The Problem is, for internal RDP Access or internal Exchange CA, we need a CRL Url, as MS forces it to be present.
It is not about OCSP/CRT which one is better or if it is useful. It is just about what MS dictates. Thats the law.
Currently we can make CRL files, but the URL is not included in the Certificate.
We just would need a simple Attribute for the CRL, which could be manually entered (or defaulted).
This would be no security risk. it does not need to be managed.
Also it would be good practice and a useful optional feature to just set the url.
It would be very easy to implement (i guess 10 minutes ;-), it has not disadvantage and is logical, as it adds a connection to the already offered crl.
Currently it is strange, that we can make CRL but not add them to certs anyway.
Nevertheless if opnSense would upload and maintain the CRL list using sftp on a webserver it would be perfect.
But this would be much work todo, so i did not suggest the full feature.
It is good practice, to use your own CA for management devices etc.
The own CA is better than any third-party one imho.
Also for internal IPs it is not possible to gain Certs from big CAs.
If a CRL is not set, we are forced to use the self-signed snail certs from MS or have to deploy AD Certs...
It is not about OCSP/CRT which one is better or if it is useful. It is just about what MS dictates. Thats the law.
Currently we can make CRL files, but the URL is not included in the Certificate.
We just would need a simple Attribute for the CRL, which could be manually entered (or defaulted).
This would be no security risk. it does not need to be managed.
Also it would be good practice and a useful optional feature to just set the url.
It would be very easy to implement (i guess 10 minutes ;-), it has not disadvantage and is logical, as it adds a connection to the already offered crl.
Currently it is strange, that we can make CRL but not add them to certs anyway.
Nevertheless if opnSense would upload and maintain the CRL list using sftp on a webserver it would be perfect.
But this would be much work todo, so i did not suggest the full feature.
It is good practice, to use your own CA for management devices etc.
The own CA is better than any third-party one imho.
Also for internal IPs it is not possible to gain Certs from big CAs.
If a CRL is not set, we are forced to use the self-signed snail certs from MS or have to deploy AD Certs...
"