I have noticed this behavior as well. Apache is quiet unless it actually finds 
revocation of the cert being verified.

Perhaps better would be code that checked that for every trusted CA (via 
SSLCACertificate*) there is a corresponding CRL and if not, post a warning (or 
error) in the log (according to your selected revocation check method). I don't 
see that you would need a new directive except for choosing revocation check 
method.

BTW, are coding it to support more than one method in a preferred order? 

Such as something like
SSLRevocationMethod OCSP CRL

meaning, try OCSP first and fall back to CRL (if OCSP timeout). As you can see, 
I am interested in your patch.

regards,
tt
317-510-5987
 

-----Original Message-----
From: Matthieu Estrade [mailto:[EMAIL PROTECTED]
Sent: Wednesday, December 15, 2004 8:45 AM
To: [EMAIL PROTECTED]
Subject: modssl - ocsp - crl


I'm close to finish the ocsp feature on mod_ssl, but when i look the 
entire client auth system, there is some little point not really clean.
For example, when somebody today setup a SSLVerifyClient require and put 
CA and CRL, with SSLCARevocationPath, if no CRL is correct inside the 
path, mod_ssl will not find the good one and will bypass CRL check. What 
i mean is on a misconfigured system, admin can't know if crl check is 
active or not.
Sometimes, the SSLCARevocationPath directive is used with a little 
daemon updating CRL.

Maybe it's a normal behaviour, but i think it could be more clean to 
choose the way to say the user is authenticated, via a directive:

SSLVerifyClient require
SSLCACertificatePath /usr/local/apache/conf/ssl.crt/
SSLCARevocationPath /usr/local/apache/conf/ssl.crl/
SSLVerifyClientMethod +CRL (or +OCSP) or -CRL.

In this case, the default could be CA + CRL and block if no valid crl is 
found
-CRL could disable the crl check etc...

Regards,

Matthieu

Reply via email to