On Wed, Mar 24, 2010, Rob Stradling wrote:

> On Tuesday 23 March 2010 18:40:58 Dr. Stephen Henson wrote:
> > On Tue, Mar 23, 2010, Eisenacher, Patrick wrote:
> > > Hi Steve,
> > >
> > > > -----Original Message-----
> > > > From: Dr. Stephen Henson
> > > >
> > > > There are two automatic trust models for OCSP responder
> > > > certificates. One is the CA key that signed the
> > > > certificate also signs responses: that isn't
> > > > recommended for security reasons.
> > >
> > > can you please elaborate on this?
> > 
> > Well it would typically require giving a public responder access to a CA
> >  key: increasing the risk of compromise especially if the private key
> >  itself is placed on the server.
> 
> Steve, I think it's entirely unfair to label the non-delegated model as "not 
> recommended for security reasons" just because *some implementations* might 
> give "a public responder access to a CA key".
> 
> Non-delegated OCSP Responses can be pre-produced (RFC 2560 section 2.5) by 
> the 
> CA without increasing the risk of compromise of the CA's private key.  
> Although RFC 2560 recognises that pre-produced and/or nonce-less OCSP 
> Responses are vulnerable to replay attacks, RFC 5019 recognises that the 
> "scalability issues inherent when using OCSP in large scale (high volume) 
> Public Key Infrastructure (PKI) environments" can mean that pre-produced 
> and/or nonce-less OCSP Responses are sensible and sometimes necessary.
> 

Yes sorry I should've qualified that statement. I was attempting to keep this
simple and that always includes the risk of oversimplification.

> > In the delegated model only a dedicate OCSP signing key is needed on the
> > responder.
> 
> Whilst this is obviously preferable to placing a CA private key on the 
> responder, I'm tempted to suggest that it's "not recommended for security 
> reasons".  Why?  Because *some implementations* use OCSP Signing certificates 
> that include the "id-pkix-ocsp-nocheck" extension, and RFC 2560 points out 
> that "CAs issuing such a certificate should realized (sic) that a compromise 
> of the responder's key, is as serious as the compromise of a CA key used to 
> sign CRLs, at least for the validity period of this certificate."
> 
> In contrast, non-delegated pre-produced OCSP Responses require *zero* keys to 
> be placed on the responder, so there is never a need to worry about the 
> potential compromise of keys housed on the responder.
> 

Though of course the delegated trust model can also support pre-produced OCSP
responses.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to