Re: [TLS] Security of CertificateStatus?

Mike <mike-list@pobox.com> Sat, 17 February 2007 17:56 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HITna-0000cH-9x; Sat, 17 Feb 2007 12:56:38 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HITnY-0000cC-TW for tls@lists.ietf.org; Sat, 17 Feb 2007 12:56:36 -0500
Received: from rune.pobox.com ([208.210.124.79]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HITnW-0000d6-NR for tls@lists.ietf.org; Sat, 17 Feb 2007 12:56:36 -0500
Received: from rune (localhost [127.0.0.1]) by rune.pobox.com (Postfix) with ESMTP id 24ECDBA4B8 for <tls@lists.ietf.org>; Sat, 17 Feb 2007 12:56:54 -0500 (EST)
Received: from [192.168.1.8] (wsip-24-234-114-35.lv.lv.cox.net [24.234.114.35]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by rune.sasl.smtp.pobox.com (Postfix) with ESMTP id E4BE3BA4B7 for <tls@lists.ietf.org>; Sat, 17 Feb 2007 12:56:53 -0500 (EST)
Message-ID: <45D74243.1060004@pobox.com>
Date: Sat, 17 Feb 2007 09:58:27 -0800
From: Mike <mike-list@pobox.com>
User-Agent: Thunderbird 1.5.0.9 (Windows/20061207)
MIME-Version: 1.0
To: tls@lists.ietf.org
Subject: Re: [TLS] Security of CertificateStatus?
References: <45D5F218.8010409@pobox.com> <200702171807.34284.bradh@frogmouth.net>
In-Reply-To: <200702171807.34284.bradh@frogmouth.net>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7bac9cb154eb5790ae3b2913587a40de
X-BeenThere: tls@lists.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.lists.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/tls>
List-Post: <mailto:tls@lists.ietf.org>
List-Help: <mailto:tls-request@lists.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=subscribe>
Errors-To: tls-bounces@lists.ietf.org

> You either need to validate the chain (plus CRL), or you need OCSP, not both. 
> Either allows you to tell if the certificate presented by the server is 
> valid. If the certificate is valid, you can "trust" the server.

When I validate a typical certificate chain, my code ends up
retrieving up to 4 CRLs since the CRLs of intermediate CAs
need to be checked too.  Does the single OCSP response also
validate these intermediate CA certificates?

Mike

_______________________________________________
TLS mailing list
TLS@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/tls