Figure 3: Schematic representation of an OCSP protocol
run. The request may be signed, the response, when con-
taining actual data, must be signed. (cf. (Santesson et al.,
2013))
response, indicating whether this particular certificate
has been revoked or not. While basically scaling bet-
ter than the CRL approach, additional load is put on
the CA’s OSCP responder, which now has to handle
each individual request. A possible way to alleviate
this problem is to employ OCSP stapling, as defined
in (Eastlake, 2011): here the certificate owner (which
in practice usually is the website’s server in the case of
HTTPS) periodically requests a validation of his own
certificate from the CA and sends this validation to-
gether with his certificate to connecting clients. Since
the validation is signed by the CA, a malicious server
is unable to forge this information.
This reduces the pressure on the responder, but
again introduces uncertainty periods, where a revoked
certificate is still considered valid by the client.
3 PRACTICAL EVALUATION
Our practical evaluation was twofold: first, we were
interested in how many certificates provide the lo-
cation of a CRL, how many provide an OCSP re-
sponder, and corresponding combinations of these
two values. For this we used the data-set collected
in (Durumeric et al., 2013a), containing a total of
66, 335, 624 HTTPS certificates.
From these, 9, 833, 063 (roughly 15%) contain a
CRL entry, 9, 295, 779 (approx. 14%) an OCSP en-
try, 9, 249, 263 (again approx. 14%) contained both,
and 56, 456, 045 (that is almost 85%) contained nei-
ther (note that from the 9, 295, 779 certificates con-
taining an OCSP entry, only 7, 130, 220 (that is ap-
prox. 11% of the total number of certificates) actually
contain the string ’OCSP’ in the corresponding au-
thorityInfoAccess field).
So we start with the insight that only about every
fifth HTTPS certificate actually contains revocation
information.
Second, we performed a preliminary analysis of
how different frameworks under different operating
systems react to an unreachable OCSP responder. In
particular, we tested the following software compo-
nents:
• Internet Explorer 8.0.6001.18702 for Windows
XP
• Internet Explorer 11.0.9600.17041for Windows 7
• Firefox 28.0 for Windows 7 and Windows XP
• Firefox 26.0 for Ubuntu 13.04
• Safari 5.1.7 for Windows 7 and Windows XP
• Opera 20.0.1387.91 for Windows 7 and Windows
XP
• Opera 12.16 for Ubuntu 13.04
• Chrome 34.0.1847.116 for Windows 7, Windows
XP, and Ubuntu 13.04
• Outlook 14.0.7116.5000 for Windows 7
• Java 7u55 for Windows 7, Windows XP, and
Ubuntu 13.04
• Adobe Acrobat Professional 8.0.0 for Windows 7
• Adobe Flash Player Installation 13.0.0.182 for
Windows 7
For the browsers we used the two HTTPS demo
sites from https://www.pki.dfn.de/crl/globalocsp/.
https://info.pca.dfn.de/uses a valid certificate con-
taining OCSP information, the certificate of the site
https://revoked-demo.pca.dfn.de/ is revoked, which
again can be verified using OCSP. Both sites were ac-
cessed using the browser’s default settings, first with-
out any modifications to the network connection, then
with an active Checkpoint Gaia R76 firewall blocking
access to the OCSP URL given in the certificates.
Table 1 gives an overview of our preliminary find-
ings, where the first half describes the behaviour with-
out the firewall, the second half with blocking of the
OCSP URL. Each cell gives the results for the website
with the valid and revoked certificate, respectively,
separated by a k. Possible reactions of the browsers
where blocking of the website, thereby impeding ac-
cess altogether (×), opening the websites without any
warnings (X) or presenting a dialogue-box for the
user to choose the preferred action (). The results
vary wildly depending on browser and operating sys-
tem, with Chrome effectively ignoring OCSP alto-
gether (as is also detailed in (Langley, 2014) and basi-
cally stems mainly from usability reasons in practice).
To summarize our findings with the other software
tested:
• The signed Java web start application we tested
(https://pki.pca.dfn.de/guira/guira.jnlp) ran in ev-
ery browser without any warnings, whether OCSP
was blocked or not.
DCNET2014-InternationalConferenceonDataCommunicationNetworking
38