> From: Vincent Truchsess - rockenstein AG <v...@rockenstein.de>
> Sent: Friday, 4 December, 2020 08:59
>
> That would be the the ideal solution. The problem is that the customer's
> security-policy demands dedicated hardware performing IDS/IPS functionality
> at the point of TLS-termination. The devices at hand do not provide the
> functionality to call a user-defined external service for certificate
> validation apart from OCSP.
>
> The future workaround will be a mockup OCSP-responder but that solution will
> need some time for implementation. our current focus lies on a rather quick
> than perfect solution that buys some time to ship something more solid.

Ah, I see. Thanks for the clarification.

I don't offhand see a quick workaround for your situation. I'm not sure what 
would happen if you cross-signed all the client certificates with a CA under 
your control, and then generated a CRL for the ones you want to exclude. Or 
actually you could just cross-sign only the ones you want to allow, and made 
your CA the only trust root for the TLS termination systems; that would work. 
But I'm guessing modifying every client certificate is not a feasible solution 
for you either.

If it is, cross-signing with a CA under your control and trusting only that CA 
is probably the approach I'd go for. That's a legitimate approach under PKIX. 
It could even be mostly automated, except the end users would have to install 
updated user certificates, which is probably a deal-breaker.

--
Michael Wojcik

Reply via email to