Hi list! (Tried posting this a few days back, but it got lost in the process, trying again...)
I have been experimenting with the OCSP "client" in OpenSSL, using a command line like this: openssl ocsp -issuer level3ca.cer -cert enduser1.cer -url http://ocsp-test -CAfile cafile.pem OpenSSL version is 0.9.7b compiled on Win32 using VS6.0. The structure looks like this: Level1CA (Self-signed root, off-line, CRL being manually created every six months) GlobalOCSPResponder Level2CA (off-line, CRL being manually created every six months) Level3CA (on-line, signing end-entity certs and CRLs) Level3OCSPResponder end-entity cert1 end-entity cert2 Case 1: ------- The CAfile.pem contains the Level1 CA only, and I'm trying to use the "Global" OCSP responder which is directly signed by the root. This gives me "root not trusted" error - but works fine if I run the rootcert in cafile.pem through "addtrust ocspsigning" first, adding a small sequence at the end.. The other way of getting openssl happy here is to explicitly refer to the GlobalOCSP-certificate using -VAfile. This seemed like a nice solution that could deal with all end-entity-certs in the hierarchy, BUT when trying the same thing using Mozilla 1.4 as an OCSP client I'm getting "Could not verify this certificate for unknown reasons." as there seems to be no way of "trusting" the root ca for ocsp-signing... Is this kind of setup supported, it seems that this scenario might not be supported in RFC2560... ?? :( Case 2: ------- Here I'm using one OCSP-responder per CA (the Level3OCSPResponder in my structure above). Obviously I need more than the root CA in the CAfile.pem now, and as I see it only Level2 should have to be added, so I give this a try, no -VAfile or anything strange with the root certificate, and two CAs in the cafile (root and level2), and I get this: Response Verify Failure 3756:error:27069065:OCSP routines:OCSP_basic_verify:certificate verify error:.\crypto\ocsp\ocsp_vfy.c:122:Verify error:unable to get local issuer certificate enduser1.cer: good This Update: Jul 31 19:11:13 2003 GMT This seems strange as the Level3-CA has already been given to openssl through -issuer, and a quick adding of the level3-CA to cafile gives me what I want: Response verify OK enduser1.cer: good This Update: Jul 31 19:12:23 2003 GMT Is this by design, or have I overlooked something obvious?? I'd rather just have the first two levels of CA's in the file, as those are unlikely to change, but other level3 CAs might be added. The case 2-setup also makes Mozilla happy, now it gives me the "This certificate has been verified for the following uses:" message, which states that this is the way to go?? Can anyone enlighten me a bit about the openssl handling of the cert-chain in this case? Regards, Werner ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]