https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3015
Summary: OID 1.3.6.1.5.5.7.41.1.5 (id-pkix-ocsp-nocheck) not
recognized by BER dissector.
Product: Wireshark
Version: 1.0.0
Platform: PC
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: adam.buchbinder@xxxxxxxxx
Created an attachment (id=2431)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=2431)
Captured packet bearing the cert in question.
Build Information:
wireshark 1.0.0
Copyright 1998-2008 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GTK+ 2.12.9, with GLib 2.16.1, with libpcap 0.9.8, with libz
1.2.3.3, with POSIX capabilities (Linux), with libpcre 7.4, without SMI, with
ADNS, with Lua 5.1, with GnuTLS 2.0.4, with Gcrypt 1.2.4, with MIT Kerberos,
with PortAudio V19-devel (built Mar 12 2008), without AirPcap.
Running on Linux 2.6.24-21-generic, with libpcap version 0.9.8.
Built using gcc 4.2.3 (Ubuntu 4.2.3-2ubuntu7).
--
Capture a session that involves visiting https://bugs.wireshark.org/ with an
OCSP-capable browser. The attached packet with the relevant cert in the OCSP
response should be returned.
In the sent certificate, the OID
1.3.6.1.5.5.7.41.1.5 is not implemented.
It's described as being for id-pkix-ocsp-nocheck, described in RFC 2560 as:
id-pkix-ocsp OBJECT IDENTIFIER ::= { id-ad-ocsp }
id-pkix-ocsp-nocheck OBJECT IDENTIFIER ::= { id-pkix-ocsp 5 }
More information is available at:
http://www.alvestrand.no/objectid/submissions/1.3.6.1.5.5.7.48.1.5.html
http://www.apps.ietf.org/rfc/rfc2560.html#sec-4.2.2.2.1
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.