On March 5, 2010 01:41:48 am Nagendra_U_M wrote:
> Hi All,
>
>      I just started working on OCSP...
If I may ask, what are you working on - writing a client, or writing a server, 
or using it in some other way?

> And I am trying to set up an OCSP responder using the OpenSSL CLI commands.
> Right now, my index.txt file is blank and zero-size (created using the
> "touch" command).
>
You are aware of the warnings that are all over the CLI OCSP bits that say 
"for testing only, do NOT use as a real production OCSP responder" - right? :)

> I want to know how to fill in revocation information into the index.txt
> file, and in what format?  (so that I can get a "BAD" OCSP response for
> revoked certs).
>
Same as the format generated by the openssl ca command.

> Also, the zero-size index.txt file results in an "UNKNOWN" OCSP response
> all the time.
> What do I need to do so that my OCSP Responder returns a "GOOD" response
> for those certs NOT in the revoked list??
>
The OCSP responder MUST only respond "good" for certificates it absolutely 
knows about - if it is uncertain of the status (i.e. that serial number does 
not appear in the index.txt), then it MUST respond with unknown.

> My CRL is generated in *.pem X.509 format...How can I convert that into
> revocation info stored inside index.txt file??
>
Don't convert the CRL - you don't have enough information - use the index.txt 
file from your CA directly. Keep in mind that for your responses to be 
considered valid by just about all implementations out there, the OCSP 
responder must either sign the responses with the CA's keys (bad idea, for a 
number of good security reasons), or with a specific key and associated 
certificate certified by the CA for the OCSP responder (with EKU OCSPSigning, 
and preferably the ocsp-no-check extension defined to avoid chicken and egg 
issues).

If you don't have the index.txt file from your CA, then you are either 
probably not authorised to sign ocsp responses, so no matter what you do, a 
proper client will fail; or in the case where your CA isn't an openssl one but 
you ARE allowed to publish OCSP status, in which case you need to find a way 
to export the internal database of certificates used by that CA, and translate 
it to the format used by the openssl ca command.

A representative sample is below:

R 130110200751Z 100201142709Z,superseded 8E unknown /O=Example/CN=Foo
V 130119193554Z  8F unknown /O=Example/CN=Bar

Field 1: Status - R = Revoked, V=Valid
Field 2: Issued on(Valid start) 
Field 3: Revoked on (with a comma value for the reason)
Field 4: Certificate Serial Number
Field 5: Unused - always "unknown"
Field 6: Subject DN of certificate

The file is tab delimited, if I am not mistaken.

Have fun.

-- 
Patrick Patterson
President and Chief PKI Architect,
Carillon Information Security Inc.
http://www.carillon.ca
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to