On 05.02.2014 08:25, Brian Smith wrote: > It would be possible for a server to fetch and staple the OCSP > response only using the information from the server's end-entity > certificate.
Actually no - you can't properly fill in the CertID for the request otherwise. From RFC 6960: > Request ::= SEQUENCE { > reqCert CertID, > singleRequestExtensions [0] EXPLICIT Extensions OPTIONAL } > > CertID ::= SEQUENCE { > hashAlgorithm AlgorithmIdentifier, > issuerNameHash OCTET STRING, -- Hash of issuer's DN > issuerKeyHash OCTET STRING, -- Hash of issuer's public key > serialNumber CertificateSerialNumber } > and > o issuerKeyHash is the hash of the issuer's public key. The hash > shall be calculated over the value (excluding tag and length) of > the subject public key field in the issuer's certificate. (relying on the end-entity's AKID extension isn't reliable enough - even if it is present, it doesn't necessarily have to be a hash over the issuer's public key, that's only a recommendation in RFC 5280 section 4.2.1.2) Kaspar