OCSP hash algorithm agility

Stefan Winter stefan.winter at restena.lu
Wed Jan 11 10:30:22 CET 2017


Hi,

I'm currently implementing an OCSP responder for use with EAP-TLS. I
think I found a case of insufficient algorithm agility. Or I'm doing
something wrong, hence my mail to the list here -can someone quickly
confirm if I'm on the right track?

I have a copy of the request FR 3.0.12 sends and the response I send back:

[root at snf-734018 ticker]# openssl ocsp -reqin realrequest.der -req_text
OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha1
          Issuer Name Hash: DCEB2C72264239201A4A5DF547C78268A1CB33A2
          Issuer Key Hash: BC8DDD42F7B3B458E8ECEE403D21D404CEB9F2D0
          Serial Number: 0BA50D497E
[root at snf-734018 ticker]# openssl ocsp -respin realresponse.der -resp_text
OCSP Response Data:
    OCSP Response Status: successful (0x0)
    Response Type: Basic OCSP Response
    Version: 1 (0x0)
    Responder Id: O = eduroam, OU = eduroam-as-a-Service, CN =
eduroam-as-a-Service Client Auth Issuing CA - Prototype
    Produced At: Jan 11 08:24:56 2017 GMT
    Responses:
    Certificate ID:
      Hash Algorithm: sha256
      Issuer Name Hash:
7A6CC4FC2F34491E91A8764D1F0990FB8FE02FE6FD64713AE4DCE0E731E5B508
      Issuer Key Hash:
D9CE624ED036FD290E8BDA9A36107D40D37C41DF1BB268741157074D66B3C038
      Serial Number: 0BA50D497E
    Cert Status: good
    This Update: Jan 11 08:24:56 2017 GMT
    Next Update: Jan 21 08:24:56 2017 GMT

    Signature Algorithm: sha256WithRSAEncryption

As can be seen, the request is about the same certificate (by serial),
and the issuer and key are identical (I verified that out-of-band; it's
my own CA and my own response generator. I am sure all is good.).

But: FreeRADIUS sends the name and key hashes hashed with SHA1; my
resonse does the hashes with SHA256.

The result in debug mode is:

Wed Jan 11 03:56:13 2017 : Debug: (54) eap_tls: Starting OCSP Request
Wed Jan 11 03:56:13 2017 : Debug: (54) eap_tls: ocsp: Using responder
URL "http://ocsp-test.hosted.eduroam.org:80/ticker/"
Wed Jan 11 03:56:13 2017 : ERROR: (54) eap_tls: ocsp: No Status found
Wed Jan 11 03:56:13 2017 : ERROR: (54) eap_tls: ocsp: Certificate has
been expired/revoked

The Status sits right there in the response: "Cert Status: good" but for
some reason FR won't accept it.

I believe it would be easy to fix this; calculate the name and key
hashes for both algos and check if the response matches any one of those.

I thought I could slap you with RFC6960's section 4.3: "Clients that
request OCSP services SHALL be capable of processing responses signed
using RSA with SHA-256 (identified by the sha256WithRSAEncryption OID
specified in [RFC4055]). "

but that one only pertains to the signature hash algorithm of the full
response (which is sha256, and which does not seem to be the issue here).

So, is all that correct?

For the moment I will generate responses with SHA1 name and key hashes.
But it feels like a step in the wrong direction.

Greetings,

Stefan Winter

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
2, avenue de l'Université
L-4365 Esch-sur-Alzette

Tel: +352 424409 1
Fax: +352 422473

PGP key updated to 4096 Bit RSA - I will encrypt all mails if the
recipient's key is known to me

http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC0DE6A358A39DC66
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20170111/6e3a4e4e/attachment-0001.sig>


More information about the Freeradius-Users mailing list