On Wed, Dec 17, 2014 at 12:36:39PM +1000, Fraser Tweedale wrote:
Hi Christina,
Following up on your request for further testing, see below.
On Thu, Oct 30, 2014 at 09:25:56AM -0700, Christina Fu wrote:
> Fraser,
>
> Good catch!
>
> I'm wondering why it was disabled. Could there be a reason? Fraser, if you
> have not done so, may I trouble you to take one more step in the testing and
> see if you can
> 1. verify the CRLs generated after the enabling of AKI indeed has the
> extension
>
The extension is present.
> 2. the CRL is accepted by the OCSP
>
The OCSP responder works fine with the CRLs when the AKI extension
has been enabled.
> 3. test FF cert verification with both CRL and OCSP
>
Firefox OCSP check works fine. I'm not sure how to test the CRL in
Firefox. Advice?
> Regarding upgrade script, I'll say yes if possible. But we should try to
> conform to the existing upgrade mechanisms/decision.
>
Patch will be out shortly.
Updated patch attached.
Cheers,
Fraser
> thanks,
> Christina
>
> On 10/29/2014 11:09 PM, Fraser Tweedale wrote:
> >This patch enables the Authority Key Identifier CRL Extension, which
> >is REQUIRED by RFC 5280, by default.
> >
> >Should existing instances be left alone or should I also look at an
> >upgrade script that offers to upgrade CS.cfg to be conformant?
> >
> >Fraser
> >
> >
> >_______________________________________________
> >Pki-devel mailing list
> >Pki-devel(a)redhat.com
> >https://www.redhat.com/mailman/listinfo/pki-devel
>
> _______________________________________________
> Pki-devel mailing list
> Pki-devel(a)redhat.com
>
https://www.redhat.com/mailman/listinfo/pki-devel
_______________________________________________
Pki-devel mailing list
Pki-devel(a)redhat.com
https://www.redhat.com/mailman/listinfo/pki-devel