On Wed, Feb 4, 2009 at 8:04 PM, Robert Relyea <rrel...@redhat.com> wrote:
> Ahnjoan Amous wrote:
>>
>> I'm attempting configuration of mod_nss to use an OCSP responder.  My
>> OCSP responder uses a self signed certificate (call it OCSPcert) to
>> sign responses, my web server uses a certificate (call it SERVERcert)
>> signed by a trusted CA (call it CA1cert).  I also have a second
>> trusted CA (call it CA2cert) that has issued my client certificates
>> (CLIENTcert).
>
>>
>> I'm experiencing the following behavior
>>
>>     Certificate not verified: 'Server-Cert'
>>     SSL Library Error: -8062 The signer of the OCSP response is not \
>>       authorized to give status for this certificate
>>     Unable to verify certificate 'Server-Cert'. Add \
>>       "NSSEnforceValidCerts off" to nss.conf so the server can start \
>>       until the problem can be resolved.
>>
>>
>>   A packet capture shows that a sucessful OCSP attempt is made to verify \
>>     the servers certificate.  Then a second OCSP attempt is made to verify
>> \
>>     the first client certificate and once that fails never tries again.
>>   The following show up in the apache error log for each user attempt to \
>>     view a web page.
>>     Bad remote server certificate: -8071
>>     SSL Library Error: -8071 The OCSP server experienced an internal error
>>     SSL Library Error: -8071 The OCSP server experienced an internal error
>>
>> Any suggestions on how to fix this would be greatly appreciated.
>>
>
> 1.Don't use a self-signed cert for your OCSP responder.
>
> OCSP responses need to be signed by a trusted certificate. That certificate
> can be trusted in the following ways:
> 1) The OCSP repsonse is signed by the CA that issued the certificate you are
> validating.
> 2) The OCSP response is signed by a certificate that is used by the same CA
> that issued the certificate you are validating with the appropriate OCSP
> extension in the certificate.
> 3) The OCSP response is signed by a certificate issued by a central OCSP
> service which you have explicitly selected.
>
> #3 is fairly rare, and is usually used by certain services which sell OCSP
> validation to corporations. In this case you also explicitly configure your
> OCSP responder. I don't know how this can be configured in mod_nss. There
> was a feature in the browser to configure this, I don't know if it still
> works.
>
> In general, you place an OCSP AIA extension in your certificate at issuance
> time. You probably want separate responders for each CA (otherwise your
> responder will have to have code to choose the correct OCSP certificate to
> use based the the certificate you are giving the response for). Sign  your
> OCSP certificate with the CA which is issuing certificates your responser is
> reporting on. Make sure that certificate has the appropriate OCSP
> extensions.
>
> bob

Unfortunately I don't have a choice as to what OCSP responder or
signing certificate the responses are signed with.  I do have hope
that mod_nss works in my environment because another user posted to
BigAdmin (http://www.sun.com/bigadmin/content/submitted/ocsp_apache_mod_nss.jsp)
that mod_nss works in OUR environment.  If anyone has any other
suggestion on where I am going wrong I would really appreciate it.

Thanks
Ahnjoan
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to