On Thu, Apr 14, 2005, Eddy Tan wrote:

> --- "Dr. Stephen Henson" <[EMAIL PROTECTED]> wrote:
> > OpenSSL does that automatically. What you'd really need to do
> > is to check for critical CRL extensions in the verify callback
> 
> > when you get that error. If IDP is the only critical extension
> 
> > present *and* if it is empty (length 2) you can safely ignore 
> > that error.
> 
> Thatīs a really quick response :-)  Thanks!
> Last question, if a user certificateīs already been revoked,
> will it be removed from the CAīs LDAP server instantly?
> My understanding is if itīs trivial to update the CRL regularly,
> it should be pretty easy to remove userCertificates from the
> server as well.
> 
> If thatīs the case, we can then, rather checking on the CRL,
> query specific user certificate from the CA server.
> 

No in general that wont happen. There are several reason why it is useful to
retrieve a certificate after it has been revoked. For example if it was
possible to determine the certificate was used *before* it was revoked.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to