Re: OCSP? (UNCLASSIFIED)

2006-10-12 Thread pbains

Thank you François! After reading the documentation and looking at the Apache
developer's notes, I am still not clear on how to specify an OCSP responder
if the responder URI is not included in the responder's certificate. From
the Apache developer's notes, I think it is via a configuration option in
ssl.conf, but I have not seen an example, only misc notes. Does anyone know
how to do this? We would like to be able to specify a specific responder if
the URI is not contained in the server's cert. Thanks in advance.

Paul


François Soumillion wrote:
 
 http://www.belgium.be/zip/eid_authentication_proxy_fr.html
 
 You will find there an updated version of mod-ssl including OCSP check
 as well as the documentation to set it up.
 
 2006/10/11, Victor, Dwight P CTR DISA PAC [EMAIL PROTECTED]:
 Classification:  UNCLASSIFIED
 Caveats: NONE

 Hi Eriks,

 Thanks for the tip regarding Tumbleweed  WebCullis.  I'll definitely
 have
 to do some research.

 Paul,

 One of my web searches pulled up the fact that HP-UX has a OCSP enabled
 version of mod_ssl.  Seems to be a lucky break for you.  Hope that works
 out.

 I have experienced a large memory hit anytime certificate checking is
 performed against the CRLs (some of which are 13 MB in size) in the range
 of
 75MB per Apache server instance.  Luckily we aren't that busy, or we
 would
 definitely be feeling the pain.

 BTW, I've been reading a bit about mod_nss
 (http://directory.fedora.redhat.com/wiki/Mod_nss).  This module sounds
 interesting, but it isn't supported on HP-UX.  I'll have to give it a try
 and I'll let the list know the results (if I can find some time to play
 with
 it).
 Thanks again,

 Dwight...

 ---
 Dwight Victor, CISSP (Contractor)
 EMAIL: [EMAIL PROTECTED]
 SMAIL: [EMAIL PROTECTED]
 TEL:   (808) 653-3677 ext 229

 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED]
 Sent: Wednesday, October 11, 2006 10:55 AM
 To: modssl-users@modssl.org
 Subject: RE: OCSP? (UNCLASSIFIED)


 Thanks Eriks, appreciate the info. We are using HP-UX, so the Tumbleweed
 solution won't work for us. We do have an HP version of Apache that has
 the
 OCSP mod of mod_ssl, but we just installed it (today) and haven't had a
 chance to look at the documentation yet. Will post back and let you know
 what we found out. Thanks again.

 Paul


 Richters, Eriks A wrote:
 
  I went down this road a few months ago.  Someone wrote a patch that
  would add OCSP client functionality to Apache, but the patch never got
  folded into the Apache mainline code.  We spent a bit of effort trying
  to get the patch to work with our version of Apache with no luck.
  There are two products from commercial organizations out there that
  can help.  One is from Tumbleweed, called Server Validator.  It's
  pricey about $2000 per server, but works pretty well. Its very easy to
  install and configure and has some nice features for supporting OCSP
  and failing over to CRLs.  It is supported on several platforms.
  The other product is called WebCullis from the organization that used
  to be Orion Security. (Orion Security has since been bought by
  Entrust.) It used to be under the GPL, which was nice.  At the time,
  they only had a version for Windows and Intel based Solaris.
  I hope this helps.
 
  -Original Message-
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED] On Behalf Of pbains
  Sent: Wednesday, October 11, 2006 4:32 PM
  To: modssl-users@modssl.org
  Subject: Re: OCSP? (UNCLASSIFIED)
 
 
  My organization is headed down this road after experiencing
  performance degradation from checking large CRLs. As we come up with a
  solution, will post what I find out. Alternatively, if you have any
  information, would appreciate it, thanks!
 
  Paul
 
 
  Victor, Dwight P CTR DISA PAC wrote:
 
  Classification:  UNCLASSIFIED
  Caveats: NONE
 
 
  Hello List!
 
  Has anyone had any experience/success with using mod_ssl + Apache v2
  to
  query an OCSP responder regarding the status of an end-user provided
  certificate and allow/deny access based on the response?  Any tips,
  suggestions, discussion would be appreciated.
 
  Best Regards,
 
  Dwight...
 
  ---
  Dwight Victor, CISSP (Contractor)
  Systems Administrator / Webmaster
  General Dynamics C4 Systems
  EMAIL: [EMAIL PROTECTED]
  TEL:   (808) 653-3677 ext 229
 
  Classification:  UNCLASSIFIED
  Caveats: NONE
 
 
 
 
 
  --
  View this message in context:
  http://www.nabble.com/OCSP--%28UNCLASSIFIED%29-tf1638361.html#a6764147
  Sent from the mod_ssl - Users mailing list archive at Nabble.com.
 
  __
  Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
  User Support Mailing List  modssl-users@modssl.org
  Automated List Manager[EMAIL PROTECTED]
 
  __
  Apache Interface to OpenSSL (mod_ssl

Re: OCSP? (UNCLASSIFIED)

2006-10-11 Thread pbains

My organization is headed down this road after experiencing performance
degradation from checking large CRLs. As we come up with a solution, will
post what I find out. Alternatively, if you have any information, would
appreciate it, thanks!

Paul


Victor, Dwight P CTR DISA PAC wrote:
 
 Classification:  UNCLASSIFIED 
 Caveats: NONE
 
 
 Hello List!
 
 Has anyone had any experience/success with using mod_ssl + Apache v2 to
 query an OCSP responder regarding the status of an end-user provided
 certificate and allow/deny access based on the response?  Any tips,
 suggestions, discussion would be appreciated.
 
 Best Regards,
 
 Dwight...
 
 ---
 Dwight Victor, CISSP (Contractor)
 Systems Administrator / Webmaster
 General Dynamics C4 Systems
 EMAIL: [EMAIL PROTECTED]
 TEL:   (808) 653-3677 ext 229
 
 Classification:  UNCLASSIFIED 
 Caveats: NONE
 
 
  
 

-- 
View this message in context: 
http://www.nabble.com/OCSP--%28UNCLASSIFIED%29-tf1638361.html#a6764147
Sent from the mod_ssl - Users mailing list archive at Nabble.com.

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  modssl-users@modssl.org
Automated List Manager[EMAIL PROTECTED]


RE: CRL Checking Uses Excessive Memory

2006-10-11 Thread pbains

I am working on a DoD project, and we are experiencing high CPU load on HP-UX
servers with multiple CPUs in this scenario. We are thinking it is because
the CRL size for some CAs is huge - ad-hoc tests done with certs associated
with small CRLs do not produce CPU spikes, but large CRLs do. We are running
an older version of Apache and the mod_ssl package without OCSP support, but
have just installed an updated Apache with mod_ssl and OCSP support. Anyone
using this, and if so, have any luck with it? Thanks in advance!

Paul


Victor, Dwight P CTR DISA PAC wrote:
 
 Hi Rob,
 
 I also work for the DoD and am using the same CRLs as you (downloaded and
 converted on a daily basis).  We're running a Linux webserver with a
 single
 1.8Ghz Celeron, 512MB of RAM, and 1GB of swap.
 
 I haven't noticed any memory issues when checking CRLs.
 
 My Apache server starts multiple child servers.  It looks like the child
 servers hit around 60MB of memory usage (max) when processing CRL checks;
 500KB to 1MB seems to be the average child server's memory usage when
 idle.
 
 top says my current load average is about 0.03, 0.01, 0.00.  When checking
 CRLs, top says my load average zooms up to around 0.20, 0.05, 0.01.
 
 Of course, my userbase is very small and we aren't doing a ton of CRL
 checks.
 
 OCSP should resolve your issue with plowing through the CRLs, however, I
 have yet to find a viable OCSP solution.  There was a patch for mod_ssl,
 but
 I haven't heard anything about it since it was last released in 2004. 
 Maybe
 someone else on this list knows?
 
 Rob, why don't you email me offline.  I'm in the DISA GAL, if you can get
 to
 that.
 
 Dwight...
 
 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] Behalf Of Walls Rob W Contr 75
 CS/SCBS
 Sent: Friday, April 21, 2006 10:47 AM
 To: 'modssl-users@modssl.org'
 Subject: CRL Checking Uses Excessive Memory
 
 
 I work for the DoD. We have about a dozen CA's with their own CRL files.
 Some of these are over 20M in size. When CRL checking is enabled in Apache
 (for Linux or Windows), memory use is excessive and httpd processes are
 killed by the OS (Linux) due to out of memory conditions and all the
 memory
 swapping activity sends the proc utilization way up there and makes the
 server unresponsive. On Windows the CPU use just pegs at 100% (I have no
 idea what else is going on in there).
 CRL's are downloaded every day and openssl is used to make hash'd file
 names
 (ssl.conf is using  SSLCARevocationPath). I don't currently restart apache
 after retrieving the new CRL files.
 The Linux machine runs redhat with dual 3ghz xeons and 2Gb ram. SSL works
 great, but as soon as CRLs are checked, apache starts to go south! I have
 a
 2Gb swap partition and have added another 2Gb swap file to at least keep
 things running, but it becomes so slow it might as well crash.
 Each httpd process goes from using about 14Mb of memory when not CRL
 checking to 250Mb when CRL checking is enabled!
 BTW: anywhere from 10 to 20 concurrent httpd processes are normal for that
 machine.
 
 Any ideas on how to use large CRL's in Apache? 
 
 Do I just need more memory?
 
 If Apache can't use many large CRL files, would an OSCP solution side-step
 these problems? Any good ones out there?
 __
 Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
 User Support Mailing List  modssl-users@modssl.org
 Automated List Manager[EMAIL PROTECTED]
 __
 Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
 User Support Mailing List  modssl-users@modssl.org
 Automated List Manager[EMAIL PROTECTED]
 
 

-- 
View this message in context: 
http://www.nabble.com/CRL-Checking-Uses-Excessive-Memory-tf1488925.html#a6764331
Sent from the mod_ssl - Users mailing list archive at Nabble.com.

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  modssl-users@modssl.org
Automated List Manager[EMAIL PROTECTED]