Re: ocsp-nocheck

2006-11-07 Thread Dr. Stephen Henson
s now :-) > When I use "extendedKeyUsage = OCSP Signing, OCSP No Check" > OpenSSL generates: > > X509v3 extensions: > X509v3 Basic Constraints: > CA:FALSE > X509v3 Extended Key Usage: > OCSP Signing,

Re: ocsp-nocheck

2006-11-07 Thread Simon McMahon
sions: X509v3 Basic Constraints: CA:FALSE X509v3 Extended Key Usage: OCSP Signing, id-pkix-ocsp-nocheck So I thought this was where it goes. I also know of at least one other pki implementation that makes this mistake. Thanks for clearing up how

Re: ocsp-nocheck

2006-11-07 Thread Dr. Stephen Henson
On Tue, Nov 07, 2006, Simon McMahon wrote: > Found it: extendedKeyUsage = OCSP Signing, OCSP No Check > does the trick. > Err no it doesn't it isn't part of EKU. > The RFC doesn't exactly make this clear that 'nocheck' is a part of > ExtendedKeyUsage but I guess that is not OpenSSL's prob

Re: ocsp-nocheck

2006-11-06 Thread Simon McMahon
Found it: extendedKeyUsage = OCSP Signing, OCSP No Check does the trick. The RFC doesn't exactly make this clear that 'nocheck' is a part of ExtendedKeyUsage but I guess that is not OpenSSL's problem. Thanks. __ OpenSSL Pr

ocsp-nocheck

2006-11-06 Thread Simon McMahon
Hi, >From rfc 2560: - A CA may specify that an OCSP client can trust a responder for the lifetime of the responder's certificate. The CA does so by including the extension id-pkix-ocsp-nocheck. This SHOULD be a non-critical extension. The value of the extension should be NUL