>From: owner-openssl-...@openssl.org On Behalf Of Thirumal, Karthikeyan
>Sent: Monday, 17 December, 2012 13:12

I don't believe this belongs on -dev or -cvs.

>We added the OpenSSL to our TCP Windows application, for Client - 
>Server communication.

>Looks like few machines are not able to access the application, 
>and below is the error. 

>The revocation function was unable to check revocation for the certificate.
>
>The revocation function was unable to check revocation because the 
>revocation server was offline.

This error message does not occur anywhere in OpenSSL; is it in your 
application or maybe some middleware or extension added to OpenSSL?
(Auto-fetching a CRL, or trying to, is a reasonable thing to add.)

>Looks like they are stuck with CRL and they may be restricted without 
>Admin access and not able to download the CRL certs.

I've never seen Windows require Admin for network communication.
It can need firewall settings for particular communications (sources 
and destinations) and usually does since Vista at least. You might 
check if that's the problem and can be fixed; if so, enabling your 
normal CRL functionality -- which you imply works on other machines -- 
is likely easier than any other way and certainly is more consistent.

>But we tried to install few CRL certs on his machine,

>Certs installed : http://SVRIntl-G3-crl.verisign.com/SVRIntlG3.crl and 
>http://crl.verisign.com/pca3-g5.crl. But still that did not work out.

CRLs are NOT certs. They are both issued by a CA (more or less) and signed, 
but they are not the same thing.         

>Can someone shed some lights on this issue on installing which certs 
>could resolve this issue ? 

In what way did it "not work out"? Is your app using OpenSSL's default 
CRL lookup, in a directory commonly called something like CApath 
with filenames in the form issuerhash.r0 .r1 etc, or something else?
If the former did you install these CRLs that way? Do the certs you want 
verified match the CRL issuer(s) the CRLs you installed?

I presume your app or middleware is already setting verifyparam 
F_CRL_CHECK (or _ALL) somewhere, and/or you or middleware put this 
into a verify callback, as by default OpenSSL doesn't check CRLs.
         
>P.S., I cannot bypass the CRL download as it is a security flaw.

I hope you mean you cannot bypass the CRL *check*. The way a CRL is 
obtained, by direct download or other distribution, does not matter 
to security, as long you end up checking the correct current CRL.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to