Hi Adrien,

 

Just out of curiosity, what version of OpenSSL are you using? I can get OCSP
to work with version 0.9.8, but not 1.0 or later and I’m looking to see if
anyone else has had any luck with the current version.

 

Thanks,

Steve

 

From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Erwann Abalea
Sent: Tuesday, August 14, 2012 10:35 AM
To: openssl-users@openssl.org
Cc: adrien pisarz
Subject: Re: [openssl-users] OpenSSL OCSP

 

Bonjour,

Answers inline.




-- 
Erwann ABALEA
 

Le 14/08/2012 19:03, adrien pisarz a écrit :

Hi,
 
I have several questions about the ocsp functionnality. I read many articles
before asking those questions and unfortunetaly I still don't have the
answers. Maybe you can help me.
 
Fist of all, here is my ocsp configuration :
openssl ocsp -index index_prod.txt -CAfile OpCA.pem -rsigner ocsp.crt -rkey
ocsp.key -port 3456 -text  -out /home/userocsp/ocsp_responder.log
 
The file index is populated by a self-made script, 
the ocsp.crt (resp. key) is a certificate (resp. key) which contains the
ocsp signature extensions
the OpCA.pem contains the subAC certificate
 
Here are my questions :
1. Why the ocsp client work only if the -VAFile is set and otherwise I got a
signature error ? Is there a way to solve this issue ?


Maybe because the responder is not one of:
 - the CA that signed the certificate you're requesting the status on
 - a designated responder directly signed by the CA that signed the
certificate you're requesting the status on

Reread RFC2560. If you're instanciating the third possible responder type
(trusted responder whose public key is trusted by the requester), then you
obviously need to inform the client/requester. You didn't provide elements
on who signed who, so that's just a guess.




2. If I wan manage several subAC should I open a port foreach subCA ?


With the command-line tool, yes. If you need to have more CAs, then you
could probably try something more suited than the command-line tools. The
command-line tool also doesn't respond to GET requests, only POST ones.




3. Why the ocsp responder requires that all the certificates (even the
valide's one) must be present in the index.txt in order to provide a correct
answer ? I was expected that openssl will check the certificate signature
and if the serial is not present in the index.txt, it will answer good and
not unknow.


Design choice. You're giving the responder a database, so it supposed to
know *all* the certificates.
OCSP can be based on CRLs (black-list), but that's not implemented by the
tool. If that's what you want, you'll have to write your own.




4.  As said, the openssl responder is working but a IHS server is not abble
to validate his answer and I got those errors :
[...]

Does anyone know how to configure an IHS with an openssl ocsp responder ?


You may ask your provider for this, not OpenSSL.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to