Re: CRL signature verification

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



➢ I used libcrypto to parse out the OCSP URL from the certificate validate
    it against a whitelist of valid OCSP URLs, send an OCSP request and
    validate the response and its signature against a custom certificate
    store, and then parse out the result.
    
    Two points on that:
➢     - This seems like something that should be in libcrypto rather than in
    my own code. Did I miss something obvious?

We generally don’t do any kind of network traffic (except SSL) and would rather leave that up to the application.  Especially because there are all sorts of other frameworks, blocking issues, DNS, etc., that make things a non-simple matter.

➢     - Currently I don't fall back to CRLs when the OCSP server is
    unavailable. I would like to do so; however, I can't figure out how to
    validate the signature on a CRL (which would be a pretty obvious
    failure). Alternatively, is there an obvious alternative thing that I
    should be doing, rather than manually parsing the CRL?
  
X509_CRL_verify.  And yes, looking through to find the serial# is what you have to do.

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux