Black Box ET0010A Appliance Trim Kit User Manual


 
Using Enhanced Security Features
290 EncrypTight User Guide
In order to use OCSP, you must enable it on each EncrypTight component.
ETEPs can read the URL from the certificate itself, but you can specify a URL to use if needed.
The EncrypTight software and the ETKMSs provide additional options that allow you to specify the
default action if no OCSP responder can be located or if the URL cannot be contacted. When OCSP is
enabled, EncrypTight and the ETKMS try to check the revocation status using OCSP.
If no default OCSP responder is defined, then EncrypTight and the ETKMS check the certificate to
determine the URL to use to contact an OCSP responder.
If there is no OCSP URL defined in the certificate, you can specify that EncrypTight and the ETKMS
check the certificate for the URL of a CRL Distribution Point as a fallback.
If the CRL Distribution Point URL is not present or if the URL cannot be reached, the validation
fails. Unlike using CRLs only, there is no option to ignore revocation check failures in this scenario.
By default, the system assumes that OCSP responses are signed by the issuer of the certificate whose
status is being checked. You can override this and specify an alternative signer by entering the subject
name of the signer’s certificate.
In addition, in order to verify the response from the OCSP responder, you need to install the certificate
from the OCSP responder. For more information about installing certificates, see “Installing an External
Certificate” on page 280.
To set up OCSP in EncrypTight:
1 In the EncrypTight software, click Edit > Preferences.
2 In the tree, expand the ETEMS item and click Communications (see Figure 95).
3Click Enable Online Certificate Status Protocol (OCSP).
4 Configure other options as needed (see Table 79).
5Click OK.
Table 79 EncrypTight OCSP Options
Options Description
Enable Online Certificate
Status Protocol (OCSP)
Enables and disables the use of OCSP in the EncrypTight software. By
default, this is disabled.
OCSP Responder
Certificate Distinguished
Name
Specifies the subject name of the certificate for the OCSP responder.
Verify OCSP Responder Specifies that messages from the OCSP responder should be
authenticated using the installed certificate. To use this option, you must
install a certificate for the OCSP responder.
Ignore Failure to Respond Specifies that the lack of a response from the OCSP responder should
be ignored.
Revert to CRL on OCSP
Responder Failure
Specifies that if the OCSP responder does not reply or cannot be
reached, EncrypTight should read the certificate to determine the
location of the CRL to use to validate the certificate. Note that
authentication fails when OCSP is enabled and a CRL cannot be
accessed as a fallback.
Check OCSP Responder
Certificate Chain
Specifies that every certificate in the certificate chain of the OCSP
responder should be checked.
OCSP URL Specifies the URL to use for OCSP checking. This option overrides the
use of any OCSP URL that might be indicated in certificates.