On 1/12/09, Thomas NOEL <thomas.n...@auf.org> wrote:
> Hello,
>
>  Alon Bar-Lev a écrit :
>
> > Thank you for the patch.
>  > I am more in favor of adding OCSP support into OpenVPN.
>  > It should be very easy using OpenSSL trunk.
>  > Also available at [1].
>  > So if you can help perfecting this patch it would be a step in the
>  > right direction.
>  > [1] http://www.block64.net/
>
>
> I think it is not as flexible as the Mathieu's patch.
>
>  For example, a certificate or a CA can provide it's own "Authority
>  Information Access" (via a x509 extension) with the URL of a prefered
>  OCSP server... Manage this kind of configuration inside OpenVPN is not
>  easy.

This is why I wrote "perfecting this patch" :)

>  The "--tls-export-cert" option (proposed by Mathieu) put the complexity
>  in a script, where you are only limited by your imagination : OCSP is an
>  example, but you can also think about OSCP with fallback, SCVP,
>  revocation with delta CRLs, check against a NSS database, etc. Think
>  about blacklists, too...
>
>  We can not integrate all these cases directly in OpenVPN. An external
>  system (as for all others scripts in OpenVPN) provides an very efficient
>  solution.

I think all the above can be implemented as logic into OCSP responder...
OpenVPN needs a standard way to forward the certificate.
Standard == OCSP
If a simple script based OCSP is out there, then all you need is solved.

>
>  Just my 2 cents..

Thanks!
Alon.

Reply via email to