https://bz.apache.org/bugzilla/show_bug.cgi?id=56148

--- Comment #24 from Christopher Schultz <ch...@christopherschultz.net> ---
(In reply to logo from comment #22)
> @Chris: while this may be true for LE, I haven't read anything about
> terminating OCSP in browsers or any other CA.

In July 2023, the CAB forum removed the requirement for CAs to support OSCP.

> For myself I use OCSP for my internal CA (SmallStep) and I'm far more
> comfortable with the online version than having to recreate CRLs myself and
> reload them manually in Tomcat.

Are you talking about clients (browsers) checking server certificates, or
servers (e.g. Tomcat) checking client certificates? Because you NEVER have to
load a CRL into Tomcat unless you are performing client-certificate validation
on your server.

> Beware CRLs in the regular CAs are not optimized and can still become
> painfully big.

Cascading bloom filters will set you free. Every certificate revocation in the
history of x509 certificates can fix into a few kilobytes. And you don't need
every cert revoked for all time, you only need the ones that were revoked
before their expirations.

I don't really have a dog in this fight, but I do have to admit that I think
CRLite can fix the "revocation problem" -- which has NEVER been adequately
solved in the past -- once and for all. OCSP was another attempt at fixing
things that came with a whole bunch of other problems itself.

My comment #20 was intended to provide a small update to this old OLD issue
request because it's possible that the industry is going to move away from OCSP
and anything we don't have to implement, we shouldn't.

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to