Thank you for your quick answer,

which is helpful but not exactly what I had in mind ;) You couldn’t know
this because I forgot to mention my aims. I’m trying to realise the
following scenario:
The CRL shall be kept on the server of the SSL-website and not within the
servers of the CA in order to reduce the huge amount of traffic which goes
hand in hand with the periodic CRL-update. The CRL has to be created and
signed by the CA and then send to server of the SSL-website where the CRL is
stored and can be accessed by the rest of the SSL-world.
As you can see, an environment variable goes in the right direction but
having a variable for each client of the CA is not yet ideal.
I know that this scenario is probably not realisable today but that should
not care us in the meantime.

I’m anxious to read comments about “my” scenario or probably a solution for
my problem.

best regards

domi




Patrick Patterson-3 wrote:
> 
> On Wednesday 31 January 2007 06:45, domi wrote:
>> Hello,
>>
>> I searched and tried a lot but wasn't able to solve the following
>> problem:
>>
>> I have built my own little CA (with the help of the OpenSSL book of
>> O'Reilly). I can create certificate requests and issue certificate from
>> them. Now I want to do the following:
>>
>> The certificate request should include the crlDistributionPoints. (I'm
>> able
>> to enter the DP under certificate_extensions) Thats no problem so far.
>> But now should the CA create the certificate without knowing the CRL DP
>> in
>> the forefront. The CA should take CRL DP entered by the user and put it
>> into the certificate. Unfortunately I wasn't able to manage this.
>> I tried a lot of things like crlDistributionPoints=supplied for example
>> but
>> nothing worked.
>>
>> Summary: The certificate shall include the crlDistributionPoints without
>> being written static into the openssl.cnf of the CA.
>>
> I'm not sure how this would be doable (I suppose "copy extensions" might
> be 
> what you want), however, I also have no idea why you would ever want a 
> subject to be defining the distribution point for the CA. If you are
> trying 
> to roll over the CRLdp (for instance, if you are trying to have only a
> given 
> number of certificates in a particular CRL), you might want to have an 
> environment variable ($ENV::CRLNUMBER), and have that appended to the URI
> in 
> the certificateDistributionPoint extension. i.e:
> 
> export CRLNUMBER=5
> openssl ca -in certreq.pem -out cert.pem
> 
> (where there is a usr_ext section in your stock openssl.cnf with the line:
> 
> crlDistributionPoints =
> URI:http://www.example.com/someurl/$ENV::CRLNUMBER.crl
> 
> However, with OpenSSL, this is probably a bit tricky, since you'll have to 
> keep a mapping for the certificate, and parse that before you do the
> revoke 
> so that you can do the right thing.
> 
> 
> 
> -- 
> Patrick Patterson
> President and Chief PKI Architect
> Carillon Information Security Inc.
> http://www.carillon.ca
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
> 
> 

-- 
View this message in context: 
http://www.nabble.com/crlDistributionPoints-in-a-certificate-request-tf3148251.html#a8744148
Sent from the OpenSSL - User mailing list archive at Nabble.com.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to