21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

See Also<br />

• RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate<br />

Revocation List (CRL) Profile<br />

• Recipes 9.4, 10.1, 10.6, 10.9, 10.10<br />

10.12 Checking Revocation Status via OCSP with<br />

OpenSSL<br />

<strong>Problem</strong><br />

You have a certificate that you want to verify, as well as the certificate used to issue it<br />

(and any others that may be in the certification path), but you need to check that the<br />

certificates have not been revoked. One way to do this is to download the CRLfrom<br />

the issuing CA, but an alternative is to check an OCSP responder for an immediate<br />

response. Using OCSP allows you to avoid the overhead of downloading a potentially<br />

very large CRL file.<br />

Solution<br />

Most CAs publish CRLs, but most do not run OCSP responders. A number of public<br />

OCSP responders collect CRLs from a number of different CAs and are capable of<br />

responding for each of them. Such responders are known as chain responders, and they<br />

should only be trusted if their certificate can be verified or if it is trusted and it contains<br />

the extKeyUsage extension with the OCSPSigning bit enabled. A reasonably up-to-date<br />

list of these public responders is available from http://www.openvalidation.org. For<br />

those CAs that run their own OCSP responders, it’s best to contact them directly<br />

rather than relying on a chain responder, because the information from a CA’s<br />

responder is more likely to be the most up-to-date.<br />

In Recipe 10.10, we built a lookup table of various CAs that contains information<br />

about where their CRLs can be found. You will notice that OCSP responder information<br />

is also present for those CAs that have their own. At the time of this writing, the<br />

only CA that has its own responder (so far as we have been able to determine) is<br />

VeriSign.<br />

Discussion<br />

Checking a certificate’s revocation status using an OCSP responder requires three<br />

things: the address of the OCSP responder, the certificate to be checked, and the certificate<br />

that issued the certificate you want to check. With these three items,<br />

OpenSSLmakes quick work of communicating with an OCSP responder. A number<br />

562 | Chapter 10: Public Key Infrastructure<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!