OCSP: ocsp.omniroot.com/baltimore/... - what is it exactly?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This might not be very relevant to OpenSSL, but I'm not sure if there is 
any better list for this question...

My webserver is getting flooded with queries like:

ocsp.omniroot.com 124.205.254.7 - - [30/Apr/2015:19:24:30 +0200] "GET 
/baltimoreroot/MEowSKADAgEAMEEwPzA9MAkGBSsOAwIaBQAEFMEvRXbtFVnssF26ib%2BdgHjlI9QTBBTlnVkwgkdYzKz6CFQ2hns6tQRN8AIEByekag%3D%3D 
HTTP/1.1" 301 184 "-" "ocspd/1.0.3"

ocsp.omniroot.com 222.161.249.75 - - [30/Apr/2015:19:24:33 +0200] "GET 
/baltimoreroot/MEUwQzBBMD8wPTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACBAcnqkc%3D 
HTTP/1.1" 301 184 "-" "Microsoft-CryptoAPI/6.1"


If I understand it right, because the query was sent to my server 
(China's Great Firewall DNS poisoning at works), and not to "original" 
ocsp.omniroot.com, somebody's browser or device was not able to verify 
if the certificate is still valid or not - am I correct here?


Is it possible to say what "Common name / fqdn / certificate" is queried 
in such requests?



Tomasz Chmielewski



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux