tls: add OCSP stapling support with configurable stapling policy (#12685)
Add OCSP stapling support with configurable stapling policy. A pre-fetched OCSP response can be configured with its corresponding certificate via the new ocsp_staple field in the TlsCertificate message. The new ocsp_staple_policy field on DownstreamTlsContext determines whether an OCSP response is required and whether to continue using the TLS certificate for new connections once its OCSP response expires. The ocsp_staple_policy defaults to LENIENT_STAPLING, which allows the operator to omit ocsp_staples from the configuration and will only use OCSP responses that are present and valid. This should therefore not break any existing configurations. Risk Level: Medium - touches some core functionality of certificate selection but does not alter any existing behavior Testing: added Docs Changes: Added OCSP Stapling subsection in the SSL section of the architecture overview. Release Notes: Added Runtime flags: envoy.reloadable_features.check_ocsp_policy envoy.reloadable_features.require_ocsp_response_for_must_staple_certs Signed-off-by: Daniel Goldstein <danielgold95@gmail.com> Signed-off-by: Stephan Zuercher <zuercher@gmail.com> Mirrored from https://github.com/envoyproxy/envoy @ cdd3a837056dc6935c0d8e0fb693d4de89b998e9master-ci-test
parent
32081a2b36
commit
8b11fdf718
6 changed files with 91 additions and 14 deletions
Loading…
Reference in new issue