> > Do the following: Give every certificate a different
> > AIA, speak: a different GET-URL´s. Then ignore the actual
> request-data at
> > the server and always replying with the preproduced response
> for this URL.
> > Combined with a good DNS-Load-Balancing the fastest
> OCSP-responder you can
> > get. You can call this setup: "abusing the possibility of
> replay-attacks for
> > good".
>
> That's disgusting.  I sure hope Identrus isn't doing that for their
> "infrastructure" certs.

No, they don´t. But it is not necessary to abuse the standard that much -
simply think of caching OCSP-Responders, that cache the response of another
OCSP-responder - they cannot send nonce, too. And signing the answer
themselves may spoil the requirements of OCSP-Responder-Certificate
delegation. A solution would be to double sign the request: the answerer
including nonce and the generator giving the result. But this is not within
the scope of RFC2560.

> > 3. If there is no nonce in the response, accept it and (only then)
> > check the timestamping (weaker replacement for nonce).
>
> No no no.  First, OpenSSL has no internal code that uses OCSP.  It has a
> sample app that does the right thing.  Second, it is *totally wrong* to
> silently fall back to weaker security.  The proper behavior is this:
>       If client wants a nonce, use it.
>       If reply comes back without a nonce, return warning
>       Allow client to log the fact, change its config, and retry without a
> nonce

Probably you are right with your first point. But I do not see why I should
retry without a nonce - I would get EXACTLY the same response. So your
handling boils down to this:

1)      If client wants a nonce, use it.
2)      If reply comes back without a nonce, return warning
3)      Allow client to log the fact, change its config,
        and accept it without a nonce

What would happen in real world: every programmer would have to do your
third step somewhat automatically.

> > I cannot think of any cause why a client wants to omit nonce!)
>
> Because, unless the responder includes the nonce: *the security
> guarantee of the nonce is useles.*  It is also useless as a "due
> diligence" proof, since it is trivial for the client to back-date his
> OCSP query.

To do this, one should introduce the options "--do-nonce-check" (default)
and "--no-nonce-check". But sending ... - I think we should always send a
nonce.

ciao, Fl0

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to