-
Type: Improvement
-
Resolution: Unresolved
-
Priority: Unknown
-
None
-
Component/s: Client Side Encryption
-
None
-
Needed
-
-
(copied to CRM)
Summary
Permit tlsDisableOCSPEndpointCheck in KMS TLS options
Motivation
The Client-Side Encryption specification currently suggests drivers to raise an error if insecure TLS options are set.
The rationale is to avoid enabling insecure settings when using CSFLE.
Who is the affected end user?
Users of CSFLE experiencing timeouts due to slow OCSP checks.
How does this affect the end user?
Users may get errors during CSFLE operations requiring KMS.
How likely is it that this problem or use case will occur?
Not sure. There is only one known user report of this issue.
If the problem does occur, what are the consequences and how severe are they?
Unable to complete CSFLE operations.
Is this issue urgent?
Not sure.
Is this ticket required by a downstream team?
No.
Is this ticket only for tests?
No.
- split to
-
PYTHON-3533 Permit tlsDisableOCSPEndpointCheck in KMS TLS options
- Closed
-
CXX-2615 Permit tlsDisableOCSPEndpointCheck in KMS TLS options
- Backlog
-
GODRIVER-2664 Permit tlsDisableOCSPEndpointCheck in KMS TLS options
- Backlog
-
CDRIVER-4528 Permit tlsDisableOCSPEndpointCheck in KMS TLS options
- Closed
-
CSHARP-4433 Permit tlsDisableOCSPEndpointCheck in KMS TLS options
- Closed
-
JAVA-4818 Permit tlsDisableOCSPEndpointCheck in KMS TLS options
- Closed
-
MOTOR-1069 Permit tlsDisableOCSPEndpointCheck in KMS TLS options
- Closed
-
NODE-4840 Permit tlsDisableOCSPEndpointCheck in KMS TLS options
- Closed
-
PHPC-2188 Permit tlsDisableOCSPEndpointCheck in KMS TLS options
- Closed
-
RUBY-3187 Permit tlsDisableOCSPEndpointCheck in KMS TLS options
- Closed
-
RUST-1549 Permit tlsDisableOCSPEndpointCheck in KMS TLS options
- Closed