Hi Alex,

actually I would suggest to NOT USE HTTPS for publishing CRLs. First of all,
CRLs are signed, the authentication is in the data itself. Second of all, you
may incur in a "I can't verify the SSL certificate presented by the server
because I need the CRL in order to proceed".

This may not be an issue for a custom application like the OCSP server, but
I guarantee that you'll have issues with other applications like browsers!
DoD PKI Implementation guidelines are not really the best to follow if you
want to provide good interoperability in an open environment (IMHO)...

Later,
Max


Alex Agranov wrote:
Hi Eddy,

Sorry for being not clear enough in my original mail.

My fix adds support for CRL retrieval over HTTPS (and HTTP with authentication). Such requirement is pretty common and, for example, is listed in DoD PKI implementation guidelines.



--

Best Regards,

        Massimiliano Pala

--o------------------------------------------------------------------------
Massimiliano Pala [OpenCA Project Manager]            [EMAIL PROTECTED]
                                                 [EMAIL PROTECTED]

Dartmouth Computer Science Dept               Home Phone: +1 (603) 397-3883
PKI/Trust - Office 063                        Work Phone: +1 (603) 646-9179
--o------------------------------------------------------------------------

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

-------------------------------------------------------------------------
SF.Net email is sponsored by: The Future of Linux Business White Paper
from Novell.  From the desktop to the data center, Linux is going
mainstream.  Let it simplify your IT future.
http://altfarm.mediaplex.com/ad/ck/8857-50307-18918-4
_______________________________________________
OpenCA-Devel mailing list
OpenCA-Devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openca-devel

Reply via email to