Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
18 commits
Select commit Hold shift + click to select a range
9e042cd
AUT-2473 Add ResilientOcspCertificateRevocationChecker
aarmam Jan 30, 2026
a57ce1c
AUT-2473 Separate handling unknown status from revoked for resilient …
aarmam Jan 30, 2026
46dc128
AUT-2510 Disable thisUpdate in the past check for fallback OCSP service
madislm Jan 30, 2026
59f8c2c
AUT-2552 Collect failed requests, add resilient OCSP specific exceptions
madislm Jan 30, 2026
b98e45f
AUT-2511 Collect failed retry results
madislm Jan 30, 2026
d299d3d
AUT-2547 Add support for two fallbacks
madislm Jan 30, 2026
42dd199
AUT-2597 Update Resilience4j to version 2.3.0
madislm Feb 10, 2026
1aafc02
AUT-2597 Improve collecting failed requests
madislm Feb 11, 2026
1f07eb6
AUT-2597 Add tests for ResilientOcspCertificateRevocationChecker
madislm Feb 13, 2026
2c280b2
AUT-2597 Use issuer CNs to get fallback OCSP services
madislm Feb 16, 2026
3c3e117
AUT-2597 Move FallbackOcspService and FallbackOcspServiceConfiguratio…
madislm Feb 16, 2026
8400be7
AUT-2597 Reorganize code in ResilientOcspCertificateRevocationChecker
madislm Feb 16, 2026
f7c137d
AUT-2597 Add a note regarding recursive fallbacks
madislm Feb 17, 2026
e7e768c
AUT-2623 Fix broken tests
madislm Feb 19, 2026
3c27b2a
AUT-2623 Fix and improve tests
madislm Feb 19, 2026
6d023f2
AUT-2618 Separate issuer certificates from OCSP responder certificates
madislm Feb 25, 2026
5edbdd7
AUT-2562 Add data to RevocationInfo list returned by ResilientOcspCer…
madislm Mar 9, 2026
f528135
AUT-2677 Restructure responder certificate validation in FallbackOcsp…
madislm Mar 26, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
29 changes: 29 additions & 0 deletions pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@
<bouncycastle.version>1.81</bouncycastle.version>
<jackson.version>2.19.1</jackson.version>
<slf4j.version>2.0.17</slf4j.version>
<resilience4j.version>2.3.0</resilience4j.version>
<junit-jupiter.version>5.13.3</junit-jupiter.version>
<assertj.version>3.27.3</assertj.version>
<mockito.version>5.18.0</mockito.version>
Expand Down Expand Up @@ -65,6 +66,34 @@
<artifactId>bcpkix-jdk18on</artifactId>
<version>${bouncycastle.version}</version>
</dependency>
<dependency>
<groupId>io.github.resilience4j</groupId>
<artifactId>resilience4j-all</artifactId>
<version>${resilience4j.version}</version>
<exclusions>
<exclusion>
<groupId>io.github.resilience4j</groupId>
<artifactId>resilience4j-bulkhead</artifactId>
</exclusion>
<exclusion>
<groupId>io.github.resilience4j</groupId>
<artifactId>resilience4j-cache</artifactId>
</exclusion>
<exclusion>
<groupId>io.github.resilience4j</groupId>
<artifactId>resilience4j-ratelimiter</artifactId>
</exclusion>
<exclusion>
<groupId>io.github.resilience4j</groupId>
<artifactId>resilience4j-timelimiter</artifactId>
</exclusion>
</exclusions>
</dependency>
<dependency>
<groupId>io.github.resilience4j</groupId>
<artifactId>resilience4j-vavr</artifactId>
<version>${resilience4j.version}</version>
</dependency>

<dependency>
<groupId>org.junit.jupiter</groupId>
Expand Down
23 changes: 15 additions & 8 deletions src/main/java/eu/webeid/ocsp/OcspCertificateRevocationChecker.java
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@
import static eu.webeid.security.util.DateAndTime.requirePositiveDuration;
import static java.util.Objects.requireNonNull;

public final class OcspCertificateRevocationChecker implements CertificateRevocationChecker {
public class OcspCertificateRevocationChecker implements CertificateRevocationChecker {

public static final Duration DEFAULT_TIME_SKEW = Duration.ofMinutes(15);
public static final Duration DEFAULT_THIS_UPDATE_AGE = Duration.ofMinutes(2);
Expand Down Expand Up @@ -131,7 +131,7 @@ public List<RevocationInfo> validateCertificateNotRevoked(X509Certificate subjec
}
LOG.debug("OCSP response received successfully");

verifyOcspResponse(basicResponse, ocspService, certificateId);
verifyOcspResponse(basicResponse, ocspService, certificateId, false, false);
if (ocspService.doesSupportNonce()) {
checkNonce(request, basicResponse, ocspResponderUri);
}
Expand All @@ -144,7 +144,7 @@ public List<RevocationInfo> validateCertificateNotRevoked(X509Certificate subjec
}
}

private void verifyOcspResponse(BasicOCSPResp basicResponse, OcspService ocspService, CertificateID requestCertificateId) throws AuthTokenException, OCSPException, CertificateException, OperatorCreationException {
protected void verifyOcspResponse(BasicOCSPResp basicResponse, OcspService ocspService, CertificateID requestCertificateId, boolean rejectUnknownOcspResponseStatus, boolean allowThisUpdateInPast) throws AuthTokenException, OCSPException, CertificateException, OperatorCreationException {
// The verification algorithm follows RFC 2560, https://www.ietf.org/rfc/rfc2560.txt.
//
// 3.2. Signed Response Acceptance Requirements
Expand Down Expand Up @@ -195,14 +195,14 @@ private void verifyOcspResponse(BasicOCSPResp basicResponse, OcspService ocspSer
// be available about the status of the certificate (nextUpdate) is
// greater than the current time.

OcspResponseValidator.validateCertificateStatusUpdateTime(certStatusResponse, allowedOcspResponseTimeSkew, maxOcspResponseThisUpdateAge, ocspService.getAccessLocation());
OcspResponseValidator.validateCertificateStatusUpdateTime(certStatusResponse, allowedOcspResponseTimeSkew, maxOcspResponseThisUpdateAge, ocspService.getAccessLocation(), allowThisUpdateInPast);

// Now we can accept the signed response as valid and validate the certificate status.
OcspResponseValidator.validateSubjectCertificateStatus(certStatusResponse, ocspService.getAccessLocation());
OcspResponseValidator.validateSubjectCertificateStatus(certStatusResponse, ocspService.getAccessLocation(), rejectUnknownOcspResponseStatus);
LOG.debug("OCSP check result is GOOD");
}

private static void checkNonce(OCSPReq request, BasicOCSPResp response, URI ocspResponderUri) throws UserCertificateOCSPCheckFailedException {
protected static void checkNonce(OCSPReq request, BasicOCSPResp response, URI ocspResponderUri) throws UserCertificateOCSPCheckFailedException {
final Extension requestNonce = request.getExtension(OCSPObjectIdentifiers.id_pkix_ocsp_nonce);
final Extension responseNonce = response.getExtension(OCSPObjectIdentifiers.id_pkix_ocsp_nonce);
if (requestNonce == null || responseNonce == null) {
Expand All @@ -215,14 +215,14 @@ private static void checkNonce(OCSPReq request, BasicOCSPResp response, URI ocsp
}
}

private static CertificateID getCertificateId(X509Certificate subjectCertificate, X509Certificate issuerCertificate) throws CertificateEncodingException, IOException, OCSPException {
protected static CertificateID getCertificateId(X509Certificate subjectCertificate, X509Certificate issuerCertificate) throws CertificateEncodingException, IOException, OCSPException {
final BigInteger serial = subjectCertificate.getSerialNumber();
final DigestCalculator digestCalculator = DigestCalculatorImpl.sha1();
return new CertificateID(digestCalculator,
new X509CertificateHolder(issuerCertificate.getEncoded()), serial);
}

private static String ocspStatusToString(int status) {
protected static String ocspStatusToString(int status) {
return switch (status) {
case OCSPResp.MALFORMED_REQUEST -> "malformed request";
case OCSPResp.INTERNAL_ERROR -> "internal error";
Expand All @@ -233,4 +233,11 @@ private static String ocspStatusToString(int status) {
};
}

protected OcspClient getOcspClient() {
return ocspClient;
}

protected OcspServiceProvider getOcspServiceProvider() {
return ocspServiceProvider;
}
}
4 changes: 2 additions & 2 deletions src/main/java/eu/webeid/ocsp/client/OcspClient.java
Original file line number Diff line number Diff line change
Expand Up @@ -22,14 +22,14 @@

package eu.webeid.ocsp.client;

import eu.webeid.ocsp.exceptions.OCSPClientException;
import org.bouncycastle.cert.ocsp.OCSPReq;
import org.bouncycastle.cert.ocsp.OCSPResp;

import java.io.IOException;
import java.net.URI;

public interface OcspClient {

OCSPResp request(URI url, OCSPReq request) throws IOException;
OCSPResp request(URI url, OCSPReq request) throws OCSPClientException;

}
30 changes: 23 additions & 7 deletions src/main/java/eu/webeid/ocsp/client/OcspClientImpl.java
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,7 @@

package eu.webeid.ocsp.client;

import eu.webeid.ocsp.exceptions.OCSPClientException;
import org.bouncycastle.cert.ocsp.OCSPReq;
import org.bouncycastle.cert.ocsp.OCSPResp;
import org.slf4j.Logger;
Expand Down Expand Up @@ -62,15 +63,21 @@ public static OcspClient build(Duration ocspRequestTimeout) {
* @param uri OCSP server URL
* @param ocspReq OCSP request
* @return OCSP response from the server
* @throws IOException if the request could not be executed due to cancellation, a connectivity problem or timeout,
* @throws OCSPClientException if the request could not be executed due to cancellation, a connectivity problem or timeout,
* or if the response status is not successful, or if response has wrong content type.
*/
@Override
public OCSPResp request(URI uri, OCSPReq ocspReq) throws IOException {
public OCSPResp request(URI uri, OCSPReq ocspReq) throws OCSPClientException {
byte[] encodedOcspReq;
try {
encodedOcspReq = ocspReq.getEncoded();
} catch (IOException e) {
throw new OCSPClientException(e);
}
final HttpRequest request = HttpRequest.newBuilder()
.uri(uri)
.header(CONTENT_TYPE, OCSP_REQUEST_TYPE)
.POST(HttpRequest.BodyPublishers.ofByteArray(ocspReq.getEncoded()))
.POST(HttpRequest.BodyPublishers.ofByteArray(encodedOcspReq))
.timeout(ocspRequestTimeout)
.build();

Expand All @@ -79,19 +86,28 @@ public OCSPResp request(URI uri, OCSPReq ocspReq) throws IOException {
response = httpClient.send(request, HttpResponse.BodyHandlers.ofByteArray());
} catch (InterruptedException e) {
Thread.currentThread().interrupt();
throw new IOException("Interrupted while sending OCSP request", e);
throw new OCSPClientException("Interrupted while sending OCSP request", e);
} catch (IOException e) {
throw new OCSPClientException(e);
}

if (response.statusCode() != 200) {
throw new IOException("OCSP request was not successful, response: " + response);
throw new OCSPClientException("OCSP request was not successful", response.body(), response.statusCode());
} else {
LOG.debug("OCSP response: {}", response);
}
final String contentType = response.headers().firstValue(CONTENT_TYPE).orElse("");
if (!contentType.startsWith(OCSP_RESPONSE_TYPE)) {
throw new IOException("OCSP response content type is not " + OCSP_RESPONSE_TYPE);
throw new OCSPClientException("OCSP response content type is not " + OCSP_RESPONSE_TYPE);
}

OCSPResp ocspResp;
try {
ocspResp = new OCSPResp(response.body());
} catch (IOException e) {
throw new OCSPClientException(e);
}
return new OCSPResp(response.body());
return ocspResp;
}

public OcspClientImpl(HttpClient httpClient, Duration ocspRequestTimeout) {
Expand Down
59 changes: 59 additions & 0 deletions src/main/java/eu/webeid/ocsp/exceptions/OCSPClientException.java
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
/*
* Copyright (c) 2020-2025 Estonian Information System Authority
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in all
* copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/

package eu.webeid.ocsp.exceptions;

public class OCSPClientException extends RuntimeException {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

OCSPClientException looks more like a checked exception than a RuntimeException. Failures are part of the OcspClient contract and callers are supposed to handle them rather than let them escape accidentally.

Suggested change
public class OCSPClientException extends RuntimeException {
public class OCSPClientException extends Exception {


private byte[] responseBody;
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The fields should be final/immutable.


private Integer statusCode;

public OCSPClientException() {
}

public OCSPClientException(String message) {
super(message);
}

public OCSPClientException(Throwable cause) {
super(cause);
}

public OCSPClientException(String message, Throwable cause) {
super(message, cause);
}

public OCSPClientException(String message, byte[] responseBody, int statusCode) {
super(message);
this.responseBody = responseBody;
this.statusCode = statusCode;
}

public byte[] getResponseBody() {
return responseBody;
}

public Integer getStatusCode() {
return statusCode;
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,10 @@
*/
public class UserCertificateOCSPCheckFailedException extends AuthTokenException {

public UserCertificateOCSPCheckFailedException() {
super("User certificate revocation check has failed");
}

public UserCertificateOCSPCheckFailedException(Throwable cause, URI ocspResponderUri) {
super(appendResponderUri("User certificate revocation check has failed", ocspResponderUri), cause);
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,10 @@
*/
public class UserCertificateRevokedException extends AuthTokenException {

public UserCertificateRevokedException() {
super("User certificate has been revoked");
}

public UserCertificateRevokedException(URI ocspResponderUri) {
super(appendResponderUri("User certificate has been revoked", ocspResponderUri));
}
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
/*
* Copyright (c) 2020-2025 Estonian Information System Authority
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in all
* copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/

package eu.webeid.ocsp.exceptions;

import eu.webeid.security.exceptions.AuthTokenException;

import java.net.URI;

import static eu.webeid.ocsp.exceptions.OcspResponderUriMessageAppender.appendResponderUri;

public class UserCertificateUnknownException extends AuthTokenException {

public UserCertificateUnknownException(String msg, URI ocspResponderUri) {
super(appendResponderUri("User certificate status is unknown: " + msg, ocspResponderUri));
}
}
52 changes: 52 additions & 0 deletions src/main/java/eu/webeid/ocsp/protocol/IssuerCommonName.java
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
/*
* Copyright (c) 2020-2025 Estonian Information System Authority
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in all
* copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/

package eu.webeid.ocsp.protocol;

import org.bouncycastle.asn1.x500.RDN;
import org.bouncycastle.asn1.x500.X500Name;
import org.bouncycastle.asn1.x500.style.BCStyle;
import org.bouncycastle.asn1.x500.style.IETFUtils;
import org.bouncycastle.cert.jcajce.JcaX509CertificateHolder;

import java.security.cert.CertificateEncodingException;
import java.security.cert.X509Certificate;
import java.util.Objects;
import java.util.Optional;

public class IssuerCommonName {

public static Optional<String> getIssuerCommonName(X509Certificate certificate) {
Copy link
Member

@mrts mrts Mar 20, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Using only Common Name seems error-prone, using the full normalized Distinguished Name seems much safer.

For example, in the following (hypothetical) case there would be CN collision, but DN would work:

CN=ESTEID2025, O=AS Sertifitseerimiskeskus, C=EE
CN=ESTEID2025, O=Zetes Estonia OÜ, C=EE

This applies to all locations where CN is used for lookup like OcspServiceProvider, AiaOcspService, FallbackOcspServiceConfiguration and AiaOcspServiceConfiguration.

Objects.requireNonNull(certificate, "certificate");
try {
X500Name x500Name = new JcaX509CertificateHolder(certificate).getIssuer();
final RDN cn = x500Name.getRDNs(BCStyle.CN)[0];
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This will throw ArrayIndexOutOfBoundsException on certificates without CN.

return Optional.of(IETFUtils.valueToString(cn.getFirst().getValue()));
} catch (CertificateEncodingException e) {
return Optional.empty();
}
}

private IssuerCommonName() {
throw new IllegalStateException("Utility class");
}
}
Loading