-
Notifications
You must be signed in to change notification settings - Fork 7.3k
ZOOKEEPER-4949: Clean up TLS CRL/OCSP configuration #2277
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
stoty
commented
Jul 7, 2025
- Enable FIPS style server hostname verification if truststore is not specified
- Make sure tcnative specific enableOCSP method is not called for JRE SSL provider
- Add new config option to enable tcnative specific enableOCSP method
- Add new config option to separetely enable certificate revocation checking for custom truststores
- Add new config option to disable existing implicit certificate revocation checking logic for custom truststores
- Document dependencies of TLS truststore related options
- Enable FIPS style server hostname verification if truststore is not specified - Make sure tcnative specific enableOCSP method is not called for JRE SSL provider - Add new config option to enable tcnative specific enableOCSP method - Add new config option to separetely enable certificate revocation checking for custom truststores - Add new config option to disable existing implicit certificate revocation checking logic for custom truststores - Document dependencies of TLS truststore related options
These are all the CRL/OCSP config related changes in a single PR, @anmolnar . |
The failures look like network / resource starvation issues. |
I'm sorry @stoty , but this is the 5th patch that you create on this topic and it's getting impossible for me to follow. I think it would be beneficial to discuss and address the issues separately. I don't really like "clean up" style patches, especially when there're significant changes in the logic. This is not cleaning up. So, I can identify the following issues:
Is the above accurate? |
Mostly. As for "this is strictly a client side improvement" : This is only really a problem on the client side.
Yes, that's ZOOKEEPER-4940. However, OpenSsl.is* is NOT helpful here. Please see the reopened #2270 for ZOOKEEPER-4940 for the standalone patch.
Check
|