Andy LoPresto created NIFI-1364:
-----------------------------------

             Summary: Audit OCSP certificate validation
                 Key: NIFI-1364
                 URL: https://issues.apache.org/jira/browse/NIFI-1364
             Project: Apache NiFi
          Issue Type: Task
          Components: Core Framework
    Affects Versions: 0.4.1
            Reporter: Andy LoPresto
            Assignee: Andy LoPresto
             Fix For: 0.6.0


While upgrading the version of BouncyCastle libraries used, I had to re-write 
the OCSP certificate validation code because BC split the PKIX code into a 
separate module and renamed many classes & methods. During this re-write, I 
made the code compile using the new logic, but I am unsure that OCSP validation 
needs to occur outside of the SSL/TLS negotiation, or that the current 
mechanism is correct. 

Questions:
* Can we use Java's built-in OCSP validation? [1][2]
* Is the current mechanism correct, where a local cache is used with custom 
internal classes representing OCSP requests and statuses, and it queries a 
pre-specified OCSP responder as opposed to the per-certificate OCSP responder 
listed in each certificate's Authority Information Access OCSP URI [3]? I think 
this design decision stems from a legacy environment which may not apply to 
current use cases. 

More information: [4]

[1] https://blogs.oracle.com/xuelei/entry/enable_ocsp_checking
[2] 
https://stackoverflow.com/questions/8506661/check-x509-certificate-revocation-status-in-spring-security-before-authenticatin
[3] 
https://blog.ivanristic.com/2014/02/checking-ocsp-revocation-using-openssl.html
[4] 
https://raymii.org/s/articles/OpenSSL_Manually_Verify_a_certificate_against_an_OCSP.html



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to