Link Search Menu Expand Document

Configuring OCSP for SafeSign/Safetronic

From version 1.8.0


Overview

Safetronic is often configured to use an IdenTrust OCSP Revocation Checker

IdenTrust use a 4-corner model which effectively means a relying party sends all OCSP requests to the same OCSP responder address (the one associated with your OCSP signing certificate) and the OCSP server redirects these requests to the Responder responsible. Rather than the standard approach where OCSP requests are sent to the responsible responder directly

OCSP requests must also be signed and the responder associated with the CA that issued this certificate validates that signature

The combination of this is that only IdenTrust customers that are in possession of a valid OCSP signing certificate may make OCSP revocation checks

Another deviation is that OCSP server signing certificates are issued from the Root CA

This extra complexity means some additional configuration needs to be made in certdog to cater for this


Configuration Steps

This is assuming a typical three tier PKI (Root CA, Intermediate CA and End-Entity certificates) with CAs and OCSP responders all hosted in certdog

In certdog you should have the two CAs configured e.g.:

  • Root CA

  • Issuing CA

For each of these, you may just check the Create OCSP Server option when configuring as this will create OCSP Servers and other required artefacts (Certificate Issuer, User etc.). But you can also create from scratch if preferred


Once created, the OCSP servers for these CAs should be configured as follows:


Root CA OCSP Server

If you let certdog create this automatically, the following will all be configured by default:

  • Local CA should refer to the Root CA

  • Certificate Issuer should refer to a Certificate Issuer that uses the Root CA and an OCSP compliant Certificate Profile

An OCSP compliant Certificate Profile should include:

  • Digital Signature Key Usage
  • OCSP Signing Enhanced Key Usage
  • Include OCSP No Check should be enabled

It’s lifetime can be whatever you choose (certdog will handle the renewal of these certificates anyway)

Items that may need to be updated:

Signing Cert DN: You can leave this empty but specifying a DN may provide more meaningful information e.g. CN=Root OCSP Server 1, O=Organisation, C=GB

If using older versions of Safetronic, set the Hash Algorithm to SHA1. Older versions mandate this hash algorithm for OCSP responses

Set Requests must be Signed to True

Next Update Period should be 5 minutes or less


Issuing CA OCSP Server

The following should be configured:

  • Local CA should refer to the Issuing CA

  • Certificate Issuer should refer to a Certificate Issuer that uses the Root CA and an OCSP compliant Certificate Profile that has Include OCSP No Check set to false

    • To make this change from the defaults, edit the Certificate Issuer referenced and set the Local CA Configuration item to the Root CA. This is required as all OCSP signing certificates are issued from the Root CA
    • Note the Certificate Profile name then edit that profile ensuring that Include OCSP No Check is disabled. This is required so that this OCSP signing certificate will also be checked for revocation
    • Go back to the Issuing CA OCSP Server by choosing Edit/View and check the Bypass Issuer Check option. If this is not checked, next time any changes are made to the OCSP server you will receive an error (as by default the signing certificate should be issued from the associated CA - not the Root CA)

You may also again, update the Signing Cert DN and if using older versions of Safetronic, also set the Hash Algorithm to SHA1

Set Requests must be Signed to True

Next Update Period should be 5 minutes or less



Once the changes have been made you may force the OCSP signing certificates to be renewed by checking the Renew Certificate option in the OCSP configuration


Other Considerations

IdenTrust also host OCSP servers at https addresses (rather than the standard http). If you must replicate this, perform the following steps

From your certdog installation, locate the .\tomcat\crlwebapps folder and move the certdog.war file to the .\tomcat\webapps folder

The OCSP services will then be available via the same https address