IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: draft-igoe-secsh-x509v3-00



On Tue, 15 Dec 2009, Nicolas Williams wrote:

>> 7) Certificate revocation list / OCSP responses.  You've suggested
>> including CRL or OCSP data alongside the certificate chain for
>> efficiency purposes.  I'm not a PKI expert either, so I'd like to hear
>> more feedback, especially from implementers, on whether this would be
>> of interest to them.  I know that SunSSH's support for X.509 has some
>> consideration of CRL/OCSP, so maybe Jan can comment on what he thinks
>> of including that data with the cert chain or handling it outside of
>> the protocol.
>
>First, SunSSH does not support x.509 yet.

	Douglas knows that I did some interop tests with VanDyke and 
Attachment and that it went OK. The code is still somewhere in my 
workspace and I haven't ever released a patch, that's true.

>Second, I *strongly* recommend that both, the client and server be able
>to send OCSP responses for their own certs to the other, and that
>servers be able to send OCSP responses for the client's certs back to
>the client.  This has a number of major benefits:

	I agree with that. I think this idea of sending OCSP responses 
was already in the original draft by Joseph and Oskari, if I remember 
correctly. BTW, kmf_validate_cert() accepts optional OCSP response data.

	J.

-- 
Jan Pechanec



Home | Main Index | Thread Index | Old Index