ZOOKEEPER-4949: Clean up TLS CRL/OCSP configuration#2277
ZOOKEEPER-4949: Clean up TLS CRL/OCSP configuration#2277stoty wants to merge 3 commits intoapache:masterfrom
Conversation
stoty
commented
Jul 7, 2025
- Enable FIPS style server hostname verification if truststore is not specified
- Make sure tcnative specific enableOCSP method is not called for JRE SSL provider
- Add new config option to enable tcnative specific enableOCSP method
- Add new config option to separetely enable certificate revocation checking for custom truststores
- Add new config option to disable existing implicit certificate revocation checking logic for custom truststores
- Document dependencies of TLS truststore related options
- Enable FIPS style server hostname verification if truststore is not specified - Make sure tcnative specific enableOCSP method is not called for JRE SSL provider - Add new config option to enable tcnative specific enableOCSP method - Add new config option to separetely enable certificate revocation checking for custom truststores - Add new config option to disable existing implicit certificate revocation checking logic for custom truststores - Document dependencies of TLS truststore related options
|
These are all the CRL/OCSP config related changes in a single PR, @anmolnar . |
|
The failures look like network / resource starvation issues. |
|
I'm sorry @stoty , but this is the 5th patch that you create on this topic and it's getting impossible for me to follow. I think it would be beneficial to discuss and address the issues separately. I don't really like "clean up" style patches, especially when there're significant changes in the logic. This is not cleaning up. So, I can identify the following issues:
Is the above accurate? |
Mostly. As for "this is strictly a client side improvement" : This is only really a problem on the client side.
Yes, that's ZOOKEEPER-4940. However, OpenSsl.is* is NOT helpful here. Please see the reopened #2270 for ZOOKEEPER-4940 for the standalone patch.
Check
|