2015
DOI: 10.17487/rfc7633
|View full text |Cite
|
Sign up to set email alerts
|

X.509v3 Transport Layer Security (TLS) Feature Extension

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…Recently, all the web browsers have introduced an additional approach for checking a PKC's status, called OCSP stapling [16][17][18]. In OCSP stapling, CAs issue certificates with this new extension, which requires the web server to send a cached OCSP response in the TLS handshake.…”
Section: ) Analysis Of the Resultsmentioning
confidence: 99%
“…Recently, all the web browsers have introduced an additional approach for checking a PKC's status, called OCSP stapling [16][17][18]. In OCSP stapling, CAs issue certificates with this new extension, which requires the web server to send a cached OCSP response in the TLS handshake.…”
Section: ) Analysis Of the Resultsmentioning
confidence: 99%
“…Moreover, HPKP is only effective after the first connection is established and for a limited amount of time. A number of other mechanisms, such as HSTS [31] and OCSP Must-Staple [28], suffer from the same problem. Besides, HSTS only enforces the use of HTTPS, while OCSP stapling only addresses the revocation problem; neither provides resilience against CA compromise.…”
Section: Lessons Learnedmentioning
confidence: 99%
“…OCSP Must-Staple [25] was proposed in 2015 to remedy this issue. An X.509 certificate extension signals the browser to block the connection if the OCSP Staple is missing.…”
Section: Network-assisted Revocationmentioning
confidence: 99%
“…For CRLs and OCSP these requirements are highly variable depending on the usage of certificates by a given client, though average costs can be established for both of these strategies. For 7 While other revocation strategies also allow clients to adopt a hard-fail policy (such as OCSP Must-Staple [25] and RITM [8]), no other previously proposed strategy can do so without adding new entities in the PKI ecosystem or forcing relatively high numbers of servers to change their configurations and key management practices.…”
Section: A Efficiencymentioning
confidence: 99%