An example of public key infrastructure with an offline root certificate authority on linux
-
Updated
Feb 7, 2020
An example of public key infrastructure with an offline root certificate authority on linux
OCSP Server for Google Cloud Certificate Service
A nestjs / nodejs and openssl based pki. Including an ocsp-responder, distrubution-server for CRLs and CRTs and some little extra gimmicks
A .NET facility to create an OCSP Responder. Written in C# under netstandard it has support for .NET Full and .NET Core
A simple CA server to create multiple intermediate CAs and generate certs, keystore, truststore with simple API
a caching ocsp proxy. It accepts ocsp requests from any client, e.g. an ssl-webserver, and forwards the request to the corresponding ocsp responders or returns the ocsp response from cache. Can be used to mitigate unreliable ocsp responders that are, as required by murphy's law, always down when needed.
Custom PKI generator (Based on OpenSSL) including Root-CA, Intermediate-CA, OCSP-Respnder and management of server/client certificates
Automatic OCSP, can cache responses and retrieve them. Must be linked to a certificate database.
A simple OCSP responder built with ASP.NET Core.
XiPKI: Compact open source PKI (CA, OCSP responder, certificate protocols ACME, CMP, EST).
A list of known OCSP hosts as observed by https://crt.sh/ocsp-responders
Django app providing a Certificate Authority
DyOCSP - Flexible DB OCSP Responder
Automatic, fast and reliable OCSP. Listen to requests, send responses, cache implemented. Must be linked to a certificate database.
Add a description, image, and links to the ocsp-responder topic page so that developers can more easily learn about it.
To associate your repository with the ocsp-responder topic, visit your repo's landing page and select "manage topics."