Bonjour,

Answers inline.

--
Erwann ABALEA

Le 14/08/2012 19:03, adrien pisarz a écrit :
Hi,

I have several questions about the ocsp functionnality. I read many articles before asking those questions and unfortunetaly I still don't have the answers. Maybe you can help me.

Fist of all, here is my ocsp configuration :
openssl ocsp -index index_prod.txt -CAfile OpCA.pem -rsigner ocsp.crt -rkey ocsp.key -port 3456 -text -out /home/userocsp/ocsp_responder.log

The file index is populated by a self-made script,
the ocsp.crt (resp. key) is a certificate (resp. key) which contains the ocsp signature extensions
the OpCA.pem contains the subAC certificate

Here are my questions :
1. Why the ocsp client work only if the -VAFile is set and otherwise I got a signature error ? Is there a way to solve this issue ?

Maybe because the responder is not one of:
 - the CA that signed the certificate you're requesting the status on
- a designated responder directly signed by the CA that signed the certificate you're requesting the status on

Reread RFC2560. If you're instanciating the third possible responder type (trusted responder whose public key is trusted by the requester), then you obviously need to inform the client/requester. You didn't provide elements on who signed who, so that's just a guess.

2. If I wan manage several subAC should I open a port foreach subCA ?

With the command-line tool, yes. If you need to have more CAs, then you could probably try something more suited than the command-line tools. The command-line tool also doesn't respond to GET requests, only POST ones.

3. Why the ocsp responder requires that all the certificates (even the valide's one) must be present in the index.txt in order to provide a correct answer ? I was expected that openssl will check the certificate signature and if the serial is not present in the index.txt, it will answer good and not unknow.

Design choice. You're giving the responder a database, so it supposed to know *all* the certificates. OCSP can be based on CRLs (black-list), but that's not implemented by the tool. If that's what you want, you'll have to write your own.

4. As said, the openssl responder is working but a IHS server is not abble to validate his answer and I got those errors :
[...]
Does anyone know how to configure an IHS with an openssl ocsp responder ?

You may ask your provider for this, not OpenSSL.

Reply via email to