Search results
Results From The WOW.Com Content Network
The OCSP responder uses the certificate serial number to look up the revocation status of Alice's certificate. The OCSP responder looks in a CA database that Carol maintains. In this scenario, Carol's CA database is the only trusted location where a compromise to Alice's certificate would be recorded.
OCSP suffers from scalability issues. It relies on the client having network access at the time of checking the certificate's revocation status; further, the OCSP responder must be accessible and produce usable responses, or else the check will fail and the client must choose between failing-soft and failing-hard.
OCSP stapling is designed to reduce the cost of an OCSP validation, both for the client and the OCSP responder, especially for large sites serving many simultaneous users. However, OCSP stapling supports only one OCSP response at a time, which is insufficient for certificate chains with intermediate CA certs. [26] [27]
Browsers and other relying parties might use CRLs, or might use alternate certificate revocation technologies (such as OCSP) [4] [5] or CRLSets (a dataset derived from CRLs [6]) to check certificate revocation status. Note that OCSP is falling out of favor due to privacy and performance concerns [7] [8] [9]. Subscribers and other parties can ...
The group's primary focus [15] was promoting an understanding of the importance of certificate revocation checking and the benefits of OCSP stapling. The protocol is intended to ensure that web users are aware when they visit a web site with a revoked or expired SSL certificate. [16]
Without revocation, an attacker would be able to exploit such a compromised or misissued certificate until expiry. [31] Hence, revocation is an important part of a public key infrastructure. [32] Revocation is performed by the issuing CA, which produces a cryptographically authenticated statement of revocation. [33]
Their use doesn't involve the problems of trusting third parties that may improperly sign certificates. Self-signed certificate transactions usually present a far smaller attack surface by eliminating both the complex certificate chain validation, [1] and certificate revocation checks like CRL and OCSP.
OCSP stapling; Online Certificate Status Protocol; R. Certificate revocation list This page was last edited on 21 March 2023, at 14:01 (UTC). Text ...