On 5.10.2015 17:11, Dr. Stephen Henson wrote:
On Mon, Oct 05, 2015, Walter H. wrote:

Hello,

attached is the certificate and its chain of  https://revoked.grc.com/

doing this:

openssl ocsp -no_nonce -issuer chain.pem -cert cert.pem -text -url
http://ocsp2.globalsign.com/gsdomainvalg2

goves the following:

OCSP Request Data:
     Version: 1 (0x0)
     Requestor List:
         Certificate ID:
           Hash Algorithm: sha1
           Issuer Name Hash: 45658DA20174402FF48B3A6AC0BC69208095C7CA
           Issuer Key Hash: 96ADFAB05BB983642A76C21C8A69DA42DCFEFD28
           Serial Number: 112155688D380775DA34C5DF97433ED3F6A7
Error querying OCSP responsder
139928584042312:error:27076072:OCSP routines:PARSE_HTTP_LINE1:server response
error:ocsp_ht.c:250:Code=403,Reason=Forbidden

where is the problem for this strange error?

Some OCSP responders need the host header, try adding:

         -header Host ocsp2.globalsign.com
Thanks for this hint;

When doing this

openssl ocsp -CAfile /etc/pki/tls/certs/ca-bundle.trust.crt -no_nonce -issuer 
issuer.pem -cert cert.pem -text -url http://ocsp2.globalsign.com/gsdomainvalg2 
-header Host ocsp2.globalsign.com

ca-bundle.trust.crt is the certstore of my centos
issuer.pem is the intermediate certificate, used signing cert.pem
cert.pem is the certificate that should be checked

then I get this error:

Response Verify Failure
139966083565384:error:27069065:OCSP routines:OCSP_basic_verify:certificate verify error:ocsp_vfy.c:126:Verify error:unable to get local issuer certificate
srvr.pem: revoked
        This Update: Oct 13 07:20:48 2015 GMT
        Next Update: Oct 16 07:20:48 2015 GMT
        Reason: unspecified
        Revocation Time: Apr 23 15:44:10 2014 GMT

when I use use chain.pem (contains both the intermediate and the root certificate) as -CAfile
then it works;

I want to do the following:

I get the server certificate and the chain except of the root;
and then I want to verify with this, if the certificate is valid, revoked or has expired

so I have 3 files

cert.pem   the certificate itself
issuer.pem  the intermediate that was used signing the certificate
chain.pem any certificate of the chain except the certificate itself and the root
the following script should do the job ...

#!/bin/sh
CAFILE=/etc/pki/tls/certs/ca-bundle.trust.crt
CERT=srvr.pem
ISSUER=issuer.pem

OCSPURL=$(openssl x509 -in $CERT -noout -ocsp_uri)
OCSPHOST=$(echo "$OCSPURL" |gawk -F\/ '{ print $3 }' -)

openssl ocsp -CAfile $CAFILE -no_nonce -issuer $ISSUER -cert $CERT -url "$OCSPURL" -header Host $OCSPHOST

but failes with

139966083565384:error:27069065:OCSP routines:OCSP_basic_verify:certificate verify error:ocsp_vfy.c:126:Verify error:unable to get local issuer certificate

why?

it can't be the solution to generate a new "cert store" (the concat of chain.pem and the real cert store) for each certificate I want to verify ...

Thanks,
Walter

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to