-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 domi wrote: > Hello all together, Hello Domi,
> I’m not quite sure where to post my question because I wasn’t able to locate > my fault. So I’ll post my question in the OpenSSL-user forum and in the > Apache http server-users forum. A similar post in a German Firefox forum > brought no solution. Please excuse if the question doesn’t fit into this > forum. [...] Thanks for the detailed information you have given. Unfortunately most of it is quite useless in this situation ;-) What we need is: * The CA certificate * The server certificate * The CRL * The output of openssl verify -CAfile CAandCRLconcatenated.pem -verbose -crl_check \ server.pem * The output of openssl s_client -verify 5 -CAfile CAandCRLconcatenated.pem -showcerts -connect 192.168.0.2:443 > Here is my openssl.cnf: [...] > [ certificate_extensions ] > basicConstraints = CA:false > crlDistributionPoints=URI:https://192.168.0.2/derexample.crl Why is this https ? The CRL is public information. This could lead to something like: * Browser wants to connect HTTPS on 192.168.0.2 * HTTPS on 102.168.0.2 returns cert. * browser wants to check integrity of cert from 192.168.0.2 * browser connects HTTPS on 192.168.0.2. * HTTPS on 192.168.0.2 returns cert. * browser wants to check integrity of cert from 192.168.0.2 ... [...] > Now to my Apache part: This is useless information. The server only supplies the CRL and uses the server cert on https connsctions. How apache is configured to do this is not an issue here. [...] > step 2: start Firefox 2.0.1 and call the site https://192.168.0.2 > Of course you must trust the certificate. But only temporarilyx for this session... [...] > step 7: new start of Apache und Firefox. The site can still be accessed > although the certificate is revoked; no error message or something like that > is shown. I also deleted the private internet files and the last visited > pages to avoid that my site still lies somewhere in the cache. This seems to be a browser problem. Try to do this with a server without crlDistributionPoints extension. Bye Goetz -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org iD8DBQFFxiYm2iGqZUF3qPYRAiCKAJ0b8mqxTAkEPEe8ZSBfgAuhLSkbnACbBibZ 2vhm69vqndUigBcml2Qrd1Y= =Anx5 -----END PGP SIGNATURE----- ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]