Send request to obtain the revocation status of an X.509 certificate.
Impact connection performance.
Leak privacy (others know who accessed something).
OCSP Stapling
Cache OCSP result and integrate it in TLS handshake.
client->server: client hello
note right of server: valid OCSP response?
note right of server: Y -> use cached OCSP response
server->CA: N -> OCSP request
CA->server: OCSP response
server->client: server hello
note left of server: certificate/certificate status
note left of client: valid certificate?
client->server: Y -> complete handshake
client->server: N -> abort handshake
The real world - revoking might not work
Browsers might not ask revocation status from CRL/OCSP.
Browsers maintain their own certificate revoke list or behavior.
To initialize connection faster.
DV/OV/EV
Domain Validation
Control the domain
Organization Validation
Registered organization
Extended Validation
Business detail (accountant, etc)
VIP
Client
Browser
Cert DV
Cert EV
Comment
Chrome/Edge (Windows)
(?)
always ignored(?)
Firefox (OCSP on (default))
OneCRL
Firefox (OCSP off)
OneCRL
Safari
Chrome/Edge (MacOS)
based on MacOS
IE
very strict
Android
always ignored
Conclusion
Experience
Authentication is not as strict as you think.
When handling authentication, doubt it first.
Slogan
質疑是資安的根本
郭學聰 Hsueh-Tsung Kuo2022_10_15
Resource
Reference
How Do Browsers Handle Revoked SSL/TLS Certificates?
不能相信的相信我之術: 網路連線雙方驗證時,那些意想不到的坑 Don't bieleve "Believe me" the pitfalls of authentication 郭學聰 Hsueh-Tsung Kuo Sat, 15 Oct 2022 CC BY-SA 4.0
{"metaMigratedAt":"2023-06-17T05:31:30.890Z","metaMigratedFrom":"YAML","breaks":true,"description":"View the slide with \"Slide Mode\".","slideOptions":"{\"spotlight\":{\"enabled\":false},\"allottedMinutes\":40}","title":"Don't bieleve \"Believe me\" - the pitfalls of authentication","contributors":"[{\"id\":\"ea27dcd7-a3f2-47c2-b25e-6760e7936c38\",\"add\":35692,\"del\":15273}]"}