Is the web ready for OCSP must-staple?

27Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

Abstract

TLS, the de facto standard protocol for securing communications over the Internet, relies on a hierarchy of certificates that bind names to public keys. Naturally, ensuring that the communicating parties are using only valid certificates is a necessary first step in order to benefit from the security of TLS. To this end, most certificates and clients support OCSP, a protocol for querying a certificate's revocation status and confirming that it is still valid. Unfortunately, however, OCSP has been criticized for its slow performance, unreliability, soft-failures, and privacy issues. To address these issues, the OCSP Must-Staple certificate extension was introduced, which requires web servers to provide OCSP responses to clients during the TLS handshake, making revocation checks low-cost for clients. Whether all of the players in the web's PKI are ready to support OCSP Must-Staple, however, remains still an open question. In this paper, we take a broad look at the web's PKI and determine if all components involved-namely, certificate authorities, web server administrators, and web browsers-are ready to support OCSP Must-Staple. We find that each component does not yet fully support OCSP Must-Staple: OCSP responders are still not fully reliable, and most major web browsers and web server implementations do not fully support OCSP Must-Staple. On the bright side, only a few players need to take action to make it possible for web server administrators to begin relying on certificates with OCSP Must-Staple. Thus, we believe a much wider deployment of OCSP Must-Staple is an realistic and achievable goal.

References Powered by Scopus

The matter of heartbleed

485Citations
N/AReaders
Get full text

Analysis of the HTTPS certificate ecosystem

227Citations
N/AReaders
Get full text

When private keys are public: Results from the 2008 debian openssl vulnerability

118Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?

34Citations
N/AReaders
Get full text

Let's Revoke: Scalable Global Certificate Revocation

31Citations
N/AReaders
Get full text

TLS 1.3 in practice:how tls 1.3 contributes to the internet

24Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Chung, T., Choffnes, D., Mislove, A., Lok, J., Levin, D., Rula, J., … Sullivan, N. (2018). Is the web ready for OCSP must-staple? In Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC (pp. 105–118). Association for Computing Machinery. https://doi.org/10.1145/3278532.3278543

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 10

77%

Researcher 2

15%

Lecturer / Post doc 1

8%

Readers' Discipline

Tooltip

Computer Science 12

80%

Engineering 2

13%

Physics and Astronomy 1

7%

Article Metrics

Tooltip
Mentions
News Mentions: 1
References: 4

Save time finding and organizing research with Mendeley

Sign up for free