Hi,

here is an idea how to support PIN-based revocation.

We could identify the request (from which a certificate was generated)
via the public key but of cause there are some problems:

1. the public keys of the certificates are not searchable
2. the public keys of the requests are not searchable
3. the public keys must not be unique

The changes would affect:
* OpenCA::REQ (find the public key of the request)
* OpenCA::DB and OpenCA::DBI (two new searchable attributes)
* issueCertificate (must check the public key)
* spkac_confirm, ie_confirm, pkcs10_confirm (must check the public key)
* appReq and confirmReq (must check the public key)

So I think it is relatively easy to fix the three problems. What do you
think? The code for the PIN-based revocation itself is very easy because
we have only to compare some message digests and modify the code for the
RAServer to handle signed CRRs and not signed CRRs (PIN-based).

Michael
-- 
-------------------------------------------------------------------------
Michael Bell                   Email: [EMAIL PROTECTED]
Rechenzentrum - Datacenter     Email (work):
[EMAIL PROTECTED]
Humboldt-University of Berlin  Tel.(work): +49 (0)30-2093 2482
Unter den Linden 6             Fax.(work): +49 (0)30-2093 2959
10099 Berlin
Germany                                           [OpenCA Core
Developer]

http://openca.sourceforge.net

_______________________________________________
OpenCA-Devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/openca-devel

Reply via email to