Solved

CRL Certificate Revocation

Posted on 2007-11-26
3
1,079 Views
Last Modified: 2008-02-23
Hi,

We run Oracle ias, in particular  Apache web server.  We use Verisign Certificates for login screens, and some of our users complain about the CRL revocation List error message - see http://www.experts-exchange.com/Security/Q_21426751.html.  
How can i check out the CRL and check if our certificate is included in the CRL, and if incorrect or not there, how can we add it?

many thanks,  Duncan
0
Comment
Question by:ddstyles
  • 2
3 Comments
 

Author Comment

by:ddstyles
ID: 20354661
I think I found a link:  http://crl.verisign.com/  I'm having a look here.  
0
 

Author Comment

by:ddstyles
ID: 20354684
Further investigation shows the browser stores the revocation lists, and updates automatically.  Browsers getting the revocation error must be prevented from accessing the crl sites (i.e. proxy settings) or the crls are not enabled in the browser.  I'm using firefox, and the settings are found in edit preferences, advanced, encryption, revocation lists.    I hope this helps others.  
0
 

Accepted Solution

by:
EE_AutoDeleter earned 0 total points
ID: 20968413
jonas_pina,
Because you have presented a solution to your own problem which may be helpful to future searches, this question is now PAQed and your points have been refunded.

EE_AutoDeleter
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In Solr 4.0 it is possible to atomically (or partially) update individual fields in a document. This article will show the operations possible for atomic updating as well as setting up your Solr instance to be able to perform the actions. One major …
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now