
> As far as I can see the "set ssl cert fullchain.pem.ocsp" method is
> *generally* suitable to update ocsp responses and can be used as a drop
> in replacement for the "set ssl ocsp-response" method, which is not
> working correctly in the case, where the intermediate cert changed?
> 

The "set ssl cert" method generates the new SSL context the same way it
is done with a reload. So it's a little bit heavier than just updating
the OCSP response.

If you commit the certificate without the .ocsp, it's like you
reloaded haproxy with the previous .ocsp file.

-- 
William Lallemand

Reply via email to