Chapter 7. Using the Online Certificate Status Protocol Responder
194
passed since a particular validation request has been made to the OCSP server, the cache
settings give the TPS the option of getting the validity of the certificate from the value in the cache
rather than the server. This flexibility reduces the strain on the OCSP server.
The default values that govern cache behavior are all set to allow a fairly long time between
fetches to the OCSP server.
There are three parameters that control caching behavior:
•
NSSOCSPCacheSize
controls the number of certificate validity requests that can be stored in
cache. The default is 1000.
•
NSSOCSPMinCacheEntryDuration
sets the minimum amount of time (in minutes) that the
TPS waits after checking a certificate's status before the certificate status can be re-checked. To
increase security, set this time to something small, so that the OCSP responder can be checked
as often as possible and catch recently revoked certificates. The default time is one hour.
•
NSSOPCSPMaxCacheEntryDuration
sets the maximum amount of time before
the TPS checks the OCSP responder about a certificate. OCSP responders have an
optional setting to configure it's a good time for the client to query the service. The
NSSOPCSPMaxCacheEntryDuration
attribute overrides the default settings in the OCSP
responder and allows you to define whatever window you want. The default setting for this is
one day.
For example:
NSSOCSPCacheSize 1000
NSSOCSPMinCacheEntryDuration 60
NSSOPCSPMaxCacheEntryDuration 80
8. Restart the subsystem. For example:
service pki-tps restart
7.5. Enabling Certificate Revocation Checking for DRM and
TKS Users
Like the RA and TPS, the DRM and TKS subsystems do not have OCSP checking enabled, by
default, to validate subsystem certificates. This means it is possible for someone to log into the
administrative or agent interfaces with a revoked certificate.
OCSP checking can be enabled for the DRM and TKS very easily by editing the
server.xml
file.
1. Open the
server.xml
file for the subsystem. For example:
vim /var/lib/pki-kra/conf/server.xml
2. There are two different sections in the file for the agent and administrator interfaces. The OCSP
parameters need to be added to both sections to enable and configure OCSP checking. For
example:
<Connector name="Agent" port="10443" maxHttpHeaderSize="8192"
Содержание CERTIFICATE SYSTEM 8.0 - ADMINISTRATION
Страница 1: ...Red Hat Certificate System 8 0 Admin Guide Publication date July 22 2009 updated on March 25 2010 ...
Страница 42: ...20 ...
Страница 43: ...Part I Setting up Certificate Services ...
Страница 44: ......
Страница 190: ...168 ...
Страница 208: ...186 ...
Страница 223: ...Part II Additional Configuration to Manage CA Services ...
Страница 224: ......
Страница 256: ...234 ...
Страница 270: ...248 ...
Страница 280: ...258 ...
Страница 292: ...270 ...
Страница 293: ...Part III Managing the Subsystem Instances ...
Страница 294: ......
Страница 363: ...Managing RA Users 341 5 The user details page shows the person s UID full name email address and user SSL certificate ...
Страница 408: ...386 ...
Страница 438: ...416 ...
Страница 439: ...Part IV References ...
Страница 440: ......
Страница 503: ...Netscape Defined Certificate Extensions Reference 481 OID 2 16 840 1 113730 13 ...
Страница 504: ...482 ...
Страница 556: ...534 ...
Страница 564: ...542 ...