Hi,

This issue also spurred me to think about a patch :) I don't think OpenSSL
should write a RFC 2560 noncompliant feature, however, an option  would be
to provide a warning explaining the issue better than current
"OCSP_basic_verify:root ca not trusted" and then optionally doing the extra
steps to verify up the chain.


--
Konrads Smelkovs
Applied IT sorcery.


On Wed, Mar 24, 2010 at 2:38 PM, Rob Stradling <rob.stradl...@comodo.com>wrote:

> On Wednesday 24 March 2010 12:01:51 you wrote:
> <snip>
> > > > Well it would typically require giving a public responder access to a
> > > > CA key: increasing the risk of compromise especially if the private
> key
> > > > itself is placed on the server.
> > >
> > > Steve, I think it's entirely unfair to label the non-delegated model as
> > > "not recommended for security reasons" just because *some
> > > implementations* might give "a public responder access to a CA key".
> <snip>
> > Yes sorry I should've qualified that statement. I was attempting to keep
> >  this simple and that always includes the risk of oversimplification.
>
> Steve, thanks for explaining.
>
> <snip>
> > Though of course the delegated trust model can also support pre-produced
> >  OCSP responses.
>
> That's true.
>
> By the way Steve, I'd like to propose a small change to "openssl ocsp" to
> support the non-delegated model more seamlessly.  I've always been
> surprised
> and slightly confused that you have to specify both "-issuer ca.pem" and "-
> VAfile ca.pem" to verify the signature on a non-delegated OCSP Response.
> Why doesn't "-issuer ca.pem" cause ca.pem to be treated as a candidate OCSP
> Response signer certificate?
>
> When, a couple of weeks ago, a colleague independently made the same
> observation and asked me that same question, it spurred me to write a
> patch.
>
> Would you be happy with this change in behaviour?  If so, I'll submit my
> patch
> to the Request Tracker.
>
> > Steve.
> > --
> > Dr Stephen N. Henson. OpenSSL project core developer.
> > Commercial tech support now available see: http://www.openssl.org
> > ______________________________________________________________________
> > OpenSSL Project                                 http://www.openssl.org
> > User Support Mailing List                    openssl-users@openssl.org
> > Automated List Manager                           majord...@openssl.org
>
> Rob Stradling
> Senior Research & Development Scientist
> C·O·M·O·D·O - Creating Trust Online
> Office Tel: +44.(0)1274.730505
> Office Fax: +44.(0)1274.730909
> www.comodo.com
>
> Comodo CA Limited, Registered in England No. 04058690
> Registered Office:
>  3rd Floor, 26 Office Village, Exchange Quay,
>  Trafford Road, Salford, Manchester M5 3EQ
>
> This e-mail and any files transmitted with it are confidential and intended
> solely for the use of the individual or entity to whom they are addressed.
> If you have received this email in error please notify the sender by
> replying
> to the e-mail containing this attachment. Replies to this email may be
> monitored by Comodo for operational or business reasons. Whilst every
> endeavour is taken to ensure that e-mails are free from viruses, no
> liability
> can be accepted and the recipient is requested to use their own virus
> checking
> software.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>

Reply via email to