> From: owner-openssl-us...@openssl.org On Behalf Of nvharisha
> Sent: Tuesday, October 01, 2013 05:56


> I would like to understand how exactly CRL is used.
> 
> Means, lets say, we try to login using gmail.com in any browser. Now we
see
> certificates - We see Google Inc is the 1st level and it has a CRL which
is
> pointing to one URL.
> 
> I tried to enable wireshark and see if there is any communication, but in
> vain.
> I wanted to know how CRL will be handled?
> 
It (actually accounts.google.com) has cert with CRL Distribution Point
extension 
and also Authority Info Access extension containing OCSP.
The two browsers I have handy (Firefox 24, and IE 9 (on Vista)) both use
OCSP;
the former does about 6 requests and the latter about a dozen.

Generally a clever client will prefer OCSP to CRL given a choice, because it
is 
very likely to be more timely and likely to be cheaper to get and process.

> The reason I am asking is:
> We have a device which has Qt / webkit based browser on Linux. Now if I
> want
> enable OpenSSL, as a first and easiest step, compiled qt with "openSSL"
> libraries.
> 
OpenSSL's current support for revocation is spotty.
It will use an applicable CRL that you already have in your truststore, and
I think 
even multiple ones, but does not locate and fetch the needed one(s). 
It has functions to create OCSP requests and parse the responses, but does
not 
use them to do OCSP for the cert(s) in a chain it is validating. I've seen
hints 
that changes in this area are in development, but at the moment if you need
it 
I see no alternative to coding it yourself.



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to