The TL;DR is that in the future we expect OCSP to be a lot less relevant.

I checked with our team, and the general story is that currently if there
is a valid OCSP stapled response we use it but otherwise do OCSP

In the future when we have CRLite enabled and it applies to the
certificate, then we plan to mostly rely on CRLite and ignore what's in
OCSP. We have been looking at a transitional mode where we double-check
apparently CRLite-revoked certificates with OCSP in which case we would
behave as above.

-Ekr


On Fri, Sep 16, 2022 at 8:43 AM Salz, Rich <rsalz=
40akamai....@dmarc.ietf.org> wrote:

> I think this is of general interest, so I’m posting here rather than
> poking friends I know.
>
>
>
> Browsers are phasing out doing OCSP queries themselves. The common
> justification, which makes sense to me, is that there are privacy concerns
> about leaking where a user is surfing.
>
>
>
> My question is, what are browsers doing, and planning, on doing about OCSP
> stapled responses? I think there are three possibilities:
>
>                 No stapled response
>
>                 A stapled, valid, “good” response
>
>                 A stapled, expired or “bad” response
>
>
>
> I can imagine two possibilities, proceeding or popping up a warning page.
> I haven’t seen the warning when there is no OCSP response, but maybe that
> does happen.
>
>
>
> We’re still going to staple good responses, when we have them, but I am
> wondering if long-term we should still bother?
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to