50 likes | 171 Vues
This document explores the intersection of revocation standards in Web Public Key Infrastructure (WebPKI), focusing on PKIX standards, particularly the semantics of revocation reasons and how to interpret them. It discusses OCSP (Online Certificate Status Protocol) stapling support across various servers (Apache, IIS, LiteSpeed, nginx) and answers questions regarding default configurations, server certificate status checks, and the frequency of certificate updates. Additionally, it covers supported revocation checking mechanisms, user experiences based on certificate validity, and trusted sources for CRL and OCSP responses.
E N D
Revocation in WebPKI PhillHallam-Baker Comodo
Standards intersection PKIX OTHER
PKIX but not RFC5280 • Semantics of Revocation Reasons • Says what tag to use • Not what tag means or when to use it • [X.509 spec has definitions]
Servers • Is OCSP stapling supported? • Yes (Apache, IIS, LiteSpeed, ngnix) • [Is OCSP stapling on by default?] • [Does server check cert status regularly?] • [Are frequent certificate updates supported?]
Clients • Supported Revocation Checking Mechanisms • CRL / OCSP? • User Experience for Certificate Status Invalid? • User Experience for Certificate Status Valid? • What sources are trusted to sign CRLs or OCSP responses? • Does this vary for DV/EV?