o use SHA1withRSA signature algorithm
> if the certificate is signed by this algorithm?
>
> [1] https://tools.ietf.org/html/rfc6960#section-4.4.7.2
>
> On Sat, Jul 4, 2020 at 12:18 AM John Jiang
> wrote:
>
>> Hi,
>> I'm using OpenSSL 1.1.1.
>>
>> Can I c
, Jul 4, 2020 at 12:18 AM John Jiang wrote:
> Hi,
> I'm using OpenSSL 1.1.1.
>
> Can I configure the OCSP response signature algorithm?
> For a RSA issuer, it looks SHA256withRSA always be selected.
>
> PreferredSignatureAlgorithms extension in OCSP request may affect t
unsubscribe openssl-users
From: openssl-users On Behalf Of John Jiang
Sent: Friday, July 3, 2020 12:19 PM
To: openssl-users
Subject: OCSP response signature algorithm
Hi,
I'm using OpenSSL 1.1.1.
Can I configure the OCSP response signature algorithm?
For a RSA issuer, it
Hi,
I'm using OpenSSL 1.1.1.
Can I configure the OCSP response signature algorithm?
For a RSA issuer, it looks SHA256withRSA always be selected.
PreferredSignatureAlgorithms extension in OCSP request may affect this
algorithm in OpenSSL OCSP response. However, I prefer to use configur
Thanks again Rich. If anyone else has any ideas please share.
From: "Salz, Rich"
Date: Tuesday, December 4, 2018 at 12:56 PM
To: "anipa...@cisco.com" , "openssl-users@openssl.org"
Subject: Re: [openssl-users] OCSP response signed by self-signed trusted
respond
Perhaps you can build a trust store to handle your needs. I am not sure.
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
ion of OCSP responses, is this not what this trust setting is for?
Thanks,
Animesh
From: "Salz, Rich"
Date: Tuesday, December 4, 2018 at 12:39 PM
To: "anipa...@cisco.com" , "openssl-users@openssl.org"
Subject: Re: [openssl-users] OCSP response signed by self-signe
The responder isn’t supposed to be self-signed. It’s supposed to be signed by
the CA issuing the certs. That way you know that the CA “trusts” the responder.
Now, having said that, what you want to do is reasonable – think of it as “out
of band” trust. You will probably have to modify the sou
Have a question with implementing an OCSP requestor that can handle validating
an OCSP response that is not signed by the CA who issued the certificate that
we are requesting the OCSP status for but rather, the OCSP response is signed
by a self-signed trusted responder that includes the OCSP
> Hello,
>
> I've been developing some broadcast apps signing logic on a TV.
>
> Actually, I should receive and verify the signing information such as
> certificates and ocsp responses which are included in CMS signed data
> format.
> These application data are sent to TV with certain frequency wit
First, I know the caveat about ONLY use the OpenSSL OCSP Server for test
purposes. With that out of the way.
Is there any known plan on the horizon, when using the ocsp server, to allow
the OCSP response to be signed using the RSASSA-PSS signature algorithm?
Thanks for any and all
On 12/09/2017 15:56, Robert Moskowitz wrote:
On 09/12/2017 09:38 AM, Robert Moskowitz wrote:
On 09/12/2017 09:09 AM, Dr. Stephen Henson wrote:
On Mon, Sep 11, 2017, Robert Moskowitz wrote:
I would actually really like to have a SIMPLE OCSP responder. But
so far have not found one. freeI
On 09/12/2017 09:38 AM, Robert Moskowitz wrote:
On 09/12/2017 09:09 AM, Dr. Stephen Henson wrote:
On Mon, Sep 11, 2017, Robert Moskowitz wrote:
I would actually really like to have a SIMPLE OCSP responder. But
so far have not found one. freeIPA has one buried within it, but
that is too d
On 09/12/2017 09:09 AM, Dr. Stephen Henson wrote:
On Mon, Sep 11, 2017, Robert Moskowitz wrote:
I would actually really like to have a SIMPLE OCSP responder. But
so far have not found one. freeIPA has one buried within it, but
that is too disruptive to install unless you buy into freeIPA.
On Mon, Sep 11, 2017, Robert Moskowitz wrote:
>
> I would actually really like to have a SIMPLE OCSP responder. But
> so far have not found one. freeIPA has one buried within it, but
> that is too disruptive to install unless you buy into freeIPA.
>
Well the OpenSSL ocsp respoder isn't much u
On 09/11/2017 12:23 PM, Salz, Rich via openssl-users wrote:
Ah, put -sha256 in the CLIENT request. Seems kind of backward. Or at
least the server should have some control over the hash used?
Well, it is the client that is making the request, so therefore the client
n
Ah, put -sha256 in the CLIENT request. Seems kind of backward. Or at
least the server should have some control over the hash used?
Well, it is the client that is making the request, so therefore the client
needs to hash the cert information.
A production-quality OCSP respo
isted in the -help:
-rmd valDigest Algorithm to use in signature of OCSP
response
but not in the man page.
Ah, put -sha256 in the CLIENT request. Seems kind of backward. Or at
least the server should have some control over the hash used?
thanks
Bob
--
openssl-users ma
On Fri, Sep 08, 2017, Robert Moskowitz wrote:
> I am using the test responder:
>
>openssl ocsp -port 2560 -text -rmd sha256\
> -index index.txt \
> -CA certs/ca-chain.cert.pem \
> -rkey private/$ocspurl.key.pem \
> -rsigner certs/$ocspurl.cert.pem \
>
comes right after the line:
Certificate ID:
openssl ocsp -CAfile certs/ca-chain.cert.pem \
-url http://127.0.0.1:2560 -resp_text \
-issuer certs/8021ARintermediate.cert.pem \
-cert certs/$targetcert.cert.pem
OCSP Response Data:
OCSP Response Status: successful
Please, send mesaage!
--
View this message in context:
http://openssl.6102.n7.nabble.com/Certificate-Transparency-OCSP-response-tp66295p66328.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman
I want to test all 3 types of CT. I know how to implement two: TLS extension
& X.509 extension. But how to implement OCSP response? I can add response
file, but how to change OID?
--
View this message in context:
http://openssl.6102.n7.nabble.com/Certificate-Transparency-OCSP-response-tp6
On 28/10/2015 10:24, M K Saravanan wrote:
Hi,
Upon checking the wireshark capture, I found the OCSP response does not send
signer cert, but only the responderID (byKey).
In such scenario, where do I find the OCSP response signer cert?
Clarifying my own question.
https://tools.ietf.org/html
Hi,
> Upon checking the wireshark capture, I found the OCSP response does not send
> signer cert, but only the responderID (byKey).
>
> In such scenario, where do I find the OCSP response signer cert?
Clarifying my own question.
https://tools.ietf.org/html/rfc6960#section-
Hi,
If the OCSP responder does not send the response signer certificate in the
OCSP response, then how can we find the signer certificate?
I was doing a simple test to verify google certificate via OCSP like this:
$ openssl ocsp -issuer ./www.google.com.sg-issuer.cer -CAfile ./ca.cer
-cert
Hi,
I am using openSSL OCSP utility as server.
Whenever I do a blocking TCP connect to establish TCP connection with
openSSL OCSP utility and then send OCSP request , openSSL OCSP utility
sending a OCSP response.
But when I do a non blocking TCP connect make sure that OCSP request is
written
On 5/03/2013 10:56 PM, Dr. Stephen Henson wrote:
> On Tue, Mar 05, 2013, Geoff Swan wrote:
>
>> Hi,
>>
>> I have an ocsp response in memory. The response may contain 1 or more
>> (probably about 20) ocsp responses for certificates based on the same
>> issuer
Hi,
I have an ocsp response in memory. The response may contain 1 or more
(probably about 20) ocsp responses for certificates based on teh same
issuer name and issuer key.
I need to locate the response that is relevant for the certificate of
interest. Is the usual method to parse each response
> I need to locate the response that is relevant for the certificate of
> interest Is the usual method
> to parse each response and match the cert serial number to find the index to
> the correct ocsp response?
Yes.
--
Principal Security Engineer
Akamai Technology
C
On Tue, Mar 05, 2013, Geoff Swan wrote:
> Hi,
>
> I have an ocsp response in memory. The response may contain 1 or more
> (probably about 20) ocsp responses for certificates based on the same
> issuer name and issuer key.
>
> I need to locate the response that is relevant f
Hi,
I have an ocsp response in memory. The response may contain 1 or more
(probably about 20) ocsp responses for certificates based on the same
issuer name and issuer key.
I need to locate the response that is relevant for the certificate of
interest. Is the usual method to parse each response
(1.3.6.1.5.5.7.16.2)
otherRevInfo: SEQUENCE:
0:d=0 hl=4 l=1079 cons: SEQUENCE
4:d=1 hl=2 l= 1 prim: ENUMERATED:00
7:d=1 hl=4 l=1072 cons: cont [ 0 ]
11:d=2 hl=4 l=1068 cons: SEQUENCE
15:d=3 hl=2 l= 9 prim: OBJECT:Basic OCSP Response
---
I
On Thu, Sep 22, 2011, Gabriel Marques wrote:
> Thanks Steve and Erwann,
>
> Putting the OCSP response inside a tagged object did the job for
> OpenSSL recognizing the OtherRevocationInfoFormat.
> BouncyCastle also changed the CMS version to 5 automatically when I
> did it, an
Thanks Steve and Erwann,
Putting the OCSP response inside a tagged object did the job for OpenSSL
recognizing the OtherRevocationInfoFormat.
BouncyCastle also changed the CMS version to 5 automatically when I did
it, and I've changed the OID to the proper one (id-ri-ocsp-response).
Le 22/09/2011 16:10, Dr. Stephen Henson a écrit :
On Thu, Sep 22, 2011, Erwann Abalea wrote:
[...]
In your examples, you set version to 3.
Based on your parsed example, it seems you correctly set the tag
([1]) for the "crls" element, but you didn't use the good encoding
for the "other" field (
On Thu, Sep 22, 2011, Erwann Abalea wrote:
> Le 21/09/2011 21:20, Gabriel Marques a écrit :
> >I'm developing a tool for signing digital TV apps, and one of the
> >goals was to embed OCSP responses into the CMS signature file of
> >the application.
> >The idea is that the broadcaster equipment wou
Le 21/09/2011 21:20, Gabriel Marques a écrit :
I'm developing a tool for signing digital TV apps, and one of the
goals was to embed OCSP responses into the CMS signature file of the
application.
The idea is that the broadcaster equipment would query the OCSP and
update the response with certain
On Wed, Sep 21, 2011, Gabriel Marques wrote:
> I'm developing a tool for signing digital TV apps, and one of the
> goals was to embed OCSP responses into the CMS signature file of the
> application.
> The idea is that the broadcaster equipment would query the OCSP and
> update t
SET(1 elem) //folded - CMS
signer info
SEQUENCE(2 elem) //Modified CMS structure with an embedded
OCSP response - OpenSSL don't like it
OBJECT IDENTIFIER1.2.840.113549.1.7.2 //signedData PKCS #7
[0](1) //SignedData
Hi all,
I'm writing a program to check a certificate with OCSP in C++.
I'm doing all in the same way as in ocsp.c from the OpenSSL-App, but I get no
useful return from
OCSP_RESPONSE* pOCSPResponse = NULL;
nRet = OCSP_sendreq_nbio( &pOCSPResponse, pOCSPContext );
nRet is 0 and pO
Hi all,
I'm writing a program to check a certificate with OCSP in C++.
I'm doing all in the same way as in ocsp.c from the OpenSSL-App, but I get no
useful return from
OCSP_RESPONSE* pOCSPResponse = NULL;
nRet = OCSP_sendreq_nbio( &pOCSPResponse, pOCSPContext );
nRet is 0 and pO
On Wed, Mar 24, 2010 at 4:46 AM, Dr. Stephen Henson wrote:
> The path of the responder certificate has to be validated so you need to pass
> the root CA using the -CAfile or -CApath command line arguments.
adding -CAfile did the trick -- adding it to BOTH the server-launch
cmd, AND the client-que
t
>
> i get what seems to be a "successful" response of "good" CertStatus,
>
> OCSP Response Data:
> OCSP Response Status: successful (0x0)
> Response Type: Basic OCSP Response
> Version: 1 (0x0)
> Responder Id: DC = Auth, DC = testdomain,
testing an ocsp query to a local openssl ocsp 'server',
openssl ocsp \
-issuer /svr/demoCA/certs/CA/CA.cert.pem \
-cert /svr/demoCA/certs/domains/testdomain.cert.pem \
-url http://localhost: \
-resp_text
i get what seems to be a "successful" response of "good&qu
Done that. It now seems to work! Thank you :)
S999D003:/home/ah/test # ./openssl ocsp -respin response-2.der -text
OCSP Response Data:
OCSP Response Status: successful (0x0)
Response Type: Basic OCSP Response
Version: 1 (0x0)
Responder Id: C = DE, O = D-Trust GmbH, CN = D-TRUST
On Fri, Mar 12, 2010, Michel Pittelkow - michael-wessel.de wrote:
> Ah! That's exactly the point, where I tried to edit the code and recompile
> it. But every time I tried to I became an error in make complaining about
> [link_app.] and a false call of 'main' in _start...
>
> Can I just replace
Ah! That's exactly the point, where I tried to edit the code and recompile it.
But every time I tried to I became an error in make complaining about
[link_app.] and a false call of 'main' in _start...
Can I just replace the file and recompile openssl? Or do I have to edit
something in any type
On Fri, Mar 12, 2010, Michel Pittelkow - michael-wessel.de wrote:
> I forgot to write, which versions are used.
> For the client we are using 0.9.8L. But we also tested with M.
> We are not sure about the responders but we are trying to find out.
>
Oops, there was a bug in the print routine whic
I forgot to write, which versions are used.
For the client we are using 0.9.8L. But we also tested with M.
We are not sure about the responders but we are trying to find out.
Kind regards
Michel Pittelkow
> Hi everyone,
>
> we are currently trying to verify an ocsp response.
> T
Sure! Here are the request and response files.
Kind regards
Michel Pittelkow
> Hi everyone,
>
> we are currently trying to verify an ocsp response.
> The return is "Response verify OK" but we need to verify the signature
> algorithm of the response signature.
> W
On Fri, Mar 12, 2010, Michel Pittelkow - michael-wessel.de wrote:
> Hi everyone,
>
> we are currently trying to verify an ocsp response.
> The return is "Response verify OK" but we need to verify the signature
> algorithm of the response signature.
> We tried putt
Hi everyone,
we are currently trying to verify an ocsp response.
The return is "Response verify OK" but we need to verify the signature
algorithm of the response signature.
We tried putting the response into an DER and parsing it. But still no
information about the signature.
Dear list,
another update - we got it.
[Fri Jul 10 10:28:39 2009] [error] [client 172.30.64.154] MWDE/nm: OCSP
response line unstripped: HTTP/1.1 200 OK
[Fri Jul 10 10:28:39 2009] [debug] ssl_util_ocsp.c(217): [client 172.30.64.154]
OCSP response header: Date: Fri, 10 Jul 2009 09:29:06 GMT
st to OCSP responder
[Tue Jul 07 14:32:25 2009] [debug] ssl_util_ocsp.c(208): [client 10.200.48.140]
OCSP response header: Date: Tue, 07 Jul 2009 13:32:52 GMT
[Tue Jul 07 14:32:25 2009] [debug] ssl_util_ocsp.c(208): [client 10.200.48.140]
OCSP response header: Server: Apache-Coyote/1.1
[Tue Jul 07 14:
]
sending request to OCSP responder
[Tue Jul 07 13:57:40 2009] [debug] ssl_util_ocsp.c(208): [client 10.200.48.140]
OCSP response header: Date: Tue, 07 Jul 2009 12:58:07 GMT
[Tue Jul 07 13:57:40 2009] [debug] ssl_util_ocsp.c(208): [client 10.200.48.140]
OCSP response header: Server: Apache-Coyote/1.1
including online OCSP request. OCSP uri is correct,
> response is received, but then:
>
> [Fri Jul 03 12:37:27 2009] [debug] ssl_util_ocsp.c(104): [client
> 172.30.64.154] sending request to OCSP responder
> [Fri Jul 03 12:37:27 2009] [debug] ssl_util_ocsp.c(208): [client
> 172.30.
2009] [debug] ssl_util_ocsp.c(104): [client 172.30.64.154]
sending request to OCSP responder
[Fri Jul 03 12:37:27 2009] [debug] ssl_util_ocsp.c(208): [client 172.30.64.154]
OCSP response header: Date: Fri, 03 Jul 2009 11:37:54 GMT
[Fri Jul 03 12:37:27 2009] [debug] ssl_util_ocsp.c(208): [client
21:38 2008 GMT
Next Update: Jun 9 17:21:38 2008 GMT
Does this mean that the OCSP response is good?
How can I get the root CA error resolved? I wasn't sure if the CA and
the issuer should be the same in this case? The file I was using is a
bundle file intermediate and root
e request (with
nonce) from my end is now DER encoded.
Regards,
Simon McMahon
Simon McMahon/Australia/Contr/[EMAIL PROTECTED]
Sent by: [EMAIL PROTECTED]
01/10/2007 12:56 PM
Please respond to
openssl-users@openssl.org
To
openssl-users@openssl.org
cc
Subject
OCSP response nonce extension e
Hi,
Just saw some weirdness in OCSP response encodings with a nonce extension.
The OCSP response has this for the extensions:
A1 1E
30 1C
30 1A
06 09 2B 06 01 05 05 07 30 01 02
01 01 00 <---
04 0A 04 08 A5 10 18 67 E5 A4 8B 2C
The sencond last item is the 'false
:49 AM
To: openssl-users@openssl.org
Subject: ocsp response validation problem
Hi,
0.9.8b
I'm doing some OCSP testing and I had a little confusion with OCSP
response validation.
If you leave out -CAfile on the request then the validation fails even
in the simple case where the CA is the sa
Hi,
0.9.8b
I'm doing some OCSP testing and I had a little confusion with OCSP
response validation.
If you leave out -CAfile on the request then the validation fails even in
the simple case where the CA is the same as the issuer.
The examples in the ocsp(1) doc should include a request
On Mon, Jun 05, 2006, Stefan Vatev wrote:
> What I want is only the nonce, not the whole ASN1 structure.
> I don't know which is the best way to parse it.
>
>
> First, I get the X509_EXTENSION from the OCSP_RESPONSE
>
> bs = OCSP_response_get1_basic(response)
>
> resp_idx = OCSP_BASICRESP_get_
What I want is only the nonce, not the whole ASN1 structure.
I don't know which is the best way to parse it.
First, I get the X509_EXTENSION from the OCSP_RESPONSE
bs = OCSP_response_get1_basic(response)
resp_idx = OCSP_BASICRESP_get_ext_by_NID(bs,
NID_id_pkix_OCSP_Nonce, -1)
resp_ext = OCSP_B
EMAIL PROTECTED] För Dr. Stephen Henson
Skickat: den 25 februari 2005 21:05
Till: openssl-users@openssl.org
Ämne: Re: Signature verification of OCSP Response
The problem is indeed due to a mismatch when the reponse is reencoded.
However it looks like the encoding of CertStatus is invalid:
CertS
On Fri, Feb 25, 2005, John Allberg wrote:
> Hi!
>
> We're developing a OCSP Responder. During interop testing it was discovered
> that openssl verifies the signature on the response nicely when the
> certificate is reported as revoked, but fails to verify the signature when
> the certificate is r
Hi!
We're developing a OCSP Responder. During interop testing it was discovered
that openssl verifies the signature on the response nicely when the
certificate is reported as revoked, but fails to verify the signature when
the certificate is reported as valid.
I've tested the signature in Ascerti
Hi,
I am trying to verify an OCSP Response using
OpenSSL 0.9.7d but is failing. The error I get is:
OpenSSL> ocsp -respin asce_response.dat
-VAfile ResponderCert.cerResponse Verify Failure2540:error:0407006A:rsa
routines:RSA_padding_check_PKCS1_type_1:block type is no t
01:.\crypto\
On Wed, Jun 23, 2004, Christian Weber wrote:
> OK, the previous answer was pretty fast - thank you.
>
> Now there´s another stupid question: why does the command
>
> >openssl ocsp -respin ocsp.resp -CAfile CAs.pem
>
> lead to
>
> >Response Verify Failure
> >19961:error:27069070:OCSP routines:O
OK, the previous answer was pretty fast - thank you.
Now there´s another stupid question: why does the command
openssl ocsp -respin ocsp.resp -CAfile CAs.pem
lead to
Response Verify Failure
19961:error:27069070:OCSP routines:OCSP_basic_verify:root ca not
trusted:ocsp_vfy.c:148:
though the correct
(B
(B
(BHi,all
(B
(BI would like to test my OCSP client.
(BI noticed that when getting a response, the responder ID in the OCSP
(Bresponse can be presented by name or key hash.
(BIf I use OpenSSL as the responder , can the OpenSSL provides the response
(Bwith the responder ID in Key ha
(B
(B
(BHi,all
(B I am studying using OpenSSL to verify an OCSP response
(Bsigned by a delegated signer.
(BI know , there should be OCSPSigning OID in the certificate of the
(Bdelegated OCSP response signer.
(BBut , how can I judge it from the X509 structure?
(B
(BThat is to say
t: Monday, June 02, 2003 8:37
PM
Subject: Re: About finding OCSP
response signer
On Mon, Jun 02, 2003, Wu Junwei wrote:>
Hi,Steve,> > Thanks for your kindly answer.>
> But, I am still not very clear.> > In my
understinding> > I think responder may be
On Mon, Jun 02, 2003, Wu Junwei wrote:
> Hi,Steve,
>
> Thanks for your kindly answer.
>
> But, I am still not very clear.
>
> In my understinding
>
> I think responder may be not the signer of the reponse because the CA of
> the certificate in question can sign the response itself.
>
> The
What step do you think in my understanding is wrong
or not totally correct?
Thanks,
wjw
- Original Message -
From:
Dr. Stephen
Henson
To: [EMAIL PROTECTED]
Sent: Friday, May 30, 2003 8:47
PM
Subject: Re: About finding OCSP
response signer
On Fri, May 30
(B
(B
(BHi,
(B I am studying the verifying of the OCSP response.
(B
(BI find that the function OCSP_basic_verify() in ocsp_vfy.c can do this
(Bjob.
(BIt is mainly devided into 2 parts.
(B
(B1, to use the public key of the response signer to verify the basic
(Bresponse
(B2, to
Hi All,
Here at foot a response from my OCSP Responder.
I would like to know if it sufficient answer from the validator
or are there anything missing... e.g. some extensions:
#---
OCSP Response Data:
OCSP Response Status: successful (0x0
Hi All,
Here at foot a response from my OCSP Responder.
I would like to know if it sufficient answer from the validator
or are there anything missing... e.g. some extensions:
#---
OCSP Response Data:
OCSP Response Status: successful (0x0
78 matches
Mail list logo