Hi Paul,
   Thats great. Thanks for your quick response.
What is tgv.pem file. how can we get that file.

Thanks in advance,
Varma

On 8/24/05, Paul Simon <[EMAIL PROTECTED]> wrote:
> Maybe your URL is wrong. I just tried this:
> 
> openssl ocsp -issuer VeriSignClientECA.pem -url
> http://ocsp.verisign.com -cert eca_usr_cert.pem
> -VAfile tgv.pem -no_nonce -text
> 
> and it works fine as follows:
> 
> D:\prjs\ocsp\newEcaCA>openssl ocsp -issuer
> VeriSignClientECA.pem -url http://ocs
> p.verisign.com -cert eca_usr_cert.pem -VAfile tgv.pem
> -no_nonce -text
> OCSP Request Data:
>    Version: 1 (0x0)
>    Requestor List:
>        Certificate ID:
>          Hash Algorithm: sha1
>          Issuer Name Hash:
> 75EB8BF61A586BADD9044359324DAC621F5B59C8
>          Issuer Key Hash:
> 0DC0D83DBFFB6593C8376626E28A125FBBC280F5
>          Serial Number:
> 1B148220FC005FD035E866279AE682BE
> OCSP Response Data:
>    OCSP Response Status: successful (0x0)
>    Response Type: Basic OCSP Response
>    Version: 1 (0x0)
>    Responder Id: C = US, O = U.S. Government, OU =
> ECA, OU = "VeriSign, Inc.",
> CN = VeriSign Client ECA OCSP Responder
>    Produced At: Aug 23 17:10:46 2005 GMT
>    Responses:
>    Certificate ID:
>      Hash Algorithm: sha1
>      Issuer Name Hash:
> 75EB8BF61A586BADD9044359324DAC621F5B59C8
>      Issuer Key Hash:
> 0DC0D83DBFFB6593C8376626E28A125FBBC280F5
>      Serial Number: 1B148220FC005FD035E866279AE682BE
>    Cert Status: good
>    This Update: Aug 23 17:10:46 2005 GMT
>    Next Update: Aug 30 17:10:46 2005 GMT
> 
> Certificate:
>    Data:
>        Version: 3 (0x2)
>        Serial Number:
> 
> 0f:74:76:24:82:2a:30:ad:35:fc:45:8b:13:36:4b:0b
>        Signature Algorithm: sha1WithRSAEncryption
>        Issuer: C=US, O=U.S. Government, OU=ECA,
> OU=Certification Authorities, C
> N=VeriSign Client External Certification Authority
>        Validity
>            Not Before: Aug 16 00:00:00 2005 GMT
>            Not After : Sep 15 23:59:59 2005 GMT
>        Subject: C=US, O=U.S. Government, OU=ECA,
> OU=VeriSign, Inc., CN=VeriSign
>  Client ECA OCSP Responder
>        Subject Public Key Info:
>            Public Key Algorithm: rsaEncryption
>            RSA Public Key: (1024 bit)
>                Modulus (1024 bit):
> 
> 00:ce:b3:b0:95:33:73:1f:2a:f5:a7:63:6b:2f:5d:
> 
> 04:66:13:df:35:b9:60:9a:92:a8:16:53:99:bd:70:
> 
> a5:9c:34:3f:f4:91:05:a1:15:28:51:38:1c:d3:d5:
> 
> cc:d5:82:fb:43:74:7f:84:6e:41:77:39:a6:be:46:
> 
> d5:fb:ef:91:10:6b:ab:b9:20:0d:dd:0a:bd:5a:f9:
> 
> e4:2b:e2:43:4f:c9:30:00:89:c7:cf:80:a9:76:93:
> 
> 03:08:03:12:70:a5:76:86:c1:1d:3d:60:12:f5:2f:
> 
> de:9c:9d:a3:2b:ad:22:51:1f:b9:5c:7a:fd:8d:a6:
>                    c4:b3:1a:50:69:8c:dc:26:93
>                Exponent: 65537 (0x10001)
>        X509v3 extensions:
>            Authority Information Access:
>                CA Issuers -
> URI:https://eca.verisign.com/CA/VeriSignECA.cer
> 
>            X509v3 Certificate Policies:
>                Policy: 2.16.840.1.101.3.2.1.12.2
>                  CPS:
> https://www.verisign.com/repository/eca/cps
> 
>            X509v3 Extended Key Usage: critical
>                OCSP Signing
>            X509v3 Key Usage: critical
>                Digital Signature, Non Repudiation
>            OCSP No Check:
> 
>            X509v3 Subject Alternative Name:
>                DirName:/CN=OCSP2-TGV-1-141
>            X509v3 Subject Key Identifier:
> 
> 30:EF:0D:8E:CD:58:05:E9:73:96:06:4E:63:48:F9:24:59:82:41:D4
>            X509v3 Authority Key Identifier:
> 
> keyid:0D:C0:D8:3D:BF:FB:65:93:C8:37:66:26:E2:8A:12:5F:BB:C2:80:F
> 5
> 
>    Signature Algorithm: sha1WithRSAEncryption
> 
> 6b:8d:79:7a:b3:d5:1d:e7:0e:ac:18:e7:f0:b4:fc:b4:cf:03:
> 
> cf:f2:de:e0:93:b9:60:99:ab:b3:52:96:85:dc:34:20:f0:78:
> 
> d8:24:c8:b3:71:25:f2:90:8d:7f:dc:00:7e:25:92:fd:e0:26:
> 
> fa:3d:99:a1:89:86:a0:09:fe:0a:20:34:0a:68:31:cd:60:9d:
> 
> 63:a1:d9:2f:36:7c:4d:74:cc:ca:91:65:cb:a5:1f:5f:3a:e4:
> 
> e4:73:67:9b:8e:50:ec:33:28:37:4c:05:33:a8:84:3e:63:7c:
> 
> 3d:c5:cd:90:c3:72:99:99:7e:e8:e9:67:42:3c:1b:e6:6f:a5:
>        6d:37
> -----BEGIN CERTIFICATE-----
> MIID2jCCA0OgAwIBAgIQD3R2JIIqMK01/EWLEzZLCzANBgkqhkiG9w0BAQUFADCB
> lDELMAkGA1UEBhMCVVMxGDAWBgNVBAoTD1UuUy4gR292ZXJubWVudDEMMAoGA1UE
> CxMDRUNBMSIwIAYDVQQLExlDZXJ0aWZpY2F0aW9uIEF1dGhvcml0aWVzMTkwNwYD
> VQQDEzBWZXJpU2lnbiBDbGllbnQgRXh0ZXJuYWwgQ2VydGlmaWNhdGlvbiBBdXRo
> b3JpdHkwHhcNMDUwODE2MDAwMDAwWhcNMDUwOTE1MjM1OTU5WjB7MQswCQYDVQQG
> EwJVUzEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQwwCgYDVQQLEwNFQ0ExFzAV
> BgNVBAsTDlZlcmlTaWduLCBJbmMuMSswKQYDVQQDEyJWZXJpU2lnbiBDbGllbnQg
> RUNBIE9DU1AgUmVzcG9uZGVyMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDO
> s7CVM3MfKvWnY2svXQRmE981uWCakqgWU5m9cKWcND/0kQWhFShROBzT1czVgvtD
> dH+EbkF3Oaa+RtX775EQa6u5IA3dCr1a+eQr4kNPyTAAicfPgKl2kwMIAxJwpXaG
> wR09YBL1L96cnaMrrSJRH7lcev2NpsSzGlBpjNwmkwIDAQABo4IBQzCCAT8wRwYI
> KwYBBQUHAQEEOzA5MDcGCCsGAQUFBzAChitodHRwczovL2VjYS52ZXJpc2lnbi5j
> b20vQ0EvVmVyaVNpZ25FQ0EuY2VyMFIGA1UdIARLMEkwRwYKYIZIAWUDAgEMAjA5
> MDcGCCsGAQUFBwIBFitodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcmVwb3NpdG9y
> eS9lY2EvY3BzMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMJMA4GA1UdDwEB/wQEAwIG
> wDAPBgkrBgEFBQcwAQUEAgUAMCcGA1UdEQQgMB6kHDAaMRgwFgYDVQQDEw9PQ1NQ
> Mi1UR1YtMS0xNDEwHQYDVR0OBBYEFDDvDY7NWAXpc5YGTmNI+SRZgkHUMB8GA1Ud
> IwQYMBaAFA3A2D2/+2WTyDdmJuKKEl+7woD1MA0GCSqGSIb3DQEBBQUAA4GBAGuN
> eXqz1R3nDqwY5/C0/LTPA8/y3uCTuWCZq7NSloXcNCDweNgkyLNxJfKQjX/cAH4l
> kv3gJvo9maGJhqAJ/gogNApoMc1gnWOh2S82fE10zMqRZculH1865ORzZ5uOUOwz
> KDdMBTOohD5jfD3FzZDDcpmZfujpZ0I8G+ZvpW03
> -----END CERTIFICATE-----
> Response verify OK
> eca_usr_cert.pem: good
>        This Update: Aug 23 17:10:46 2005 GMT
>        Next Update: Aug 30 17:10:46 2005 GMT
> 
> --- varma d <[EMAIL PROTECTED]> wrote:
> 
> > Hi,
> > Thanks a lot prakash for your reply. Actually my
> > application works in this
> > way
> > 1) I will get the x.509 certificate from any
> > server(lets say)
> > yahoo.com<http://yahoo.com>,
> > now from that i will extract yahoo.com
> > <http://yahoo.com> user
> > certificate(may be issued by verisign or others),
> > issuers root certificate.
> > 2) Now i need to check the OCSP status of these
> > individual certificates
> > 3) Since verisign is an OCSP responder i just want
> > to query
> > ocsp.verisign.com <http://ocsp.verisign.com> for
> > these individual
> > certificates.
> >
> > but while i was trying with your command
> >
> > openssl ocsp -url http://ocsp.verisign.com:8080
> > -issuer ROOT_CA.pem -VAfile
> > OCSPServer.pem -cert User.pem
> >
> > I am getting an error message like
> >
> > "Error Querying OCSP responder
> > ....
> > 3256: .. Connect error..."
> >
> > But when i am trying with same command and same
> > certificates to
> > ocsp.openvalidation.org
> > <http://ocsp.openvalidation.org> i am getting status
> >
> > information.But only problem with openvalidation is
> > that they dont have
> > up-to-date information(for some cases).
> >
> > Are there are any public ocsp responder where i can
> > query them instead of
> > ocsp.versign.com <http://ocsp.versign.com>.
> >
> > I would be grateful to you if you would give a
> > reply.
> >
> > Thanks in Advance
> >
> > Thanks,
> > Varma
> >
> >
> > On 8/24/05, prakash babu <[EMAIL PROTECTED]>
> > wrote:
> > >
> > > Hi,
> > >  The -Vafile option is used for explicitly
> > trusting the responder
> > > certificate of the ocsp server
> > > So if you omit this option you will get the
> > "unable to get local issuer
> > > certificate" error.
> > >
> > > To get this command working
> > > openssl ocsp -url http://ocsp.verisign.com:8080
> > -issuer ROOT_CA.pem
> > > -VAfile OCSPServer.pem -cert User.pem
> > >  1. First you must get a certificate from Verisign
> > -User.pem
> > > 2. Get the CA certificate that was used to sign
> > your request - ROOT_CA.pem
> > > 3. Trust the Verisign OCSP responder certficate -
> > OCSPServer.pem
> > >  --Prakash
> > >
> > > *varma d <[EMAIL PROTECTED]>* wrote:
> > >
> > > Hi,
> > > Today i was very much excited to see this mailing
> > list on openSSL. I
> > > searched several messages and its great to see
> > that people here are helping
> > > others.
> > > I need your help.
> > >
> > > I read tutorials on OCSP from
> > http://openvalidation.org about using OCSP
> > > in openssl,
> > > I have couple of questions.
> > > 1) I used the following command to send OCSP
> > request and get response from
> > > OCSP responder.
> > >
> > > openSSL>ocsp -url http://ocsp.openvalidation.org
> > -issuer ROOT_CA.pem
> > > -VAfile OCSPServer.pem -cert User.pem
> > >
> > > When i am executing this command , i am getting
> > response from OCSP
> > > responder stating that certificate status is good.
> >
> > > (i have taken this command/files from
> >
> openvalidation.org<http://openvalidation.org/>(http://www.openvalidation.org/useserviceopenssl.htm)
> >
> > > )
> > >
> > > But, In this command what is the purpose of
> > OCSPServer.pem, i still dont
> > > understand the purpose of OCSPServer.pem as we
> > need to just send our
> > > request and expect a response from OCSP responder
> > irrespective of
> > > OCSPServer.pem file.
> > >
> > > If i give my URL as http://ocsp.verisign.com, how
> > can i get verisign's
> > > OCSPServer.pem. Also how can i get
> > > latest OCSPServer.pem file for the given URL.
> > >
> > > 2)I tested by giving latest user certificates
> > other than
> > > openvalidation.org <http://openvalidation.org/>
> > certificates, but i am
> > > getting this error
> > >
> > > user.pem:WARNING: Status times invalid.
> > > 3220:error:2707307D:OCSP
> > > routines:OCSP_check_validity:status
> > > expired:.\crypto\ocsp\ocsp_cl.c:357:
> > > unknown
> > > This Update: Oct 24 06:00:11 2004 GMT
> > > Next Update: Oct 25 06:00:11 2004 GMT
> > >
> > > For this do i need to update my OCSPServer.pem
> > file
> > >
> > >
> > > Thank you for your time and consideration
> > >
> > > I would be grateful to you if you would help me
> > out as i am spending a lot
> > > of time on understanding this.
> > >
> > > Please help me out.
> > >
> > > Thanks,
> > > vv
> > >
> > > __________________________________________________
> > > Do You Yahoo!?
> > > Tired of spam? Yahoo! Mail has the best spam
> > protection around
> > > http://mail.yahoo.com
> > >
> >
> 
> 
> __________________________________________________
> Do You Yahoo!?
> Tired of spam?  Yahoo! Mail has the best spam protection around
> http://mail.yahoo.com
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to