CRL feature discussion #198
Replies: 1 comment 2 replies
-
My suggestion is in our 1st iteration, we only support cases that cert and CRL share the same issuer (i.e., digitally signed with the same CA private key). In a future release, we could consider add the support for the other case (including new trust store type design). For cache, since a cert chain could have many CRLs, one download failure would waster other successful downloads, the network overhead can be huge. I agree with @JeyJeyGao that we should implement a cache. One option could be introducing a new folder under |
Beta Was this translation helpful? Give feedback.
-
As mentioned in #125, we need to implement the CRL check to complete the certificate revocation support. I have investigated CRL based on RFC 5280 and would like to start a discussion about this feature.
Here are the topics that I think we need to discuss:
CRL Validation:
As mentioned in RFC 5280, Section 5.1.1.3 signatureValue:
In this case, we can use the original certificate issuer's certificate to validate the CRL's signature.
For this case, where the original certificate issuer's certificate differs from the CRL issuer's certificate, we don't have enough information to validate the CRL. In this situation, we need to decide whether we should perform the validation because it mentions that it is
SHOULD
rather thanMUST
. If we need to implement the validation, we need the user to provide the issuer certificate for the CRL.Large CRL Size
We need to support an offline cache for CRL considering the pros and cons of CRL:
CRL:
As mentioned above, a 353 KB CRL file is too large for frequent verification processes, so we need a library-level caching mechanism to solve the issue. However, this could be an optimization work item for the CRL feature.
I appreciate your thoughts and ideas. Thank you very much!
Beta Was this translation helpful? Give feedback.
All reactions