Overview of the setting options for blocking configurations of the online responder (OCSP).

If a blocking configuration is configured for an online responder, there are various setting options that are discussed below.

The Online Responder (Online Certificate Status Protocol, OCSP) is an alternative way of providing revocation status information for certificates. Entities that want to check the revocation status of a certificate do not have to download the complete list of all revoked certificates thanks to OCSP, but can make a specific request for the certificate in question to the online responder. For a more detailed description, see the article "Basics Online Responder (Online Certificate Status Protocol, OCSP)„.

Hash Algorithm

Specifies which algorithm is used to sign the OCSP response.

Valid values are:

AlgorithmNotes
MD2outdated, not recommended
MD4outdated, not recommended
MD5outdated, not recommended
SHA1obsolete, not recommended, default value
SHA256recommended default value according to RFC 6960
SHA384
SHA512

Do not prompt for credentials for cryptographic operations

If the private key of the OCSP password signing certificate is additionally protected (e.g. by a password or a hardware security module that requires interaction when loading the key), the corresponding dialog would be presented when loading the private key (starting the online responder service or loading a revocation configuration for the first time).

If this option is enabled (default setting), no dialog is displayed, instead the revocation configuration would silently transition to an error state.

This option is mapped by the flag "OCSP_SF_SILENT" (0x1).

Automatically use renewed signing certificates

If this option is enabled (default for online configurations), the online responder automatically uses new OCSP password signing certificates. Thus, no manual assignment by an administrator is required.

This option is mapped by the flag "OCSP_SF_ALLOW_SIGNINGCERT_AUTORENEWAL" (0x4).

Enable NONCE extension support

If the option is enabled and an OCSP request contains the Number used only Once (NONCE) extension, the server-side cache is ignored and a new response is generated containing the requested NONCE.

Please note that NONCE is only used if an OCSP client uses it. The Microsoft OCSP client does not support the NONCE extension.

The Microsoft OCSP client does not support the nonce extension.

Online Responder Installation, Configuration, and Troubleshooting Guide (Microsoft)

This option is mapped by the flag "OCSP_SF_ALLOW_NONCE_EXTENSION" (0x100).

Use any valid OCSP signing Certificate

If the option is not enabled (default setting), only OCSP answer signing certificates issued by the same certificate authority are used.

If this option is enabled, the online responder can use all signature certificates that include "OCSP signing" extended key usage, regardless of which certificate authority issued them.

This option is mapped by the flag "OCSP_SF_FORCE_SIGNINGCERT_ISSUER_ISCA" (0x8).

Online Responder Identifiers

Specifies whether the ResponderID of the OCSP response contains the subject name or the key hash (SHA1 private key checksum, default) of the OCSP response signing certificate (see RFC 6960).

The setting is represented by the following two flags:

TypeFlag
Key hashOCSP_SF_RESPONDER_ID_KEYHASH (0x40)
Subject NameOCSP_SF_RESPONDER_ID_NAME (0x80)
OCSP response with key hash
OCSP response with subject name

Related links:

External sources

2 thoughts on “Übersicht über die Einstellungsmöglichkeiten für Sperrkonfigurationen des Onlineresponders (OCSP)”

Comments are closed.

en_USEnglish