With regards to the issues raised by Jesus F., LuxTrust proposes the following answers : Regarding issue #1: OCSP do not respond using GET method (BR section 13.2.2) : The feature is operational since 11th march 2015. We successfully made OCSP requests using the GET method.

Regarding issue #2 : OCSP responds "good" to a non-issued certificate (serials FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF and 00) (BR Section 13.2.6) : LuxTrust’s OCSP application currently does not support this feature (technical limitation). LuxTrust is currently analyzing the possibility of an alternative solution / technical improvements. Pending a technical alternative, LuxTrust would like to underline that the risks raised by the “good” response to a non-issue certificate are mitigated by compensatory controls: even if LuxTrust’s OCSP responder provides an inadequate “good” response, the certificate will not pass the step of validation of the CA information (trust anchor) because the certificate is not signed by LuxTrust’s CA (provided that the certificate validation check is compliant with RFC 5280, section 6.1 Basic path validation).
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to