Search results
Results from the WOW.Com Content Network
Since an OCSP response contains less data than a typical certificate revocation list (CRL), it puts less burden on network and client resources. [10]Since an OCSP response has less data to parse, the client-side libraries that handle it can be less complex than those that handle CRLs.
OCSP has the primary benefit of requiring less network bandwidth, enabling real-time and near real-time status checks for high volume or high-value operations. As of Firefox 28, Mozilla has announced they are deprecating CRL in favour of OCSP.
The Online Certificate Status Protocol (OCSP) allows clients to interactively ask a server (an OCSP responder) about a certificate's status, receiving a response that is cryptographically authenticated by the issuing CA. [29] It was designed to address issues with CRLs. [30] A typical OCSP response is less than 1 kB. [31]
OCSP stapling is designed to reduce the cost of an OCSP validation, both for the client and the OCSP responder, especially for large sites serving many simultaneous users. However, OCSP stapling supports only one OCSP response at a time, which is insufficient for certificate chains with intermediate CA certs. [26] [27]
Their use doesn't involve the problems of trusting third parties that may improperly sign certificates. Self-signed certificate transactions usually present a far smaller attack surface by eliminating both the complex certificate chain validation, [1] and certificate revocation checks like CRL and OCSP.
X.509 and RFC 5280 also include standards for certificate revocation list (CRL) implementations. Another IETF-approved way of checking a certificate's validity is the Online Certificate Status Protocol (OCSP). Firefox 3.0 enabled OCSP checking by default, as did versions of Windows from at least Vista and later. [9]
It must be continuously updated with current CRL information from a certificate authority which issued the certificates contained within the CRL. While this is a potentially labor-intensive process, the use of a dedicated validation authority allows for dynamic validation of certificates issued by an offline root certificate authority .
Self-contained messages with protection independent of transfer mechanism – as opposed to related protocols EST and SCEP, this supports end-to-end security.; Full certificate life-cycle support: an end entity can utilize CMP to obtain certificates from a CA, request updates for them, and also get them revoked.