Oh and Thawte released a whitepaper about that :
http://www.thawte.com/assets/documents/whitepaper/ocsp-stapling.pdf

Hervé.

On 01/31/2014 03:18 PM, Hervé COMMOWICK wrote:
> Hello,
> 
> Just to move this subject back up, 2 links about OCSP stapling :
> - https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/
> -
> http://news.netcraft.com/archives/2013/07/19/microsoft-achieves-world-domination-in-ocsp-stapling.html
> 
> In short, support on client and server side is clearly increasing but
> the main goal is not reached, as OCSP remains necessary for intermediate
> certificate.
> 
> A new RFC has been wrote to handle those remaining case :
> http://tools.ietf.org/html/rfc6961
> 
> Hervé.
> 
> On 11/06/2012 11:08 PM, Willy Tarreau wrote:
>>> I would say the periodic-request aspect of it is pretty trivial; you add a
>>> timer to the event loop that expires in some configurable amount of time,
>>> e.g. a bit before the last OCSP response expires, and you cache the result
>>> until it expires or a more recent result overwrites it. Given that the
>>> overhead of making a single OCSP request for the cert inside HAProxy is very
>>> low, you can easily do this every few minutes with no perceivable overhead.
>>> Obviously some logic re: failing requests and retrying has to be 
>>> implemented,
>>> which amounts to nothing more than a formulation for how much time to wait
>>> until retrying again.
>>
>> I confirm that this part it clearly nothing.
>>
>>> The user should also be able to configure whether to
>>> deliver an expired OCSP response or none at all in the case that an upstream
>>> OCSP response cannot be received by the time the currently cached response
>>> expires.
>>
>> That's one of the points of attention, I agree.
>>
>>> A single timer and single cache slot are used for each certificate chain. 
>>> The
>>> timer is reset with a new value when:
>>> - a request fails; in this case we need
>>>   to use our retry/backoff algorithm to decide how long to wait before
>>>   retrying;
>>> - a request succeeds; in this case we need to use our expires algorithm,
>>>   which can be parameterized over the expiration time of the OCSP response, 
>>> to
>>>   decide how long to wait before trying to get a fresh response.
>>
>> Hmmm OK it's per certificate... Obviously in fact. So that probably means
>> some funny mechanisms to connect to various places depending on the cert
>> chain (eg: for those connecting via proxies, etc...).
>>
>>> One thing to keep in mind is that OCSP stapling in many libraries has (or
>>> had, at one point) buggy or nonexistent support for OCSP payloads containing
>>> multiple certificates,
>>
>> That's a very useful and interesting piece of information.
>>
>>> and a bit of research should be done prior to
>>> implementation to discover the current state of the world in this regard.
>>
>> I agree!
>>
>>> I believe the official word at one point was that OCSP stapling of chains
>>> should be accomplished by including the entire chain in the OCSP request,
>>> delivering that compound OCSP response via the TLS Certificate Status 
>>> Request
>>> extension.
>>
>> And do you know how large this could be for average web sites ? Maybe
>> there is a cross-over point where doing so has a more negative impact
>> than letting the client check by itself ?
>>
>> Thanks for your comments and suggestions!
>> Willy
>>
>>
> 

-- 
Hervé COMMOWICK
Ingénieur systèmes et réseaux.

http://www.rezulteo.com
by Lizeo Online Media Group <http://www.lizeo-online-media-group.com/>
42 quai Rambaud - 69002 Lyon (France) ⎮ ☎ +33 (0)4 26 99 03 77

Reply via email to