[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: CRL verification in slapd
Ralf Haferkamp wrote:
As openssl-0.9.7* has some CRL checking capabilities, I am currently working
on implementing CRL checking in slapd.
Great news!
Therefor I plan to add the following
directives to ldap.conf and slapd.conf:
ldap.conf:
TLS_CRL_CHECK
I'd vote for TLS_CRLCHECK to keep it similar to style of constants in ldap.h
(see suggestions below).
slapd.conf:
TLSCRLCheck
And a options constant for ldap.h (similar to other constants there):
LDAP_OPT_X_TLS_CRLCHECK
And how would the directives for the CRL file/directory be called? Or do you
plan to use the directory containing trusted root certs?
How about this:
LDAP_OPT_X_TLS_CRLFILE
LDAP_OPT_X_TLS_CRLDIR
You see, I'm most interested in the ldap.h constants since I'll be happily
add support for CRL checking in python-ldap. :-)
But it would directly map to directives in ldap.conf:
TLS_CRLFILE
TLS_CRLDIR
For slapd.conf:
TLSCRLFile
TLSCRLDir
The possible values of these would be: (reflecting the possibilities, that
openssl-0.9.7d currently has)
"no" do not perform any CRL checks (this would be the default)
I'd vote for "none".
"yes" perform CRL checks
This only performs a revocation check on the end-entity cert? How about
calling this "peer" to make that very clear?
"all" perform CRL checks for a for whole chain
Ok for me.
Any comments or suggestings regarding this?
My suggestions for naming the constants in ldap.h:
LDAP_OPT_X_TLS_CRLCHECK_NONE
LDAP_OPT_X_TLS_CRLCHECK_PEER
LDAP_OPT_X_TLS_CRLCHECK_ALL
Ciao, Michael.