Hey Steffen, Thank you for the helpful tip. Can you send me a tarball. It would be the easiest option.
Andreas Steffen <andreas.stef...@strongswan.org> schrieb am Sa. 17. Aug. 2024 um 15:02: > Hi, > > you could run the OCSP responder coming with the strongSwan pki tool > > https://docs.strongswan.org/docs/5.9/pki/pkiOcsp.html > > used by the following ocsp.sgi script: > > #!/bin/bash > > cd /etc/openxpki/tls > > echo "Content-type: application/ocsp-response" > echo "" > > cat | pki --ocsp --respond --lifetime 10 --debug 0 \ > --cacert chain/cacert.pem --cert ocsp/cert.pem --key > ocsp/key.pem > > strongSwan version 5.9.12 or newer is required. The pki tool is based on > the > libstrongswan library and needs the openxpki plugin > > https://docs.strongswan.org/docs/5.9/plugins/openxpki.html > > plus the mysql plugin in order to directly access the OpenXPKI MariaDB > database. > I could make strongSwan 5.9.14 binaries for Debian 12 available as a > tarball > if you don't want to build them yourself. > > The Apache2 configuration file ocsp.conf > > AddHandler cgi-script .cgi > > <VirtualHost *:80> > > ServerName ocsp.example.com > DocumentRoot /var/www > > ScriptAlias / /usr/lib/cgi-bin/ocsp.cgi > > ErrorLog /var/log/apache2/ocsp/error_log > CustomLog /var/log/apache2/ocsp/access_log combined > </VirtualHost> > > <Directory "/usr/lib/cgi-bin/"> > AllowOverride None > Options +ExecCGI > Order allow,deny > Allow from all > Require all granted > </Directory> > > makes the OCSP server http://ocsp.example.com co-located on the > OpenXPKI server listen on HTTP port 80 for OCSP requests. > > Kind regards > > Andreas > > On 14.08.24 12:19, Martin Bartosch via OpenXPKI-users wrote: > > Hi, > > > >> Can someone help me or tell me which OCSP I can take. I read that one > of EJBCA took it. > > > > You can use any OCSP responder that either reads a standard CRL or > accesses the OpenXPKI database. > > > > Personally I tried the EJBCA OCSP responder some time ago and I am not > too fond of it. It's a huge, sluggish and resource-hungry beast. > > > > For OpenXPKI Enterprise Edition we offer an extremely efficient and > blazingly fast OCSP responder that accesses the OpenXPKI database and which > also can be easily operated distributed. However, this is not available for > the Community Edition. > > > >> Does anyone have an idea? And what is the easiest way to get the CRL > list exported without accessing the WebGui. > > > > Configure the CRL publishing connector as required. The default > configuration already writes the CRL to the file system, so you can simply > use that. Automate CRL issuance by invoking the crl_issuance workflow for > the desired realm via > > > > openxpkicmd crl_issuance --realm REALM > > > > Cheers > > > > Martin > > > > > > > > _______________________________________________ > > OpenXPKI-users mailing list > > OpenXPKI-users@lists.sourceforge.net > > https://lists.sourceforge.net/lists/listinfo/openxpki-users > ====================================================================== > Andreas Steffen andreas.stef...@strongswan.org > strongSwan - the Open Source VPN Solution! www.strongswan.org > strongSec GmbH, 8952 Schlieren (Switzerland) > ====================================================================== > > > _______________________________________________ > OpenXPKI-users mailing list > OpenXPKI-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/openxpki-users >
_______________________________________________ OpenXPKI-users mailing list OpenXPKI-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openxpki-users