-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sections 4.9.9 and 4.9.10 #89
Comments
If I didn't mention it elsewhere already, we should add an ocsp response profile to go with our crl profile. |
Current proposed text has EITHER CA signs the response or delegated model.
Removed.
Should be in the profile - has nothing to do with OCSP directly...
BR says "SHOULD NOT respond with a "good" status"
Text says that.
See "should" above. Can respond good (just shouldn't - i.e., means no actual requirement...) But random serial numbers make pre-gen hard - so maybe the impact is no pre-gen.
BR does not require POST - it does require GET. Certainly can include POST but not required. Did not make that change.
I don't know what that is trying to change - "should" on "good"?
I did change to say "The OCSP Responder SHALL update the information used to respond to requests within 4 hours of a new CRL being issued by the CA for all requests, including CA certificates. " |
4.9.9
I think we concluded we are only permitting the CA delegated model, correct? That aligns with the mods we made to the OCSP cert profle. Assuming that's settled, this section's content could be entirely replaced with this:
Note that I removed the id-pkix-ocsp-nocheck verbiage because we have that in the cert profile so there's no need here.
4.9.10
I want to call attention to this combination of requirements:
Effects on (pre-generated / cache only) responders:
If you ask me, that's all relatively ugly. If you want to minimize the lag time, due both to the random serial numbers (urge to start ranting suppressed) and the no "good" rule you're basically forced to have online responder keys with a complete cert repository behind it instead of something elegant and secure like using the CRL on the responder. In any case, I just want to be sure we gave this some thought.
Aside from above, a three minor things:
The last one is because it keeps responders honest. Without it, they tell you their information is more current than it is when their data could be old and a new CRL has fresher, different, data. You can avoid having them ever contradict one another if thisUpdate is set correctly.
The text was updated successfully, but these errors were encountered: