Re: On turning CRL and OCSP checking on by default.

2004-03-22 Thread Duane
Nelson Bolyard wrote: I think mozilla will turn OCSP back on by default in some forthcoming release. Maybe soon, who knows? There has been discussions else where on this issue, basically at present it would be very difficult to stop any maliciously signed code from propagating unless things

Re: On turning CRL and OCSP checking on by default.

2004-02-19 Thread Jean-Marc Desperrier
Julien Pierre wrote: You can however implement what you want without NSS changes, by wrapping the NSS certificate verification function. By effectively reimplementing a certificate chain build algorithm. Your algorithm is simple, because it handles only simple cases, but full implementation of

Re: On turning CRL and OCSP checking on by default.

2004-02-19 Thread Julien Pierre
Jean-Marc, Jean-Marc Desperrier wrote: Julien Pierre wrote: You can however implement what you want without NSS changes, by wrapping the NSS certificate verification function. By effectively reimplementing a certificate chain build algorithm. Extending it is more like it, since you reuse

Re: On turning CRL and OCSP checking on by default.

2004-02-18 Thread Julien Pierre
Jean-Marc, Jean-Marc Desperrier wrote: Julien Pierre wrote: First, let me point out that the RFC only recommends an algorithm to verify certificates and signatures on the current date, but not at dates in the past. I don't want to strech the whole discussion any longer, but if you are

Re: On turning CRL and OCSP checking on by default.

2004-02-17 Thread Jean-Marc Desperrier
Julien Pierre wrote: First, let me point out that the RFC only recommends an algorithm to verify certificates and signatures on the current date, but not at dates in the past. I don't want to strech the whole discussion any longer, but if you are actually interested in that sort of things, then

Re: On turning CRL and OCSP checking on by default.

2004-02-16 Thread Jean-Marc Desperrier
John Gardiner Myers wrote: For reasons you mention, even checking against the latest currently available CRL is at most best effort. I fully concur this is only best effort. This is BTW exactly what I wrote in my message. But it's the level of best effort that *can* be achieved. I don't get why

Re: On turning CRL and OCSP checking on by default.

2004-02-16 Thread Julien Pierre
Jean-Marc Desperrier wrote: Currently the defined maximum for NSS is *infinite*. If there's any crl available for checking, however old, the check will *never* return crl outdated. This is not configurable. This in my opinion makes the CRL checking in NSS ineffective. When the NSS chech says

Re: On turning CRL and OCSP checking on by default.

2004-02-14 Thread John Gardiner Myers
Julien Pierre wrote: Second, a certificate may be retroactively revoked, such as in the case where a private key was compromised, but the fact wasn't noticed until a week later. There are also potential delays between the time it is noticed and the time it is reported to the CA, and between

Re: On turning CRL and OCSP checking on by default.

2004-02-13 Thread Jean-Marc Desperrier
Nelson B wrote: Jean-Marc, There's a verb missing from this next sentence you wrote, and understanding that sentence depends entirely on the missing verb. Please fill in the missing verb, here | v As a general rule, it's a bad idea to something that was

Re: On turning CRL and OCSP checking on by default.

2004-02-13 Thread Julien Pierre
Jean-Marc, Jean-Marc Desperrier wrote: So if you do CRL checking at all, there are good reasons to report this check as failed if you only have access to a CRL whose nextUpdate is in the past. Except of course if you have an date argument in the check that says Check validity for *this* date

Re: On turning CRL and OCSP checking on by default.

2004-02-12 Thread Nelson Bolyard
Deacon, Alex wrote: VeriSign has spent a lot of time and effort recently ensuring that not only do our OCSP services work, but that they will continue to work as the load increases. Clearly there is no excuse for any CA, especially VeriSign, to have a faulty OCSP implementation...especially if

RE: On turning CRL and OCSP checking on by default.

2004-02-12 Thread Deacon, Alex
If an OCSP response has both a thisUpdate and a nextUpdate value then yes, it is a good idea. Alex -Original Message- From: Rahul Aggarwal [mailto:[EMAIL PROTECTED] Sent: Wednesday, February 11, 2004 10:00 PM To: [EMAIL PROTECTED] Subject: RE: On turning CRL and OCSP checking

Re: On turning CRL and OCSP checking on by default.

2004-02-12 Thread Jean-Marc Desperrier
Deacon, Alex wrote: If an OCSP response has both a thisUpdate and a nextUpdate value then yes, it is a good idea. The new, enhanced, internally based on CRL, Verisign OCSP responder uses that ? The old one had no nextUpdate, and a thisUpdate generated for each request, so locally caching it

RE: On turning CRL and OCSP checking on by default.

2004-02-12 Thread Deacon, Alex
Hi, -Original Message- From: Jean-Marc Desperrier [mailto:[EMAIL PROTECTED] Sent: Thursday, February 12, 2004 9:16 AM To: [EMAIL PROTECTED] Subject: Re: On turning CRL and OCSP checking on by default. Deacon, Alex wrote: If an OCSP response has both a thisUpdate and a

Re: On turning CRL and OCSP checking on by default.

2004-02-12 Thread Nelson B
Jean-Marc Desperrier wrote: Julien Pierre wrote: Technically, the revocation information from CRLs does not expire. nextUpdate only means the CA should have more recent information available, not that the CRL is expired. So I don't see it as wrong to still do the OCSP check. There is no

Re: On turning CRL and OCSP checking on by default.

2004-02-11 Thread Jean-Marc Desperrier
Julien Pierre wrote: [...] A lot of OCSP servers have been incorrectly (and that includes Verisign's). [...] A significatn problem with Verisign is that some time ago, they were including the OCSP extension for some people who had not paid for OCSP, so the responder would refuse to tell the

RE: On turning CRL and OCSP checking on by default.

2004-02-11 Thread Deacon, Alex
As I mentioned in a pervious email...this has been fixed. Alex -Original Message- From: Jean-Marc Desperrier [mailto:[EMAIL PROTECTED] Sent: Wednesday, February 11, 2004 10:24 AM To: [EMAIL PROTECTED] Subject: Re: On turning CRL and OCSP checking on by default. Julien Pierre

RE: On turning CRL and OCSP checking on by default.

2004-02-10 Thread Deacon, Alex
Hi Julien, -Original Message- From: Julien Pierre [mailto:[EMAIL PROTECTED] Sent: Monday, February 09, 2004 6:02 PM To: [EMAIL PROTECTED] Subject: Re: On turning CRL and OCSP checking on by default. Alex, Deacon, Alex wrote: 1) Although the option to perform cert

RE: On turning CRL and OCSP checking on by default.

2004-02-10 Thread Deacon, Alex
Hi Duane, Agreed. If a CA indicates via an AIA that OCSP services are available then it better ensure things are working correctly. Alex -Original Message- From: Duane [mailto:[EMAIL PROTECTED] Sent: Monday, February 09, 2004 7:41 PM To: [EMAIL PROTECTED] Subject: Re: On

Re: On turning CRL and OCSP checking on by default.

2004-02-10 Thread Julien Pierre
Hi, Deacon, Alex wrote: VeriSign has spent a lot of time and effort recently ensuring that not only do our OCSP services work, but that they will continue to work as the load increases. Clearly there is no excuse for any CA, especially VeriSign, to have a faulty OCSP implementation...especially

Re: On turning CRL and OCSP checking on by default.

2004-02-10 Thread John Gardiner Myers
Turning on OCSP by default is bug 110161. The lack of an OCSP cache is one issue. A harder issue is that NSPR's nonblocking model is not capable of passing the information needed to do nonblocking OCSP queries during an SSL handshake. When I last tried turning OCSP on, Verisign had screwed up

Re: On turning CRL and OCSP checking on by default.

2004-02-09 Thread Duane
OCSP is turned off by default in mozilla, because frankly, a lot of home-grown CAs put out certs that claimed they did OCSP, when they didn't. So, mozilla would get one of their certs (e.g. from an https server), try to contact the OCSP server (and fail), and then claim the cert is revoked (the

Re: On turning CRL and OCSP checking on by default.

2004-02-09 Thread Nelson Bolyard
Duane wrote: OCSP is turned off by default in mozilla, because frankly, a lot of home-grown CAs put out certs that claimed they did OCSP, when they didn't. So, mozilla would get one of their certs (e.g. from an https server), try to contact the OCSP server (and fail), and then claim the cert is

RE: On turning CRL and OCSP checking on by default.

2004-02-09 Thread Deacon, Alex
Hi Nelson, Here are my thoughts on how this should work. 1) Although the option to perform cert validation (either via OCSP or CRL) should be a user configurable option, I believe that the application should ship with this option turned ON by default. 2) The decision as to what mechanism the

Re: On turning CRL and OCSP checking on by default.

2004-02-09 Thread Julien Pierre
Alex, Deacon, Alex wrote: 1) Although the option to perform cert validation (either via OCSP or CRL) should be a user configurable option, I believe that the application should ship with this option turned ON by default. It would be nice, but I wonder how many users would complain about all

Re: On turning CRL and OCSP checking on by default.

2004-02-09 Thread Duane
It would be nice, but I wonder how many users would complain about all the sites not working ... A lot of OCSP servers have been incorrectly (and that includes Verisign's). I think the option should be off by default for clients, certainly for CRLs, which get very large and are not suitable