Error querying OCSP responder

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Error querying OCSP responder

L0 Member

We have an issue with the R3 root certificate caused by the OCSP Certificate Revocation Checking within our decryption profile. We're seeing all sites using this certificate being blocked due to unknown issuer. When we run the "debug sslmgr view ocsp all" we can see the responder URL as unavailable with error querying OCSP responder. 

 

We've checked the OCSP and CRL traffic leaving our nodes and can see tcp-fins for all matching traffic.

 

We have a support case open for this but it's going nowhere, has anyone encountered a similar issue before / have any CLI commands to help our investigation? 

 

Many thanks,

Ellis

1 REPLY 1

Community Team Member

Hi @W1nterfl00d ,

 

Is there additional information in the sslmgr.log ?

If the S/N of a certificate is NOT listed in a CRL, which has IDP extension, the certificate status is marked as UNKNOWN.

 

Source: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CldJCAS

 

Hope this helps,

-Kiwi.

 
LIVEcommunity team member, CISSP
Cheers,
Kiwi
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.
  • 2965 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!