smart card logon revocation
Hi all, I've setup smart card logon on a 2008 R2 PKI server with an AD 2008 R2. I've revoke the certificate and published the crl on the PKI server. I can always be connected with my smart card, the certicate is always valid. What should I do to disable immediatly a smart card? Thanks in advance
June 14th, 2011 10:04am

have you considered using OCSP in addition to CRLs?
Free Windows Admin Tool Kit Click here and download it now
June 14th, 2011 11:53am

No such thing with the Microsoft solutions currently. You would need to move to a 3rd party OCSP Responder (such as Tumbleweed) which directly connects to the CA database, rather than how the MS OCSP responder uses CRLs for its revocation decisions. In addition, you would need to use a custom OCSP client that would implement either a NONCE in each request or a signed request (to prevent cached responses from being returned by the OCSP Responder. Brian
June 14th, 2011 11:41pm

Brian, so what is the AD CS OCSP used for then? http://technet.microsoft.com/en-us/library/cc731027(WS.10).aspx
Free Windows Admin Tool Kit Click here and download it now
June 15th, 2011 1:19am

On Wed, 15 Jun 2011 05:14:12 +0000, S.Kwan wrote: Brian, so what is the AD CS OCSP used for then? http://technet.microsoft.com/en-us/library/cc731027(WS.10).aspx The 4 bullet points listed under What Does OCSP Support Do?. Notice that not one of them refer to real time status checking, but rather 3 of the 4 refer to reducing network traffic when performing certificate validation. Paul Adare MVP - Identity Lifecycle Manager http://www.identit.ca Congratulations! You are the one-millionth user to log into our system.
June 15th, 2011 1:41am

Hi Brian, If I can't use the OCSP, how can I distribute a new CRL automatically to all the DCs? Do we have a GPO to setup the period where the DC download a new CRL? Is it setup by default? I don't want to modify the current period of the CRL. Thanks
Free Windows Admin Tool Kit Click here and download it now
June 15th, 2011 6:16am

Hi Paul, In that same document (above the bullet points) it says: "Unlike CRLs, which are distributed periodically and contain information about all certificates that have been revoked or suspended, an Online Responder receives and responds only to requests from clients for information about the status of a single certificate" So I must be misunderstanding this, cause to me it sounds like a realtime status revocation checking ability of AD CS OCSP? Please could you clarify. Thank you
June 15th, 2011 10:07am

On Wed, 15 Jun 2011 14:01:57 +0000, S.Kwan wrote: "Unlike CRLs, which are distributed periodically and contain information about all certificates that have been revoked or suspended, an Online Responder receives and responds only to requests from clients for information about the status of a single certificate" So I must be misunderstanding this, cause to me it sounds like a realtime status revocation checking ability of AD CS OCSP? This is still just contrasting the fact that a CRL contains all revoked certificates whereas an OCSP response only returns the status of the actual certificate that is being verified, it says nothing at all about realtime status. Bottom line is that Microsoft's implementation of OCSP is most definitely not realtime. Paul Adare MVP - Identity Lifecycle Manager http://www.identit.ca Hackers have kernel knowledge.
Free Windows Admin Tool Kit Click here and download it now
June 15th, 2011 10:20am

100% understood, thanks Paul.
June 15th, 2011 10:36am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics