This page describes how to enable certificate revocation checking on MCP nodes.

Enabling certificate revocation checking

The MCP VMs support checking for SSL certificate revocation using Certificate Revocation Lists (CRLs) or the Online Certificate Status Protocol (OCSP).

This is configured in custom-config-data.yaml by setting the enable-ocsp and enable-crl parameters to the desired values. If both are configured, OCSP will take priority.

This parameter is reconfigurable.

Warning Changing this value will cause a restart of the Rhino processes on the VMs, which will result in a short loss of service. It is recommended that this configuration change is only carried out during a maintenance window. Redirecting traffic to another site during this change is recommended.

Firewall rules for certificate revocation checking

If certificate revocation checking is enabled, MCP may require access to external servers to check the revocation status of the certificates used by the Microsoft Teams Phone System Consultation API and the Azure Active Directory (AAD) Token API.

When the enable-crl option is set to True, MCP needs to be able to connect to the CRL servers specified in the certificates presented by these API endpoints.

If the enable-ocsp option is set to True, MCP will initially request server-side OCSP stapling, which does not require any additional network access. However, if server-side OCSP stapling is unsuccessful, MCP will fall back to client-side OCSP, which requires that MCP is able to contact the OCSP server directly.

The CRL and OCSP servers for the Microsoft Teams Phone System consultation API and AAD token API endpoints are as follows:

Service Service Address CRL URL(s) OCSP URL

AAD Token API

https://login.microsoftonline.com/

http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl

http://ocsp.digicert.com

Consultation API

https://api.pstnhub.microsoft.com/

http://www.microsoft.com/pkiops/crl/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2003.crl

http://oneocsp.microsoft.com/ocsp

Note that these are provided here as fully qualified domain names (FQDNs) as the IP address(es) that these FQDNs resolve to may change over time.

A list of IP addresses used by Digicert can be found at https://knowledge.digicert.com/alerts/digicert-certificate-status-ip-address

Tools such as nslookup may be used to determine the current IP addresses for the Microsoft OCSP and CRL endpoints.

TCP port 80 is used to connect outbound to both the CRL and OCSP servers.

Previous page Next page
MCP VM Configuration Guide Version 1.5