搜尋 Mozilla 技術支援網站

防止技術支援詐騙。我們絕對不會要求您撥打電話或發送簡訊,或是提供個人資訊。請用「回報濫用」功能回報可疑的行為。

了解更多

MOZILLA_PKIX_ERROR_OCSP_RESPONSE_FOR_CERT_MISSING when ocsp stapling turned on

  • 7 回覆
  • 1 有這個問題
  • 1 次檢視
  • 最近回覆由 macrek

more options

Hi all, When I turn OCSP stapling on because of certificate transparency, I'm getting this error message in Firefox (v66.0.5):

An error occurred during a connection to XXX. The OCSP response does not include a status for the certificate being verified. Error code: MOZILLA_PKIX_ERROR_OCSP_RESPONSE_FOR_CERT_MISSING

Other browsers works fine and also check for OCSP response with openssl looks good: OCSP Response Data:

   OCSP Response Status: successful (0x0)
   Response Type: Basic OCSP Response
   Version: 1 (0x0)
   Responder Id: C = SK, L = Bratislava, serialNumber = NTRSK-35975946, O = Disig a.s., OU = Responder 2_2, CN = OCSP SubCAR2I2 Disig
   Produced At: May 16 07:42:58 2019 GMT
   Responses:
   Certificate ID:
     Hash Algorithm: sha256
     Issuer Name Hash: 133D9F995AD99F50DCBF6C9700F87A8D120D8E292537C6313CE998A5307EDCF3
     Issuer Key Hash: 31B7347916C0FFBBBADE3AB3B3C27D716E66DCED86DAAC63422D58DAB3601900
     Serial Number: 0CDFBB3F168802CFD9000000000000032C
   Cert Status: good
   This Update: May 16 07:42:54 2019 GMT
   Next Update: May 16 15:42:54 2019 GMT


Any ideas, where should be an issue ? I can turn off ocsp stapling in about:config: security.ssl.enable_ocsp_stapling;false and page works fine then, but site has lot off customers, so this is not relevant solution for me.

Thank you for all your hints...

Hi all, When I turn OCSP stapling on because of certificate transparency, I'm getting this error message in Firefox (v66.0.5): An error occurred during a connection to XXX. The OCSP response does not include a status for the certificate being verified. Error code: MOZILLA_PKIX_ERROR_OCSP_RESPONSE_FOR_CERT_MISSING Other browsers works fine and also check for OCSP response with openssl looks good: OCSP Response Data: OCSP Response Status: successful (0x0) Response Type: Basic OCSP Response Version: 1 (0x0) Responder Id: C = SK, L = Bratislava, serialNumber = NTRSK-35975946, O = Disig a.s., OU = Responder 2_2, CN = OCSP SubCAR2I2 Disig Produced At: May 16 07:42:58 2019 GMT Responses: Certificate ID: Hash Algorithm: sha256 Issuer Name Hash: 133D9F995AD99F50DCBF6C9700F87A8D120D8E292537C6313CE998A5307EDCF3 Issuer Key Hash: 31B7347916C0FFBBBADE3AB3B3C27D716E66DCED86DAAC63422D58DAB3601900 Serial Number: 0CDFBB3F168802CFD9000000000000032C Cert Status: good This Update: May 16 07:42:54 2019 GMT Next Update: May 16 15:42:54 2019 GMT Any ideas, where should be an issue ? I can turn off ocsp stapling in about:config: security.ssl.enable_ocsp_stapling;false and page works fine then, but site has lot off customers, so this is not relevant solution for me. Thank you for all your hints...

由 macrek 於 修改

被選擇的解決方法

Cor-el, great!

Thank you, Problem was with as CertID Hash algorithm. Thankfully, I have an option to change this algorithm to SHA1 on my SSL offloader / loadbalancer (F5 Big-IP).

Thank you.

從原來的回覆中察看解決方案 👍 0

所有回覆 (7)

more options
more options
more options

Yes, Server is configured with ocsp stapling. As you can see in output from openssl, it works. Without OCSP stapling would not work other browsers (i.e. Chrome) because of Certificate Transparency.

more options

Page url: https://rpi.gov.sk

more options

I had no problem with the link.

more options

Looks like this bug (problem with SHA256)

  • Bug 1489411 - Stapled OCSP response with SHA256 used in CertID causes MOZILLA_PKIX_ERROR_OCSP_RESPONSE_FOR_CERT_MISSING
more options

選擇的解決方法

Cor-el, great!

Thank you, Problem was with as CertID Hash algorithm. Thankfully, I have an option to change this algorithm to SHA1 on my SSL offloader / loadbalancer (F5 Big-IP).

Thank you.