[Openswan Users] crlDistributionPoints
Andreas Steffen
andreas.steffen at strongsec.net
Fri May 27 11:03:15 CEST 2005
Hi David,
the following steps are required to enable crl fetching:
- libcurl and pthreads support must be compiled into
pluto by enabling the corresponding compile options.
- the asynchronous crl fetching thread must be started
by setting
crlcheckinterval=600 # e.g. every 600 seconds
in the config setup section of ipsec.conf
- if there is no valid copy of the crl in /etc/ipsec.d/crls
a fetching request to the http site is automatically started
when the first certificate containing a CDP is received.
Regards
Andreas
david wrote:
>
> hi all,
>
>
>
> i am using openswan-2.3.1 with certificates and I try to use a crl
> distribution point.
>
>
>
> so my network is :
>
>
>
> host 1: 195.212.109.205
>
> Apache is running here and the CRL is reachable at
> http://195.212.109.205/ca.crl
>
>
>
> host 2:195.212.109.202
>
> This host uses a user certificate: user01desuri.crt
>
>
>
> host 3: 195.212.109.202
>
> This host uses a user certificate: user02desuri.crt
>
>
>
> As it is written on the readme.x509 of openswan.org Documentation, I
> modified my openssl.cnf on the CA, like this :
>
> -----------------------------------------------------------------------------------------------------------------------
>
> [ user_cert ]
>
> basicConstraints = critical, CA:false
> authorityKeyIdentifier = keyid:always
> subjectKeyIdentifier = hash
> keyUsage = digitalSignature, nonRepudiation, keyEncipherment
> extendedKeyUsage = clientAuth, emailProtection
> nsCertType = client, email
> nsComment = "Certificate issued by Company"
> subjectAltName = email:copy
> #--------------distrib point-------------------
> crlDistributionPoints=URI:http://195.212.109.205/ca.crl
>
> -------------------------------------------------------------------------------------------------------------------------
>
>
>
> So now when the CA signs a certificate it gives to me :
>
> -------------------------------------------------------------------------------------------------------------------------
>
> [...]
>
> X509v3 extensions:
> X509v3 Basic Constraints: critical
> CA:FALSE
> X509v3 Authority Key Identifier:
> keyid:28:99:32:6E:71:23:3D:5D:D8:9A:C2:2A:BE:18:BF:98:94:76:29:76
> X509v3 Subject Key Identifier:
> A6:0A:2C:41:7B:8B:4D:6D:75:6B:B5:A2:EC:25:95:81:E7:12:D1:BC
> X509v3 Key Usage:
> Digital Signature, Non Repudiation, Key Encipherment
> X509v3 Extended Key Usage:
> TLS Web Client Authentication, E-mail Protection
> Netscape Cert Type:
> SSL Client, S/MIME
> Netscape Comment:
> Certificate issued by Company
> X509v3 Subject Alternative Name:
> email:ngc1976.m42 at caramail.com
> X509v3 CRL Distribution Points:
> URI:http://195.212.109.205/ca.crl
>
> [...]
>
> -------------------------------------------------------------------------------------------------------------------------
>
>
>
> This CRL distribution point is the same for host 2 and 3.
>
> I use a VPN between host 2 host 3 with certificates like this, but they
> never try to get the CRL on the APACHE server.....WHY?
>
>
>
>
>
> when I check my CRL properties, I have no distPts: ........
>
> -------------------------------------------------------------------------------------------------------------------------
>
> [root at dhcp202 crls]# ipsec auto --listcrls
> 000
> 000 List of X.509 CRLs:
> 000
> 000 May 26 14:40:13 2005, revoked certs: 1
> 000 issuer: 'C=fr, ST=ile-de-france, L=paris, O=motorola,
> CN=rootca1024'
> 000 updates: this May 26 14:01:39 2005
> 000 next Jun 25 14:01:39 2005 ok
>
> -------------------------------------------------------------------------------------------------------------------------
>
>
>
> what I have to do?
>
> Something to change in programs/pluto/Makefile ?
>
> need a patch ?
>
>
>
> thx
>
> david
>
>
> <http://secure.caramail.lycos.fr/services/content/advdetail.jsp?advid=advprotekon&advsvc=advsecure&TARGETCODE=FR_footermail_link>
> CaraMail met en oeuvre un nouveau *Concept de Sécurité Globale*
> <http://secure.caramail.lycos.fr/services/content/advdetail.jsp?advid=advprotekon&advsvc=advsecure&TARGETCODE=FR_footermail_link>
> à partir de 1,49 ? par mois
=======================================================================
Andreas Steffen e-mail: andreas.steffen at strongsec.com
strongSec GmbH home: http://www.strongsec.com
Alter Zürichweg 20 phone: +41 1 730 80 64
CH-8952 Schlieren (Switzerland) fax: +41 1 730 80 65
==========================================[strong internet security]===
More information about the Users
mailing list