On 27/04/13 18:37, Tom Ritter wrote:
I have what may be a well tread topic in the nuances of OCSP Stapling
- but after having it posed to me I realized I did not know the
answer.  Thus, I ask publicly in the hope that there is a simple
answer I can point to in the future.

If a CA uses a delegated signer for OCSP, and a website delivers an
OCSP Staple... How does the user (talking only to the website) get

  - The Delegated Signing Cert (which is presumably an Intermediate off
a Trust Root)
  - The revocation information for *that* Intermediate cert

Tom, RFC2560 deals with this issue (see section 4.2.2.2.1).

Public CAs that use delegated OCSP signing should follow the CABForum Baseline Requirements (section 13.2.5):
  "the OCSP signing Certificate MUST contain an extension of type
   id-pkix-ocsp-nocheck, as defined by RFC2560."

Delegated OCSP signing certificates are end-entity certs, not Intermediate certs.

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to