[caops-wg] OCSP - proxy certs

Jesus Luna jluna at ac.upc.edu
Thu Jun 2 11:57:14 CDT 2005


Mike Helm wrote:

>Olle Mulmo writes:
>  
>
>>I would say that your responder got confused up by the proxy certs. 
>>Possbily also that that it is one of the responders that cannot handle 
>>multi-certificate requests (array count > 1).
>>    
>>
>
>I think (guess) it is more likely the latter, but don't know.
>I will try to rig up some kind of test that can see what 
>our demo OCSP responder can do with a couple chained CA's
>and an EE cert (probably as close as ESnet can get rite now).
>
>I think what we should do is request developers of client and
>OCSP server code support properly parsed multiple cert
>OCSP requests but recommend against using them.  This sounds 
>ridiculous but until we fully understand how the commercial
>servers work...
>  
>
About this point we would like to tell you about our practical 
experience obtained  with the implementation of OCSP (CertiVeR API) into 
GT4:
-First of all RFC2560 defines a request structure containing a 
"requestList" element, in other words any OCSP Provider compliant with 
such recommendation should provide this support.
-Our OCSP client library parses each certificate from the Proxy´s chain 
as "Request" elements of such "requestList", which means that it is 
client's responsability to obtain such chain (which in fact is provided 
by GT4 APIs ie when initializing a Proxy).
-When the OCSP Responder parses the "requestList" it will obtain the 
"CertStatus" for each contained certificate as follows: i) From the Root 
to the EEC it will respond with any of the good, revoked or unknown 
statuses,  ii) for any ProxyCertificate contained it will never respond 
a "good" status just because it would be very expensive to register 
every Proxy Certificate into the CA. However any standard Responder may 
generate an "unknown" status.
-When the client library receives the OCSP Response and parses each of 
the "SingleResponse" structures it will conclude that a Proxy 
Certificate is revoked if its "CertStatus" has such value, otherwise it 
will be considered as Valid.

The process described above could be implemented with any RFC2560 
compliant OCSP Provider and will consider a Proxy Certificate as Revoked 
if any certificate from the EEC to the correspondent CA has been 
revoked. However further support for fine-grain Proxy Certificates 
revocation could be developed just as we have done with CertiVeR:
-When a subject wants to delete a Proxy Certificate before ending its 
Validity Period (i.e. executing a grid-proxy-destroy) then it notifies 
the revocation of such certificate to CertiVeR.
-CertiVeR authorizes the Revocation Request (Proxy's Unique Name feature 
eases such AuthZ) and registers corresponding revocation data 
(issuerKeyHash, issuerDNHash and Serial) into its database (for a 
description of CertiVeR revocation model take a look at www.certiver.com).
-From now on CertiVeR will able to respond with a final "Revoked" status 
for such Proxy Certificate, thus allowing a fine-grain revocation..

Best regards,

-- 

____________________
Jesus Luna Garcia
PhD Student. Polytechnic University of Catalonia
Barcelona, Spain
jluna at ac.upc.edu 





More information about the caops-wg mailing list