OpenCA OCSPD Project Overview:
==============================

    The OpenCA OCSPD project is aimed to develop a robust and easy-to-install
    OCSP daemon. The server is developed as a stand-alone application and can
    be integrated into many different PKI solutions as it does not depend on
    specific database scheme. Furthermore it can be used as a responder for
    multiple CAs.

    The OCSP Responder is an rfc2560 compliant OCSPD responder. The purpose of
    such a server is to provide an on-line tool to verify the status of a
    certificate (such as Mozilla/Firefox/Netscape7).

    The Responder was included into the main OpenCA distribution package. It is
    also possible to install the daemon as a stand-alone application, all you
    will need is a CRL (or access to an LDAP server where to get the CRL from).


Project Status:
===============

   OpenCA OCSPD version 2.0.0 Status: Released      [17 Nov 2010]
   OpenCA OCSPD version 1.9.0 Status: rc1 available [21 Oct 2006]
   OpenCA OCSPD version 1.5.1 Status: rc1 available [21 Oct 2006]
   OpenCA OCSPD version 1.1.1 Status: Released      [19 Jul 2006]

Project developers' Tasks:
==========================

   Massimiliano Pala is currently working on:
     o Multiple certificate/keys usage for different CA
     o LibPKI v0.6.0 support
     o Harware support (PKCS#11, OpenSSL Engine)
     o Support for POST and GET HTTP methods
     o Support for EC key/certificates (if supported by
       installed OpenSSL)


Open Issues:
============

     o Better compliance to RFC-2560 in case multiple CAs are configured


Wishes:
=======

     o


References:
===========

   The OpenCA Project main website can be found at http://www.openca.org. You
   can find all current versions and available documentation there.
   You can also download any part of the software or documentation also at the
   official ftp site:

        ftp://ftp.openca.org

   or from one of the official mirrors:

        http://www.openca.org/mirrors.shtml


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

------------------------------------------------------------------------------
Beautiful is writing same markup. Internet Explorer 9 supports
standards for HTML5, CSS3, SVG 1.1,  ECMAScript5, and DOM L2 & L3.
Spend less time writing and  rewriting code and more time creating great
experiences on the web. Be a part of the beta today
http://p.sf.net/sfu/msIE9-sfdev2dev
_______________________________________________
Openca-Users mailing list
Openca-Users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openca-users

Reply via email to