2013
DOI: 10.17487/rfc6960
|View full text |Cite
|
Sign up to set email alerts
|

X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP

Abstract: This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents. This document obsoletes RFCs 2560 and 6277. It also updates RFC 5912.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
121
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 353 publications
(136 citation statements)
references
References 5 publications
0
121
0
Order By: Relevance
“…(2) OCSP scheme: the OCSP scheme is a protocol proposed by the IETF's PKIX working group in RFC2560 [1,2]. Compared with the certificate revocation information provided by CRL, it can meet the requirement of more timely operation, so the OCSP scheme can be used as a substituting or supplementary mechanism of CRL.…”
Section: Wpki's Certificate Verification Schemementioning
confidence: 99%
See 2 more Smart Citations
“…(2) OCSP scheme: the OCSP scheme is a protocol proposed by the IETF's PKIX working group in RFC2560 [1,2]. Compared with the certificate revocation information provided by CRL, it can meet the requirement of more timely operation, so the OCSP scheme can be used as a substituting or supplementary mechanism of CRL.…”
Section: Wpki's Certificate Verification Schemementioning
confidence: 99%
“…The CDS OCSP-based scheme performs cross-validation among four entities. So, assuming that the deployment of all certificates has been completed, which includes the OCSP server certificate [9], and that the request and response format is appropriately modified in OCSP [2,21,22], the interactive procedure among the mobile terminal, the content server, the directory server, and the OCSP server is described as shown in Figure 6.…”
Section: The Procedures Of Cds Ocsp-basedmentioning
confidence: 99%
See 1 more Smart Citation
“…A certificate revocation list (CRL) [14] is a list of revoked credential identifiers, published by the issuer. Alternatively, the verifier can ask the issuer if a credential is still valid using the Online Certificate Status Protocol (OCSP) [27]. Both situations require the credential to be recognizable, which is undesirable for ABCs.…”
Section: Related Workmentioning
confidence: 99%
“…During TLS tunnel establishment, TLS extensions MAY be used. For instance, the Certificate Status Request extension [RFC6066] and the Multiple Certificate Status Request extension [RFC6961] can be used to leverage a certificate-status protocol such as Online Certificate Status Protocol (OCSP) [RFC6960] to check the validity of server certificates. TLS renegotiation indications defined in RFC 5746 [RFC5746] MUST be supported.…”
Section: Teap Authentication Phase 1: Tunnel Establishmentmentioning
confidence: 99%