Hi,

Alaric Dailey wrote:

>> Actually this wouldn't be an improvement and there is various reason why
>> CRLs were replaced with OCSP, and OCSP revocation checks should be
>> turned on by default, although I'd be more interested to see OCSP
>> proxying by the website implemented to protect end user privacy.
>>
>>   
> Not to take this discussion to far off track, but why would the user
> trust a proxied verification of the cert they are trying to verify?
> Something else should be done about that.

It can trust the verification, since the verification is timestamped and
signed by the OCSP responder anyway, it doesn´t matter much, whether the
client fetches it directly or gets if forwarded.

The difference I see is that the verification through OCSP is normally
unencrypted (I would have wanted to suggest running OCSP through SSL, but
how do you verify the certificate of the SSL server for the SSL connection
to the OCSP responder?), and therefore the OCSP request and the OCSP
response are being sent in cleartext (they are only integrity protected
with digital signatures). Such clear-text OCSP requests are providing a lot
of interesting material for traffic analysis. (which is partly why we
wanted the encryption in the first place ...)

So the solution the proxying by the webserver proposes is that the webserver
regularly (every 20 minutes perhaps) gets an OCSP verification for it´s
server certificate, caches that for 20 minutes, and whenever a client makes
an SSL connection, the webserver sends both the Server certificate, and the
latest OCSP response together in the SSL handshake.
If the Browser gets the OCSP response through the SSL handshake, and the
OCSP response is still valid, and the OCSP response is still fresh, then
the Browser does not need to go and ask the OCSP server for a OCSP
response.
This would solve a couple of problems at once:
* Privacy of the client regarding the OCSP Server
* More efficient for the OCSP Server for High-volume webservers, where a lot
of Browser clients would contact the OCSP Server directly, now the OCSP
Server only gets 1 request every 20 minutes from that server.

You can think of the OCSP response as a refreshed server certificate that
way.

The problem is that this scenario only helps for Webservers, it doesn´t help
for S/Mime in Emails, ...
And it currently doesn´t seem as if browser vendors and webserver vendors
will support it soon.

I haven´t actually tried all that myself yet, so I might have got it wrong
somewhere.

Best regards,
Philipp Gühring
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to