What's the future of OCSP stapling? Is CRL reintroducing the downtime problem?

The big change that's happened in the CRL ecosystem in the last few years is that clients do not directly fetch CRLs from CAs.

Instead, the major browsers operate "push" systems, which condense CRLs across the entire CA ecosystem and push them to clients out-of-band.

The best documented of these system's is Mozilla's, called CRLite. Chrome's is called CRLSets. Apple also operates a system that isn't very documented, but is known as "Valid" because it uses the hostname valid.apple.com.

Of course not all systems support these, so some clients may still fetch CRLs. Unlike OCSP, there's a small number of CRLs that cover all certificates, so caching them is much more readily feasible. One of the original (in the 90s) blockers for this was the size of CRLs, but modern end-user systems typically can support this, except for the smallest embedded devices - which often have no revocation checking anyways.

Short-lived certificates without revocation information are the other option, which are logically equivalent to a certificate plus OCSP staple. These are coming, but we can't support them at the same time as OSCP due to the scale of our CA.

7 Likes