@benjojo We spent a lot of time debating whether to do intermediate preloading in Firefox… but Chrome followed AIA, and we didn’t want to do third party resource loads for TLS.
I guess I missed the new behavior of Chrome, but it was always weird that it’d do AIA but not OCSP.
Good lightning talk.
@benjojo it gets worse, unfortunately. Firefox's first technique to deal with this was to cache intermediates from successful connections in case they'd ever be useful when a different server sent an incomplete chain. That leads to the same kind of inconsistent results you mentioned in Chrome.
gross as it is, though, all that matters to the user is that the site loads, so... 🤷♀️
If you have your certs directly signed by the CA, then you have no issue, you can serve the direct certificate and call it a day.
IF you have a intermediate then you also need to provide the intermediate in the "full chain" that you provide to TLS servers, otherwise you are praying that Chrome (FireFox's logic wont save you here) will fix it for you (Not even sure it will), There are some extra caveats for AIA, but that quickly gets into a huge can of worms
2.06K Meows, 2.64K Following, 2.03K Followers · Chief Emoji Officer on is-a.cat instance Too chaotic for a paladin. Probably a lich (https://is-a.cat/@madargon/112705760563792903). Amateur artist and junior IT administrator. Mostly self-trained in chaotic and often destructive ways. Opponent of mainstream social media and nasty digital surveillance, wanna-be cypherpunk. Linux user since 2013. Fully degoogled since December 2019. Fully BigTech-free since March 2024. Synesthete. That weird freak who sometimes uses Daedric alphabet. Even weirder freak who uses bare IP address instead of some server name. Cryptography is my only religion - does Church of Wael look for new members? In my free time I draw or write stories, first of all for my fun. I publish my works under CC BY-SA 4.0 license. Writing here in English/Polish. Migrated from @[email protected] Indexed in tootfinder (https://www.tootfinder.ch). #sysadmin #linux #degoogle #corpfree #privacy #cypherpunk #drawing #art #fedi22
@benjojo @madargon the root CA certificate must be in the browser (or /etc/ssl/certs etc.), the server certificate and any intermediates must be in the SSL server and returned to the client by it.
Order may also be important. In my Apache httpd setups, I always put things in the following order into the certificate file:
I think that if you have multiple intermediates, put them in signatory chain order (i.e. always the one signing certificate x below x).
