Thank You sooo much Kyle and Tomas, Another question. I have a Linux machine that is running openssl 0.9.8g. It looks like it uses CRL Version 1 ? Is this correct ? Is there a way to force my openssl 0.9.8g to use CRL version 2 ???
In my network system, I have a Linux machine that has its own certificate, and we have an external EJBCA server that we use to revoke certificates and generate CRLs. The EJBCA supports CRLs per RFC 5280, which supposedly means that it supports X.509 version 2 CRLs ? When we revoke the Linux machine's certificate on the EJBCA server, successfully download the CRL from the EJBCA server onto my Linux machine, {even though the serial number of the Linux machine's certificate appears in the downloaded CRL file}, my Linux machine doesn't seem to be affected by the CRL at all :-( I made sure the openssl.cnf file points to the downloaded CRL file, and no effect whatsoever ! Now, when I generate self-signed certificates on the Linux machine, and I also generate corresponding CRL using openssl commands, this method does seem to work, in the sense that the revoked certificate is no longer usable. I compared the CRLs in the self-sgned case compared to the CRLs generated by the EJBCA. The self-signed CRL was version 1, and the EJBCA generated CRL was version 2. Is there any obvious reason why openssl0.9.8g, which seems to run with CRL Version 1, doesn't seem to work with a downloaded CRL that happens to be version 2 CRL ? Again, is there a way to force openssl 0.9.8g to work with version 2 CRLs ? Please help. Thanks a bunch in advance... -----Original Message----- From: Tomas Gustavsson [mailto:tom...@primekey.se] Sent: Monday, September 27, 2010 3:27 AM To: openssl-users@openssl.org Cc: Hasan Rezaul-CHR010 Subject: Re: Signed Certificates and Revoking the Certs with CRLs Why no try the open source PKI book as a starter... http://ospkibook.sourceforge.net/docs/OSPKI-2.4.7/OSPKI-html/ospki-book.htm Cheers, Tomas -----Original Message----- From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Kyle Hamilton Sent: Saturday, September 25, 2010 12:11 AM To: openssl-users@openssl.org Subject: Re: Signed Certificates and Revoking the Certs with CRLs Well, here's the overview: The CRL is a mechanism used by the attesting entity (the CA) to change the validity status of a previously-issued certificate (digitally-provable statement of authority by a particular named entity, i.e. the CA). The certificate, which is best viewed as a record of the act of certifying, is a mathematically-hard transformation of the output of a (universally) lossy compression algorithm over a particular form and style of data structure, and the data structure itself. The function of the data structure is to assert the ownership of a secret number, as witnessed by the ability to perform transformations with the counterpart public number which is included in the data structure. The purpose is to "strongly bind" the legal identity of the entity applying for the certificate and the public half of an asymmetric keypair (the private key of which is kept private, but evidence of its possession and ability to perform the trapdoor operation is provided). In order to create this, under X.509 there must be a trusted entity (the certifier) whose credential is predistributed in some manner to all systems that will need to rely on the identity claims it makes. (X.509 is limited in two fatal (in my opinion) ways: First, everything is reliant on the Distinguished Name... which isn't distinguished enough to individually distinguish between all entities. Attributes are asserted as relating to a particular DN, not a particular key. Second, it relies on the concept of a single attestor, a single Source of Authority -- when nothing in the Real World can rely upon any single identity document to open an account, it's ludicrous to believe that banks or merchants would accept the single word of a CA as to the identity provided. This causes problems not only for the customer side, but also for the business side: if the Authority that the business chooses to attest to its identity suddenly becomes untrusted, then there is no help but a manual intervention that involves an entire assurance of identity with another CA. No wonder most places choose to go with domain-validated certificates. :( ) To generate keys and obtain certificates, every browser except IE appears to support the old Netscape <keygen> HTML tag, which creates and puts into a form submission what's called a SPKAC (Signed Public Key And Challenge) to the CA, and the CA may either return a signed certificate immediately, turn down the submission immediately, or hold the submission for manual intervention. The CA is *solely* responsible for what shows up in the certificate. (Best current practice seems to be, the CA drops everything that comes in the same structure (SPKAC or CSR), and generates its own data structure with what it knows to be true, and taking only your public key from the structure you submit after verifying the signature. These certificates have an expiration date, after which they are no longer useful. (i.e., the CA's policy may say something like "the private key to any certified public key cannot be in use for more than 24 months before being retired, because we won't accept the risk of it being completely fatigued after that time".) The CRL is one of two standardized mechanisms that the CA has to promulgate the fact that a certificate's status is in abeyance. (The other is OCSP.) For this to work, the end system must update its local copy of the CRL before it can put any trust in it. It is important to note that OpenSSL does not provide a means to *retrieve* CRLs (it doesn't have an HTTP client implementation), but it does provide a mechanism to *use* CRLs that have already been retrieved. (Usually, I use 'curl' or 'wget' to retrieve CRLs that I need to verify against in scripts.) Notably, the name "Certificate Revocation List" is a bit of a misnomer. It is legitimate for a CA to put a certificate in abeyance, and then at some later point decide that the certificate is actually valid and remove the certificate in question from the CRL, thus indicating that the certificate is in fact good. It's more of a "Certificate Status List". (This is at least partly because of necessity -- the EU's Qualified Certificates are invalid until they are "accepted by the subscriber". Thus, the Partial CRL profile has a specific bit named: "removeFromCrl". For a good place to learn more about how this is supposed to work, I would recommend reading RFC 5280 (OpenSSL doesn't claim conformance to this version, but it's the latest standard for the Internet PKI and explains what the various standardized certifiate extensions mean, as well as describing the CRL processing algorithm). For a very good place to learn about how to implement this with OpenSSL, I would recommend Carillon's excellent "How to set up an OpenSSL TEST CA for interoperability with CertiPath" document, available at http://www.carillon.ca/library/openssl_testca_howto_1.3.pdf . Also, it's a bit dated, but _Network Security with OpenSSL_ by John Viega, Matt Messier, and Pravir Chandra (O'Reilly and Associates 2002) is still a good reference. There are some very deep flaws in how the revocation processing is handled according to the RFC, most notably that the CRL location is in the end-entity certificate, not in the CA certificate. If a valid X.509-formatted 2nd preimage can be found that has the same hash as the valid certificate, and the signature on the valid one then applied to the invalid one, the signature will verify on the alternative content. This means that certificate processing *must* be hardened against content-based attacks, because it only takes one failure to compromise the system. (The MD5 hash algorithm was found to be weak enough that such an attack was successfully mounted in 2009. This isn't idle and paranoid speculation, this is a known and demonstrated weakness.) I hope this helps! -Kyle H On Fri, Sep 24, 2010 at 1:13 PM, Hasan Rezaul-CHR010 <chr...@motorola.com> wrote: > Hi All, > > Would anyone kindly point me to literature that CLEARLY explains > exactly > how: > > Certificates and CRLs may be used in conjunction such that certificate > CSRs are generated, signed by an authority, then signed certs > downloaded and being used on a system. > > At a later time, the certificate is revoked in the CRL, the CRL.pem > file is downloaded on the system, and then the corresponding cert > becomes unusable due to its mention in the CRL. > > Is there a good place for me to educate myself on this whole > mechanism, and a place where it shows exactly how to implement all > this with examples... Oh I am running on Linux, with openssl 0.9.8g. > > Thanks a bunch in advance. > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List openssl-us...@openssl.org > Automated List Manager majord...@openssl.org > ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org