Understood, this indeed is the case.

Is it a violation of good practice, RFC? What are the security risks?
--
Konrads Smelkovs
Applied IT sorcery.


On Tue, Mar 23, 2010 at 7:44 PM, Dr. Stephen Henson <st...@openssl.org>wrote:

> On Tue, Mar 23, 2010, Konrads Smelkovs wrote:
>
> > Hi,
> > The OCSP responder has EKU=OCSP:
> >
> >        X509v3 extensions:
> >             X509v3 Subject Key Identifier:
> >
> 2B:6E:08:08:9D:92:5A:59:CB:BB:46:89:77:E8:A0:17:47:82:88:5C
> >             X509v3 Extended Key Usage:
> >                 OCSP
> >             X509v3 Key Usage:
> >                 Digital Signature, Non Repudiation
> >             X509v3 Authority Key Identifier:
> >
> > keyid:CC:C3:F5:66:FF:73:AC:38:5A:96:1B:21:89:B8:81:4C:1F:CB:5E:25
> > I attached OCSP cert. I believe this is setup #2 you described.
>
> It also has to be signed by the same CAs as the certificates it covers, a
> CA
> certificate higher up the chain is not permitted in that case.
>
> Steve.
> --
> Dr Stephen N. Henson. OpenSSL project core developer.
> Commercial tech support now available see: http://www.openssl.org
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>

Reply via email to