Re: OCSP and privacy concerns

2009-01-19 Thread Robert Relyea
Michael Ströder wrote: Nelson Bolyard wrote: OCSP stapling allows a TLS server to send a copy of a recent OCSP response (issued by the issuer of that server's cert) along with the cert in the TLS handshake, thereby saving the client extra connections and extra round trips. It reduces load on

Re: OCSP and privacy concerns

2009-01-16 Thread Michael Ströder
Nelson Bolyard wrote: > OCSP stapling allows a TLS server to send a copy of a recent OCSP > response (issued by the issuer of that server's cert) along with the > cert in the TLS handshake, thereby saving the client extra connections > and extra round trips. It reduces load on OCSP responders. Ah

Re: OCSP and privacy concerns

2009-01-15 Thread Nelson Bolyard
Michael Ströder wrote, On 2009-01-15 08:23: > Johnathan Nightingale wrote: >> You may also be interested in the work on OCSP-stapling, so that no >> third party learns about your browsing, but you still get a CA-signed >> OCSP response. The CAs are interested in this too, since it takes the >>

Re: OCSP and privacy concerns

2009-01-15 Thread Michael Ströder
Johnathan Nightingale wrote: > On 9-Jan-09, at 9:38 AM, Michael Ströder wrote: >> Can OCSP still be disabled? Personally I have strong privacy concerns >> since when checking for a server cert via OCSP the OCSP responder knows >> which server you try to access (because the FQDN is in the server cer

Re: OCSP and privacy concerns (was: CABForum place in the world)

2009-01-09 Thread Johnathan Nightingale
On 9-Jan-09, at 9:38 AM, Michael Ströder wrote: Johnathan Nightingale wrote: To give you a somewhat recent example, we were strong proponents of mandatory OCSP support by 2010 because we think it's better for the health of the net to have high-availability revocation information available fo

OCSP and privacy concerns (was: CABForum place in the world)

2009-01-09 Thread Michael Ströder
Johnathan Nightingale wrote: > To give you a > somewhat recent example, we were strong proponents of mandatory OCSP > support by 2010 because we think it's better for the health of the net > to have high-availability revocation information available for > high-assurance certs, despite the arguments