Providing certificate revocation status via OCSP
To serve OCSP responses, we have to sign them. An OCSP response for a certificate can be signed by its issuer certificate. The same issuer can also issue another certificate for signing OCSP requests. That certificate must have OCSPSigning
included in the X509v3 extendedKeyUsage
extension.
When we created the intermediate CA config file, we included the following X509v3 extensions section:
[v3_ocsp_cert] subjectKeyIdentifier = hash authorityKeyIdentifier = keyid:always, issuer basicConstraints = critical, CA:FALSE keyUsage = critical, digitalSignature extendedKeyUsage = critical, OCSPSigning crlDistributionPoints = URI:http://crl.tls-experts.no/intermediate_crl.der authorityInfoAccess = OCSP;URI:http://ocsp.tls-experts.no/
That X509v3 extensions section will help us to generate a certificate for an OCSP responder. Let’s make this certificate:
- As usual, we will start by preparing the directory:
$ cd mini-ca $ mkdir...