Middleware is used to perform the steps that you mention. For example, the fetch-crl utility written by David Groep and available at

http://www.eugridpma.org/distribution/util/fetch-crl

will take as input the crl_url files, which themselves can be produced by various means including extracting them from the *.info files that are included also in the IGTF distributions, but are part of those distributions anyway, and produce the .r0 files by downloading them from the indicated URL's. The Grid Certificate Profile says that the crlDistributionPoint *should* be included in the CA certificate and so could in principle be extracted from there, so the availability of these .info and .crl_url files is basically "good practice" and a convenience. They are included for all CAs in the IGTF distributions.

Note that some CAs based on certain authentication profiles do *not* require CRLs (for example, those based on the Short-Lived Credential Service profile, SLCS), and so the .info file for these will not contain a crl_url, and a *.crl_url file will not be present in these cases, so no download is needed. Again, this depends in detail on the authentication profile being used.

Since you say this is for Teragrid - it is worth noting that an attempt to get all TG CA's either accredited or moved to an alternate profile that would allow them to become accredited according to other criteria is in progress. If accredited against any IGTF profile, subject to the above caveat, the .crl_url files will be present.

Hope this helps,
Alan

On Aug 13, 2007, at 8:47 PM, Keith Thompson wrote:

On Mon 07-08-13 20:19, Alan Sill wrote:
Too-short answer: See RFC 3280.

Probably long-enough answer: It is built into OpenSSL, and thus
inherited into Globus, but the details for fetching and enforcing the
CRLs depend on your grid middleware.

Maybe too long an answer, since you are probably not asking about
trust fabric issues:

The effect of the CRLs is to provide a revocation list against which
subject DNs can be checked.  If you use these, you should be sure to
keep the CRLs up to date.  Many grid middleware distributions, such
as the VDT, GLite, CaGrid, etc., used by large-scale grid projects
include tools to fetch the CRLs for the CAs trusted in the context of
their organizations.
[snip]
Hope this helps.

I've taken a very brief look at RFC 3280, and I don't *think* it
answers the question I was asking.

I think the question I asked was narrower than the one you answered.

Suppose I want to recognize a CA with hash 12345678. So, I install the
certificate (12345678.0) and signing policy (12345678.signing_policy)
files in /etc/grid-security/certificates, but I also want to reject
any attempt to use a certificate that's been revoked.

The usual way to do this is to install the CRL, 12345678.r0, in
/etc/grid-security/certificates; this requires some process to update
it periodically, ideally whenever the CA updates it.

If I install just 12345678.crl_url *instead of* 12345678.r0, does
Globus pay any attention to the 12345678.crl_url file, or is it just
as if I had installed only 12345678.0 and 12345678.signing_policy?

I'm fairly sure that Globus will just ignore the 12345678.crl_url file,
but I want to be certain on this point.

A separate question: Do some third-party tools outside of Globus
use *.crl_url files?  If so, which ones?  You mentioned VDT, GLite,
and CaGrid; do they use *.crl_url files or some other method.

(My own gx-map package includes a tool called gx-ca-update which
automatically downloads, verifies, and updates CRLs, but it's driven
by a description file for each CA, not by *.crl_url files.  It's used
on TeraGrid.)

--
Keith Thompson <[EMAIL PROTECTED]>  San Diego Supercomputer Center
<http://users.sdsc.edu/~kst/>  858-822-0853
"We must do something. This is something. Therefore, we must do this."
    -- Antony Jay and Jonathan Lynn, "Yes Minister"

Alan Sill, Ph.D
TIGRE Senior Scientist, High Performance Computing Center
Adjunct Professor of Physics
TTU

====================================================================
:  Alan Sill, Texas Tech University  Office: Admin 233, MS 4-1167  :
:  e-mail: [EMAIL PROTECTED]   ph. 806-742-4350  fax 806-742-4358  :
====================================================================


Reply via email to