About CRLs
Chapter
14
Revocation and CRLs
599
One of the standard methods for conveying the revocation status of certificates is
by publishing a list of revoked certificates. This list is known as a certificate
revocation list (CRL). A CRL is a publicly available list of certificates that have been
revoked.
You can configure the Certificate Manager to generate CRLs by enabling and
configuring the CRL feature. You can also create CRLs conforming to X.509 (either
version 1 or version 2) standards by enabling extension-specific modules in the
CRL configuration—version 1 CRLs do not use extensions, version 2 CRLs use
extensions. Note that the server supports standard CRL extensions through its CRL
issuing points framework, see “Setting CRL Extensions,” on page 607” for more
information on setting up CRL extensions for issuing points. You can configure the
Certificate Manager to generate the CRL every time a certificate is revoked and at
periodic intervals which is stored in its internal database. If you configure the
publishing feature, you can also publish the CRLs to a file, an LDAP directory, or
an OCSP responder.
Note that the Registration Manager cannot create or publish CRLs, although it can
take revocation requests and pass them on to the Certificate Manager.
A CRL is issued and digitally signed by the CA that issued the certificates listed in
the CRL. The CA may use a single key pair to sign both the certificates and CRLs it
issues or two separate key pairs, one for signing certificates and another one for
signing CRLs.
By default, the Certificate Manager uses a single key pair for signing the certificates
it issues and CRLs it generates. You may choose to create another key pair for the
Certificate Manager and use it exclusively for signing the CRLs it generates. See
“Getting a CRL Signing Key Pair and Certificate,” on page 112 for details on setting
this up.
Reasons for Revoking a Certificate
A Certificate Manager can revoke any certificate it has issued. There are generally
accepted reason codes for revoking a certificate that are often included in the CRL.
These include the following:
0
= Unspecified—No particular reason is given.
1
= Key Compromised—The private key associated with the certificate has been
compromised in some way.
2
= CA Key Compromised—The private key associated with the CA that issued
this certificate has been compomised in some way.
Содержание Certificate Management System 6.1
Страница 1: ...Administrator s Guide Netscape Certificate Management System Version6 1 February 2003...
Страница 28: ...Documentation 28 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 68: ...Support for Open Standards 68 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 82: ...Uninstalling CMS 82 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 166: ...How a Registration Manager Works 166 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 382: ...ACL Reference 382 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 566: ...Managing Policy Plug in Modules 566 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 710: ...1 3 Organization Security Policies 710 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 716: ...Object Identifiers 716 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 762: ...DNs in Certificate Management System 762 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 794: ...Managing Certificates 794 Managing Servers with Netscape Console December 2001...
Страница 810: ...The SSL Handshake 810 Managing Servers with Netscape Console December 2001...
Страница 828: ...828 Netscape Certificate Management System Administrator s Guide February 2003...