[Openswan Users] ocsp & openswan
david
david2005.p at gmail.com
Wed Jun 15 19:10:22 CEST 2005
2005/6/14, Andreas Steffen <andreas.steffen at strongsec.net>:
> Yes, if the certs have an Authority Information Access Entry
> then the OCSP server should be contacted as soon as the
> certificate is received from the peer. Use
>
> ipsec auto --listocsp
>
> to check if any OCSP fetch requests have been generated.
>
> My OCSP test scenario available from
>
> http://www.strongswan.org/uml/testresults/ocsp-strict/
>
> shows how the OCSP fetching works.
>
> Regards
>
> Andreas
>
here are my two configs for the VPN ends:
---------------------------------userB ipsec.conf---------------
config setup
klipsdebug=none
plutodebug=all
crlcheckinterval=600
conn %default
keyingtries=0
authby=rsasig
conn testvpnda
left=195.212.109.202
leftcert=user01desuri.crt
right=%any
auto=add
---------------------------------------------------------
---------------------------------userA ipsec.conf---------------
config setup
klipsdebug=none
plutodebug=none
crlcheckinterval=600
conn %default
keyingtries=0
authby=rsasig
conn testvpnda
left=195.212.109.203
leftcert=user02desuri.crt
right=195.212.109.202
rightid="C=fr, ST=ile-de-france, L=paris, O=toto, CN=user01desuri.....
auto=add
---------------------------------------------------------
1) at this point is there something wrong in my conf ?
2)I tryed to put the following on both ends :
ca openswan
cacert=ca.crt
ocspuri=http://195.212.109.202:8888
auto=add
like in your how-to. but when I make
service ipsec restart
it tells me :
ipsec_setup: (/etc/ipsec.conf, line 19) section type "ca" not
recognized -- restart aborted
why ?
Is it important ?
3) I have this part about OCSP in my log file on the userB
Jun 15 16:55:10 localhost pluto[5419]: | certificate signature (C=fr,
ST=ile-de-france, L=paris, O=motorola, CN=rootca1024 -> C=fr,
ST=ile-de-france, L=paris, O=motorola, CN=user06desocspuse,
E=ngc1976.m42 at caramail.com) is valid
Jun 15 16:55:10 localhost pluto[5419]: | authcert list unlocked by
'verify_x509cert'
Jun 15 16:55:10 localhost pluto[5419]: | ocsp cache locked by 'verify_by_ocsp'
Jun 15 16:55:10 localhost pluto[5419]: | ocsp cache unlocked by 'verify_by_ocsp'
Jun 15 16:55:10 localhost pluto[5419]: "testvpnda"[1] 195.212.109.203
#1: ocsp status is stale or not in cache
Jun 15 16:55:10 localhost pluto[5419]: | ocsp fetch request list
locked by 'add_ocsp_fetch_request'
Jun 15 16:55:10 localhost pluto[5419]: | new ocsp location added
Jun 15 16:55:10 localhost pluto[5419]: | ocsp fetch request for serial 12 added
Jun 15 16:55:10 localhost pluto[5419]: | ocsp fetch request list
unlocked by 'add_ocsp_fetch_request'
Jun 15 16:55:10 localhost pluto[5419]: | fetch thread wake call by
'verify_by_ocsp'
Jun 15 16:55:10 localhost pluto[5419]: | crl list locked by 'verify_by_crl'
Jun 15 16:55:10 localhost pluto[5419]: | crl list unlocked by 'verify_by_crl'
Jun 15 16:55:10 localhost pluto[5419]: "testvpnda"[1] 195.212.109.203
#1: no crl from issuer "C=fr, ST=ile-de-france, L=paris, O=motorola,
CN=rootca1024" found (strict=yes)
Jun 15 16:55:10 localhost pluto[5419]: "testvpnda"[1] 195.212.109.203
#1: X.509 certificate rejected
what the meaning ?
thx
david
More information about the Users
mailing list