For additional context, here's s research study we published a few years
back on OCSP must-staple in the Web context:
https://cbw.sh/static/pdf/chung-imc18.pdf

Nick

On Wed, Jan 19, 2022 at 11:58 AM Mohit Sahni <mohit06...@gmail.com> wrote:

> Hi,
> > So for the new BCP, we have three options:
> >
> > Add a SHOULD-level requirement (for TLS 1.3 implementations, possibly
> also TLS 1.2 implementations) to fail the handshake if the OCSP response is
> missing or invalid. (As far as we can tell, RFC 8446 is silent on this.)
> > Remove the whole discussion of OCSP, saying that in its current form
> it’s not adding value.
> > Maintain the status quo, where many people implement OCSP on the server
> side, but clients rarely benefit.
> >
> I don't think that OCSP is not adding value in its current form. I
> have seen a lot of OCSP implementations with hard fail, especially on
> the server side for authenticating clients using private PKI
> certificates. Although OCSP does not add much value on the client side
> as it's a bit fragile for public PKI and client side checks because of
> the matrix of multiple OCSP status producers and consumers at scale.
>
> -Mohit
>
> _______________________________________________
> Uta mailing list
> Uta@ietf.org
> https://www.ietf.org/mailman/listinfo/uta
>
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to