Hey Andy,
I appreciate your response.
I already had a case open but their response was "I think it is mandatory since it is a part of the steps described in the SK. It does not say whether it is mandatory or optional, so it's best to assume that it is mandatory.". (That was from an escalation engineer)
So it seems they don't know either... But if you have experience with leaving it empty, it might be possible.
Yesterday in a maintenance window, I tried to configure OCSP again and followed the SK step by step except leaving the certificate empty.
In the customers environment, only the Intermediate CA supports OCSP but the SK explicitly mentions the Root CA so I tried the following in GuiDBedit:
1. Assign OCSP server object to Root CA like mentioned in the SK
- In iked.elg debugs I can see some OCSP related debugs but the verification ends with "fwCert_ValRevoke_cb: OCSP responder returned an 'unauthorized' status"
- The certificate I was using is definitely not revoked(checked that with PKI team)
- POST requests to /OCSP can be seen in the web server logs
- My guess would be that it tries to check my certificate which is issued by the Intermediate CA, against the Root CA
2. Assign OCSP server object to Intermediate CA
- Comparing the flow, I don't see any related OCSP debugs
- POST requests to /OCSP are not present
Is it possible that OCSP on Intermediate CAs is not supported?
Thank you and best regards
Constantin