From e34d3c68f457d4ca8238a604aff4bfe8727ebe0d Mon Sep 17 00:00:00 2001 From: Jeremy Harris Date: Sat, 14 Jan 2023 13:14:15 +0000 Subject: [PATCH] Docs: expand OCSP description --- doc/doc-docbook/spec.xfpt | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/doc/doc-docbook/spec.xfpt b/doc/doc-docbook/spec.xfpt index 49ec9fd4e..6545d091b 100644 --- a/doc/doc-docbook/spec.xfpt +++ b/doc/doc-docbook/spec.xfpt @@ -30000,10 +30000,13 @@ file from every certificate authority they know of. .next The way with most moving parts at query time is Online Certificate Status Protocol (OCSP), where the client verifies the certificate -against an OCSP server run by the CA. This lets the CA track all -usage of the certs. It requires running software with access to the -private key of the CA, to sign the responses to the OCSP queries. OCSP -is based on HTTP and can be proxied accordingly. +against an OCSP server run by the CA. +OCSP is based on HTTP and can be proxied accordingly. +It requires the CA running software with access to the +private key of the CA, to sign the responses to the OCSP queries. +Because every client TLS transaction with a server results in an OCSP +access to the CA, it results in a heavy load on the CA. +It also lets the CA track all usage of the certs, which is a privacy problem. The only widespread OCSP server implementation (known to this writer) comes as part of OpenSSL and aborts on an invalid request, such as @@ -30013,7 +30016,8 @@ re-entering the passphrase each time some random client does this. .next The third way is OCSP Stapling; in this, the server using a certificate issued by the CA periodically requests an OCSP proof of validity from -the OCSP server, then serves it up inline as part of the TLS +the OCSP server (probably using the original OCSP above), +then serves it up inline as part of the TLS negotiation. This approach adds no extra round trips, does not let the CA track users, scales well with number of certs issued by the CA and is resilient to temporary OCSP server failures, as long as the server -- 2.30.2